×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
北京航空航天大学 [14]
内容类型
会议论文 [8]
期刊论文 [6]
发表日期
2019 [2]
2018 [5]
2017 [3]
2016 [3]
2015 [1]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共14条,第1-10条
帮助
限定条件
专题:北京航空航天大学
第一署名单位
第一作者单位
通讯作者单位
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Securing messaging services through efficient signcryption with designated equality test
期刊论文
INFORMATION SCIENCES, 2019, 卷号: 490, 页码: 146-165
作者:
Wang, Yujue
;
Pang, HweeHwa
;
Deng, Robert H.
;
Ding, Yong
;
Wu, Qianhong
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/30
Messaging system
Encryption
Confidentiality
Authentication
Signcryption
Equality test on ciphertexts
Equijoin
Data outsourcing
Privacy-Preserving Cloud-Based Road Condition Monitoring With Source Authentication in VANETs
期刊论文
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 卷号: 14, 页码: 1779-1790
作者:
Wang, Yujue
;
Ding, Yong
;
Wu, Qianhong
;
Wei, Yongzhuang
;
Qin, Bo
收藏
  |  
浏览/下载:15/0
  |  
提交时间:2019/12/30
Data privacy
vehicular ad hoc networks
VANET
cloud computing
authentication
auditability
RFID/NFC device with embedded fingerprint authentication system
会议论文
Proceedings of the IEEE International Conference on Software Engineering and Service Sciences, ICSESS
作者:
Deelaka Ranasinghe, R.M.N.
;
Yu, G.Z.
收藏
  |  
浏览/下载:18/0
  |  
提交时间:2019/12/30
Application programs
Authentication
Computer crime
Crime
Cryptography
Digital storage
Malware
Personal computing
Radio frequency identification (RFID)
Security of data
Data corruption
Data encryption
Fingerprint authentication
Fingerprint authentication system
Identification cards
Isolated systems
Personal information
Security threats
Near field communication
Hijacking Your Routers via Control-Hijacking URLs in Embedded Devices with Web Interfaces
会议论文
INFORMATION AND COMMUNICATIONS SECURITY, ICICS 2017, 2018-01-01
作者:
Yuan, Ming
;
Li, Ye
;
Li, Zhoujun
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2019/12/30
Firmware
Authentication-bypassing URLs
Symbolic execution
Lightweight dynamic data tracker
Automatic exploit generation
Comprehensive security management system for Hadoop platforms
会议论文
2018 International Conference on Intelligence and Safety for Robotics, ISR 2018
作者:
Shang, T.
;
Zhuang, H.
;
Liu, J.
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/30
Authentication
Big data
Cryptography
Data mining
Industrial management
Robotics
Authorization and access control
Big data platforms
Big data technologies
Management systems
Security management systems
Security protection
Security requirements
Security services
Network security
A simple, secure and efficient authentication protocol for real-time earth observation through satellite
会议论文
Proceedings of 2018 15th International Bhurban Conference on Applied Sciences and Technology, IBCAST 2018
作者:
Murtaza, A.
;
Jianwei, L.
收藏
  |  
浏览/下载:8/0
  |  
提交时间:2019/12/30
Authentication
Cryptography
Data transfer
Network architecture
Network protocols
Observatories
Remote sensing
Authentication protocols
Data transfer protocols
Earth observation satellites
Earth observations
Efficient authentication
High resolution camera
Real time
Satellite image datas
Satellites
Hijacking your routers via control-hijacking URLs in embedded devices with web interfaces
期刊论文
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2018, 卷号: 10631 LNCS, 页码: 363-373
作者:
Yuan, M.
;
Li, Y.
;
Li, Z.
收藏
  |  
浏览/下载:6/0
  |  
提交时间:2019/12/30
Authentication
Firmware
Routers
Websites
Authentication mechanisms
Automatic exploit generation
Control hijackings
Dynamic data
Potential attack
Safety considerations
Symbolic execution
User management
Web services
Secure Data Access and Sharing Scheme for Cloud Storage
期刊论文
WIRELESS PERSONAL COMMUNICATIONS, 2017, 卷号: 96, 页码: 5295-5314
作者:
Li, Xiong
;
Kumari, Saru
;
Shen, Jian
;
Wu, Fan
;
Chen, Caisen
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/30
Cloud computing
Cloud storage
User authentication
Data sharing
Password
TRIP: A Tussle-Resistant Internet Pricing Mechanism
期刊论文
IEEE COMMUNICATIONS LETTERS, 2017, 卷号: 21, 页码: 270-273
作者:
Xie, Lijia
;
Zhang, Yao
;
Zheng, Zhiming
;
Zhang, Xiao
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/30
Data pricing model
tussle resistance
capability-based scheme
source authentication
bandwidth allocation
RFID/NFC Device with Embedded Fingerprint Authentication System
会议论文
PROCEEDINGS OF 2017 8TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS 2017), 2017-01-01
作者:
Ranasinghe, R. M. Nipuna Deelaka
;
Guan, Zhen Yu
收藏
  |  
浏览/下载:8/0
  |  
提交时间:2019/12/30
RFID
NFC
Fingerprint Authentication
Data Security
©版权所有 ©2017 CSpace - Powered by
CSpace