×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
湖南大学 [7]
北京航空航天大学 [2]
兰州理工大学 [1]
内容类型
期刊论文 [10]
发表日期
2019 [10]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共10条,第1-10条
帮助
限定条件
发表日期:2019
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
3-D Printed Object Authentication Based on Printing Noise and Digital Signature
期刊论文
IEEE Transactions on Reliability, 2019, 卷号: Vol.68 No.1, 页码: 342-353
作者:
Fei Peng
;
Jing Yang
;
Min Long
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/12/13
Printing
Authentication
Watermarking
Digital signatures
Feature extraction
Intellectual property
Solid modeling
Authentication
data security
digital signature
printing noise
3-D printed object
3-D Printed Object Authentication Based on Printing Noise and Digital Signature.
期刊论文
IEEE Transactions on Reliability, 2019, 卷号: Vol.68 No.1, 页码: 342-353
作者:
Peng, Fei
;
Yang, Jing
;
Long, Min
收藏
  |  
浏览/下载:8/0
  |  
提交时间:2019/12/13
3-D printed object
Authentication
data security
digital signature
Digital signatures
Feature extraction
Intellectual property
Printing
printing noise
Solid modeling
Watermarking
3-D Printed Object Authentication Based on Printing Noise and Digital Signature.
期刊论文
IEEE Transactions on Reliability, 2019, 卷号: Vol.68 No.1, 页码: 342-353
作者:
Peng, Fei
;
Yang, Jing
;
Long, Min
收藏
  |  
浏览/下载:12/0
  |  
提交时间:2019/12/13
3-D printed object
Authentication
data security
digital signature
Digital signatures
Feature extraction
Intellectual property
Printing
printing noise
Solid modeling
Watermarking
3-D Printed Object Authentication Based on Printing Noise and Digital Signature.
期刊论文
IEEE Transactions on Reliability, 2019, 卷号: Vol.68 No.1, 页码: 342-353
作者:
Peng, Fei
;
Yang, Jing
;
Long, Min
收藏
  |  
浏览/下载:1/0
  |  
提交时间:2019/12/13
3-D printed object
Authentication
data security
digital signature
Digital signatures
Feature extraction
Intellectual property
Printing
printing noise
Solid modeling
Watermarking
3-D Printed Object Authentication Based on Printing Noise and Digital Signature
期刊论文
IEEE TRANSACTIONS ON RELIABILITY, 2019, 卷号: Vol.68 No.1, 页码: 342-353
作者:
Peng, F
;
Yang, J
;
Long, M
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/12/17
Authentication
data security
digital signature
printing noise
3-D printed object
Efficient Authentication of Multi-Dimensional Top-$k$Queries
期刊论文
IEEE Access, 2019, 卷号: Vol.7, 页码: 4748-4762
作者:
Xiaoyu Zhu
;
Jie Wu
;
Wei Chang
;
Guojun Wang
;
Qin Liu
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2019/12/13
Authentication
Servers
Cloud
computing
Databases
Diabetes
Computational
modeling
Data
outsourcing
multi-dimension
query
authentication
signature
chain
top-kquery
Efficient Authentication of Multi-Dimentional Top-k Queries
期刊论文
IEEE ACCESS, 2019, 卷号: Vol.7, 页码: 4748-4762
作者:
Zhu, XY
;
Wu, J
;
Chang, W
;
Wang, GJ
;
Liu, Q
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2019/12/17
Data outsourcing
multi-dimension
query authentication
signature chain
top-k query
Securing messaging services through efficient signcryption with designated equality test
期刊论文
INFORMATION SCIENCES, 2019, 卷号: 490, 页码: 146-165
作者:
Wang, Yujue
;
Pang, HweeHwa
;
Deng, Robert H.
;
Ding, Yong
;
Wu, Qianhong
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/30
Messaging system
Encryption
Confidentiality
Authentication
Signcryption
Equality test on ciphertexts
Equijoin
Data outsourcing
Privacy-Preserving Cloud-Based Road Condition Monitoring With Source Authentication in VANETs
期刊论文
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 卷号: 14, 页码: 1779-1790
作者:
Wang, Yujue
;
Ding, Yong
;
Wu, Qianhong
;
Wei, Yongzhuang
;
Qin, Bo
收藏
  |  
浏览/下载:15/0
  |  
提交时间:2019/12/30
Data privacy
vehicular ad hoc networks
VANET
cloud computing
authentication
auditability
MPR based secure content routing scheme for NDN-MANET
期刊论文
Journal of Internet Technology, 2019, 卷号: 20, 期号: 5, 页码: 1625-1636
作者:
Guo, Xian
;
Zhang, Ma-Jiang
;
Ngaboyindekwe, Aristide
;
Fang, Jun-Li
;
Wang, Jing
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2020/11/14
Authentication
Floods
Forestry
Mobile ad hoc networks
Network security
Trees (mathematics)
Content routing
MANET
Merkle trees
Named data networkings
Security attributes
Security mechanism
Source authentication
Statistical detection
©版权所有 ©2017 CSpace - Powered by
CSpace