CORC

浏览/检索结果: 共9条,第1-9条 帮助

限定条件                
已选(0)清除 条数/页:   排序方式:
Data Hiding in Binary Image with High Payload 期刊论文
ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2018, 卷号: 43, 期号: 12
作者:  Ding, Wenjia;  Wang, Yulin
收藏  |  浏览/下载:2/0  |  提交时间:2019/12/05
A New Transitively Closed Undirected Graph Authentication Scheme for Blockchain-Based Identity Management Systems 期刊论文
IEEE ACCESS, 2018, 卷号: 6
作者:  Lin, Chao;  He, Debiao;  Huang, Xinyi;  Khan, Muhammad Khurram;  Choo, Kim-Kwang Raymond
收藏  |  浏览/下载:2/0  |  提交时间:2019/12/05
A secure data backup scheme using multi-factor authentication 期刊论文
IET INFORMATION SECURITY, 2017, 卷号: 11, 期号: 5
作者:  Liu, Yining;  Zhong, Qi;  Chang, Liang;  Xia, Zhe;  He, Debiao
收藏  |  浏览/下载:12/0  |  提交时间:2019/12/05
Reversible Fragile Watermarking for Fine-Grained Tamper Localization in Spatial Data 其他
2017-01-01
作者:  Lan, Hai;  Peng, Yuwei
收藏  |  浏览/下载:4/0  |  提交时间:2019/12/05
Reversible Fragile Watermarking for Fine-Grained Tamper Localization in Spatial Data 其他
2017-01-01
作者:  Lan, Hai;  Peng, Yuwei
收藏  |  浏览/下载:5/0  |  提交时间:2019/12/05
A Private User Data Protection Mechanism in TrustZone Architecture Based on Identity Authentication 期刊论文
TSINGHUA SCIENCE AND TECHNOLOGY, 2017, 卷号: 22, 期号: 2
作者:  Zhao, Bo;  Xiao, Yu;  Huang, Yuqing;  Cui, Xiaoyu
收藏  |  浏览/下载:2/0  |  提交时间:2019/12/05
Query Authentication over Cloud Data from Multiple Contributors 会议论文
作者:  Xie, Ge;  Peng, Zhiyong;  Song, Wei
收藏  |  浏览/下载:11/0  |  提交时间:2019/12/05
Security Architecture and Defence Strategy of 3G Mobile Communication System 会议论文
作者:  
收藏  |  浏览/下载:3/0  |  提交时间:2019/12/05
Security Architecture and Defence Strategy of 3G Mobile Communication System 会议论文
作者:  Hui, Xinhe;  Yang, Boxiong;  Lv, Ling;  Chen, Ying
收藏  |  浏览/下载:2/0  |  提交时间:2019/12/05


©版权所有 ©2017 CSpace - Powered by CSpace