×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
湖南大学 [14]
内容类型
期刊论文 [11]
会议论文 [3]
发表日期
2019 [7]
2017 [1]
2016 [1]
2010 [1]
2007 [1]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共14条,第1-10条
帮助
限定条件
专题:湖南大学
第一署名单位
第一作者单位
通讯作者单位
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
3-D Printed Object Authentication Based on Printing Noise and Digital Signature
期刊论文
IEEE Transactions on Reliability, 2019, 卷号: Vol.68 No.1, 页码: 342-353
作者:
Fei Peng
;
Jing Yang
;
Min Long
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/12/13
Printing
Authentication
Watermarking
Digital signatures
Feature extraction
Intellectual property
Solid modeling
Authentication
data security
digital signature
printing noise
3-D printed object
3-D Printed Object Authentication Based on Printing Noise and Digital Signature.
期刊论文
IEEE Transactions on Reliability, 2019, 卷号: Vol.68 No.1, 页码: 342-353
作者:
Peng, Fei
;
Yang, Jing
;
Long, Min
收藏
  |  
浏览/下载:8/0
  |  
提交时间:2019/12/13
3-D printed object
Authentication
data security
digital signature
Digital signatures
Feature extraction
Intellectual property
Printing
printing noise
Solid modeling
Watermarking
3-D Printed Object Authentication Based on Printing Noise and Digital Signature.
期刊论文
IEEE Transactions on Reliability, 2019, 卷号: Vol.68 No.1, 页码: 342-353
作者:
Peng, Fei
;
Yang, Jing
;
Long, Min
收藏
  |  
浏览/下载:12/0
  |  
提交时间:2019/12/13
3-D printed object
Authentication
data security
digital signature
Digital signatures
Feature extraction
Intellectual property
Printing
printing noise
Solid modeling
Watermarking
3-D Printed Object Authentication Based on Printing Noise and Digital Signature.
期刊论文
IEEE Transactions on Reliability, 2019, 卷号: Vol.68 No.1, 页码: 342-353
作者:
Peng, Fei
;
Yang, Jing
;
Long, Min
收藏
  |  
浏览/下载:1/0
  |  
提交时间:2019/12/13
3-D printed object
Authentication
data security
digital signature
Digital signatures
Feature extraction
Intellectual property
Printing
printing noise
Solid modeling
Watermarking
3-D Printed Object Authentication Based on Printing Noise and Digital Signature
期刊论文
IEEE TRANSACTIONS ON RELIABILITY, 2019, 卷号: Vol.68 No.1, 页码: 342-353
作者:
Peng, F
;
Yang, J
;
Long, M
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/12/17
Authentication
data security
digital signature
printing noise
3-D printed object
Efficient Authentication of Multi-Dimensional Top-$k$Queries
期刊论文
IEEE Access, 2019, 卷号: Vol.7, 页码: 4748-4762
作者:
Xiaoyu Zhu
;
Jie Wu
;
Wei Chang
;
Guojun Wang
;
Qin Liu
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2019/12/13
Authentication
Servers
Cloud
computing
Databases
Diabetes
Computational
modeling
Data
outsourcing
multi-dimension
query
authentication
signature
chain
top-kquery
Efficient Authentication of Multi-Dimentional Top-k Queries
期刊论文
IEEE ACCESS, 2019, 卷号: Vol.7, 页码: 4748-4762
作者:
Zhu, XY
;
Wu, J
;
Chang, W
;
Wang, GJ
;
Liu, Q
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2019/12/17
Data outsourcing
multi-dimension
query authentication
signature chain
top-k query
Secure Data Access and Sharing Scheme for Cloud Storage
期刊论文
Wireless Personal Communications, 2017, 卷号: Vol.96 No.4, 页码: 5295-5314
作者:
Li, Xiong
;
Kumari, Saru
;
Shen, Jian
;
Wu, Fan
;
Chen, Caisen
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/12/31
Cloud computing
Cloud storage
User authentication
Data sharing
Password
Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing
期刊论文
IEEE Transactions on Computers, 2016, 卷号: Vol.65 No.5, 页码: 1566-1577
作者:
Zhang, W
;
Lin, YP
;
Xiao, S
;
Wu, J
;
Zhou, SW
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/31
Servers
Cryptography
Authentication
Protocols
Data privacy
Law,multiple owners
Cloud computing
ranked keyword search,dynamic secret key
Cloud computing
ranked keyword search
multiple owners
privacy preserving
A semi-fragile watermarking algorithm for authenticating 2D CAD engineering graphics based on log-polar transformation
期刊论文
Computer-Aided Design, 2010, 卷号: Vol.42 No.12, 页码: 1207-1216
作者:
Peng, Fei
;
Guo, Re-Si
;
Li, Chang-Tsun
;
Long, Min
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2020/01/13
Semi-fragile watermarking
Integrity verification
Data hiding
Content authentication
Engineering graphics
©版权所有 ©2017 CSpace - Powered by
CSpace