×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
兰州理工大学 [8]
内容类型
会议论文 [8]
发表日期
2021 [1]
2018 [1]
2012 [1]
2011 [3]
2010 [1]
2008 [1]
更多...
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共8条,第1-8条
帮助
限定条件
内容类型:会议论文
专题:兰州理工大学
第一署名单位
第一作者单位
通讯作者单位
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Detection of False Data Injection Attacks in smart grids based on cubature Kalman Filtering
会议论文
Kunming, PEOPLES R CHINA, MAY 22-24, 2021
作者:
Wang, Zhiwen
;
Zhang, Qi
;
Sun, Hongtao
;
Hu, Jiqiang
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2022/09/22
Smart grids
False Data Injection Attacks
Attack detection
Square root cubature Kalman filter
Cosine similarity
The research on web vulnerability defense model based on SVM
会议论文
Bangkok, Thailand, June 28, 2018 - June 30, 2018
作者:
Feng, Tao
;
Han, Tiantian
收藏
  |  
浏览/下载:8/0
  |  
提交时间:2020/11/15
Network security
Attack defense
Cross Site Scripting Attacks
Model-based OPC
Sql injection attacks
Vulnerability defense
Web attacks
WEB security
Xss attacks
WAPI secure access authentication scheme for heterogeneous networks based on identity-based cryptograph
会议论文
Seoul, Korea, Republic of, April 24, 2012 - April 26, 2012
作者:
Feng, Tao
;
Jiao, Jian
收藏
  |  
浏览/下载:12/0
  |  
提交时间:2020/11/15
Authentication
Computation theory
Computer circuits
Cryptography
Heterogeneous networks
Information management
Mobile security
Wireless local area networks (WLAN)
Access authentications
Authentication protocols
Comprehensive analysis
Identity based cryptographs
Man in the middle attacks
Mutual authentication
Protocol composition logic
WAPI
Security random network coding model against byzantine attack based on CBC
会议论文
作者:
Tao, Feng
;
Bingtao, Zhang
;
Jianfeng, Ma
收藏
  |  
浏览/下载:0/0
  |  
提交时间:2020/11/15
Codes (symbols)
Network coding
Byzantine attacks
Cipher-block-chaining
Random network coding
Secure networks
Secure negotiation approach for share-secret-key of kerberos service
会议论文
Taiyuan, China, September 24, 2011 - September 25, 2011
作者:
Cao, Lai-Cheng
收藏
  |  
浏览/下载:0/0
  |  
提交时间:2020/11/15
Artificial intelligence
Geometry
Public key cryptography
Computational advantages
Diffie Hellman
Distributed applications
Elliptic curve cryptography
Kerberos protocol
Man in the middle attacks
Security infrastructure
Shared secrets
Provably secure identity based signature without trusted PKG in the standard model
会议论文
作者:
Peng, Wei
;
Feng, Tao
收藏
  |  
浏览/下载:8/0
  |  
提交时间:2020/11/15
Computer science
Computers
CDH problem
Chosen message attacks
Diffie-Hellman assumption
ID based signature
ID based signature scheme
Identity based signature
Key escrow
Standard model
Denial of service attacks in cognitive radio networks
会议论文
作者:
Wang, Weifang
收藏
  |  
浏览/下载:10/0
  |  
提交时间:2020/11/15
Denial-of-service attack
Environmental technology
Network architecture
Network security
Radio
Radio systems
Secure communication
Wireless networks
Cognitive radio network
Denial of Service
Different protocols
Pue attacks
Security
Heightening security of P2P networks by neighborhood key method
会议论文
Wuhan, China, November 1, 2008 - November 3, 2008
作者:
Lai-Cheng, Cao
收藏
  |  
浏览/下载:10/0
  |  
提交时间:2020/11/15
Authentication
Hash functions
Intelligent networks
Intelligent systems
Access control mechanism
Authentication scheme
Man-in-middle attacks
One way hash functions
Peer to Peer (P2P) network
Security analysis
Sensitive informations
Zero knowledge proof
©版权所有 ©2017 CSpace - Powered by
CSpace