×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
北京航空航天大学 [5]
安徽大学 [2]
武汉大学 [2]
西安交通大学 [1]
江苏大学 [1]
复旦大学上海医学院 [1]
更多...
内容类型
期刊论文 [8]
会议论文 [4]
发表日期
2018 [12]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共12条,第1-10条
帮助
限定条件
发表日期:2018
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Consume: A privacy-preserving authorisation and authentication service for connecting with health and wellbeing APIs
期刊论文
PERVASIVE AND MOBILE COMPUTING, 2018, 卷号: 43
作者:
Wetzels, Mart
;
Ayoola, Idowu
;
Bogers, Sander
;
Peters, Peter
;
Chen, Wei
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/05
Data acquisition systems
Authentication
Privacy
Healthcare
eHealth
Attribute-based encryption supporting data filtration over post-quantum assumptions
期刊论文
International Journal of Electronic Security and Digital Forensics, 2018, 卷号: 10, 页码: 323-337
作者:
Jiao, Chunhong
;
Xiang, Xinyin
收藏
  |  
浏览/下载:10/0
  |  
提交时间:2019/11/19
Attribute based encryption (ABE)
Attribute-based encryptions
Authentication information
Chosen-plaintext attack
Cryptographic primitives
Data filtration
Efficient construction
Post quantum
Image authentication scheme based on reversible fragile watermarking with two images
期刊论文
Journal of Information Security and Applications, 2018, 卷号: Vol.40, 页码: 236-246
作者:
Xuejing Niu
;
Lei Fu
;
Zhaoxia Yin
;
Yinyin Peng
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/04/22
Image
authentication
Reversible
data
hiding
Fragile
watermarking
An efficient and secure 3‐factor user‐authentication protocol for multiserver environment.
期刊论文
International Journal of Communication Systems, 2018, 卷号: Vol.31 No.14, 页码: 1
作者:
Li, Xiaohong
;
Sun, Aiying
;
He, Debiao
;
Luo, Min
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2019/04/24
MULTI-factor
authentication
*CLIENT/SERVER
computing
security
measures
*CYBERTERRORISM
*MALWARE
prevention
*DATA
security
Data Hiding in Binary Image with High Payload
期刊论文
ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2018, 卷号: 43, 期号: 12
作者:
Ding, Wenjia
;
Wang, Yulin
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/12/05
Binary image
Steganography
Data hiding
Image authentication
A New Transitively Closed Undirected Graph Authentication Scheme for Blockchain-Based Identity Management Systems
期刊论文
IEEE ACCESS, 2018, 卷号: 6
作者:
Lin, Chao
;
He, Debiao
;
Huang, Xinyi
;
Khan, Muhammad Khurram
;
Choo, Kim-Kwang Raymond
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/12/05
Authentication
blockchain-based identity management
graph data
transitively unforgeable
S2PD: A Selective Sharing Scheme for Privacy Data in Vehicular Social Networks
期刊论文
IEEE ACCESS, 2018, 卷号: 6, 页码: 55139-55148
作者:
Feng, Xia[1]
;
Wang, Liangmin[2]
收藏
  |  
浏览/下载:1/0
  |  
提交时间:2019/12/24
Half-decryption
identity authentication
privacy data
vehicular social networks
RFID/NFC device with embedded fingerprint authentication system
会议论文
Proceedings of the IEEE International Conference on Software Engineering and Service Sciences, ICSESS
作者:
Deelaka Ranasinghe, R.M.N.
;
Yu, G.Z.
收藏
  |  
浏览/下载:18/0
  |  
提交时间:2019/12/30
Application programs
Authentication
Computer crime
Crime
Cryptography
Digital storage
Malware
Personal computing
Radio frequency identification (RFID)
Security of data
Data corruption
Data encryption
Fingerprint authentication
Fingerprint authentication system
Identification cards
Isolated systems
Personal information
Security threats
Near field communication
Hijacking Your Routers via Control-Hijacking URLs in Embedded Devices with Web Interfaces
会议论文
INFORMATION AND COMMUNICATIONS SECURITY, ICICS 2017, 2018-01-01
作者:
Yuan, Ming
;
Li, Ye
;
Li, Zhoujun
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2019/12/30
Firmware
Authentication-bypassing URLs
Symbolic execution
Lightweight dynamic data tracker
Automatic exploit generation
Comprehensive security management system for Hadoop platforms
会议论文
2018 International Conference on Intelligence and Safety for Robotics, ISR 2018
作者:
Shang, T.
;
Zhuang, H.
;
Liu, J.
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/30
Authentication
Big data
Cryptography
Data mining
Industrial management
Robotics
Authorization and access control
Big data platforms
Big data technologies
Management systems
Security management systems
Security protection
Security requirements
Security services
Network security
©版权所有 ©2017 CSpace - Powered by
CSpace