×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
软件研究所 [6]
北京大学 [5]
西安交通大学 [2]
自动化研究所 [2]
武汉大学 [2]
清华大学 [1]
更多...
内容类型
期刊论文 [17]
其他 [3]
会议论文 [2]
发表日期
2015 [5]
2014 [2]
2013 [2]
2012 [2]
2010 [4]
2006 [4]
更多...
学科主题
Telecommun... [3]
Computer S... [1]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共22条,第1-10条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Image compression and encryption scheme using fractal dictionary and Julia set
期刊论文
IET IMAGE PROCESSING, 2015, 卷号: 9, 期号: 3, 页码: 173-183
作者:
Sun, Yuanyuan
;
Xu, Rudan
;
Chen, Lina
;
Hu, Xiaopeng
收藏
  |  
浏览/下载:36/0
  |  
提交时间:2016/11/11
data compression
image coding
cryptography
fractals
image reconstruction
image compression
image encryption scheme
fractal dictionary
Julia set
data transmission security
data storage security
multimedia data
compression-encryption scheme
image reconstruction
tiny perturbation
stream cipher encryption
diffusion process
plaintext attack
time consumption reduction
Anonymous Two-Factor Authentication in Distributed Systems: Certain Goals Are Beyond Attainment
期刊论文
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2015
Wang, Ding
;
He, Debiao
;
Wang, Ping
;
Chu, Chao-Hsien
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2017/12/03
Two-factor authentication
user anonymity
offline dictionary attack
de-synchronization attack
smart card loss attack
SMART-CARDS
PASSWORD AUTHENTICATION
SECURITY ANALYSIS
USER ANONYMITY
SCHEME
ATTACKS
KEY
EFFICIENT
NETWORKS
PROTOCOLS
Offline Dictionary Attack on Password Authentication Schemes Using Smart Cards
其他
2015-01-01
Wang, Ding
;
Wang, Ping
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2017/12/03
Password authentication
Offline dictionary attack
Smart card
Common memory device
Non-tamper resistant
USER AUTHENTICATION
KEY EXCHANGE
SECURITY ENHANCEMENT
EFFICIENT
ROBUST
IMPROVEMENTS
PROTOCOL
Image compression and encryption scheme using fractal dictionary and Julia set
期刊论文
IET IMAGE PROCESSING, 2015, 卷号: 9, 页码: 173-183
作者:
Sun, Yuanyuan
;
Xu, Rudan
;
Chen, Lina
;
Hu, Xiaopeng
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/12/09
data compression
image coding
cryptography
fractals
image reconstruction
image compression
image encryption scheme
fractal dictionary
Julia set
data transmission security
data storage security
multimedia data
compression-encryption scheme
image reconstruction
tiny perturbation
stream cipher encryption
diffusion process
plaintext attack
time consumption reduction
Anonymous Two-Factor Authentication in Distributed Systems: Certain Goals Are Beyond Attainment
期刊论文
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2015, 卷号: 12, 期号: 4
作者:
Wang, Ding
;
He, Debiao
;
Wang, Ping
;
Chu, Chao-Hsien
收藏
  |  
浏览/下载:12/0
  |  
提交时间:2019/12/05
Two-factor authentication
user anonymity
offline dictionary attack
de-synchronization attack
smart card loss attack
Captcha as Graphical Passwords-A New Security Primitive Based on Hard AI Problems
期刊论文
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2014, 卷号: 9, 期号: 6, 页码: 891-904
作者:
Zhu, Bin B.
;
Yan, Jeff
;
Bao, Guanbo
;
Yang, Maowei
;
Xu, Ning
收藏
  |  
浏览/下载:38/0
  |  
提交时间:2015/09/18
Graphical password
password
hotspots
CaRP
Captcha
dictionary attack
password guessing attack
security primitive
Captcha as Graphical Passwords-A New Security Primitive Based on Hard AI Problems
期刊论文
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2014, 卷号: 9, 期号: 6;6, 页码: 891-904
作者:
Zhu, Bin B.
;
Yan, Jeff
;
Bao, Guanbo
;
Yang, Maowei
;
Xu, Ning
收藏
  |  
浏览/下载:1/0
  |  
提交时间:2020/10/27
Graphical Password
Password
Hotspots
Carp
Captcha
Dictionary Attack
Password Guessing Attack
Security Primitive
Fenchel Duality Based Dictionary Learning for Restoration of Noisy Images
期刊论文
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2013
作者:
Wang Shanshan
;
Xia Yong
;
Liu Qiegen
;
Dong Pei
;
Feng David Dagan
收藏
  |  
浏览/下载:24/0
  |  
提交时间:2015/08/28
Analysis and enhancement of an optimized gateway-oriented password-based authenticated key exchange protocol
期刊论文
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2013, 卷号: E96-A, 期号: 9, 页码: 1864-1871
Wei, Fushan (1)
;
Zhang, Zhenfeng (3)
;
Ma, Chuangui (1)
收藏
  |  
浏览/下载:13/0
  |  
提交时间:2014/12/16
gateway
password
authentication
key exchange
The design problems of one kind of chaotic one-way hash function (EI CONFERENCE)
会议论文
2012 4th International Conference on Multimedia and Security, MINES 2012, November 2, 2012 - November 4, 2012, Nanjing, Jiangsu, China
Li P.
;
Zhang M.
;
Shi J.
收藏
  |  
浏览/下载:21/0
  |  
提交时间:2013/03/25
The construction method of one kind of one-way hash function based on 1-D Logistic map is analyzed. The design problem and some collision problems are pointed out. By using the dictionary attack
the collision probability of the arithmetic realized with signal floating point numbers is 2-23
and the collision probability of the arithmetic realized with double floating point numbers is 2-55. The reasons for these design problems are discussed
and some key problems are pointed out which should be taken care of while constructing one-way hash function based on a digital chaotic map. 2012 IEEE.
©版权所有 ©2017 CSpace - Powered by
CSpace