CORC

浏览/检索结果: 共21条,第1-10条 帮助

已选(0)清除 条数/页:   排序方式:
A novel security validation in embedded system 会议论文
Proceedings of the IEEE International Conference on Software Engineering and Service Sciences, ICSESS
作者:  Wang, X.;  Xu, B.;  Wang, W.;  Li, L.;  Du, P.
收藏  |  浏览/下载:10/0  |  提交时间:2019/12/30
A Security Design for the Detecting of Buffer Overflow Attacks in IoT Device 期刊论文
IEEE ACCESS, 2018, 卷号: 6, 页码: 72862-72869
作者:  Xu, Bin;  Wang, Weike;  Hao, Qiang;  Zhang, Zhun;  Du, Pei
收藏  |  浏览/下载:3/0  |  提交时间:2019/12/30
Secure and Efficient Cloud Data Deduplication With Randomized Tag 期刊论文
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 卷号: 12, 页码: 532-543
作者:  Jiang, Tao;  Chen, Xiaofeng;  Wu, Qianhong;  Ma, Jianfeng;  Susilo, Willy
收藏  |  浏览/下载:9/0  |  提交时间:2019/12/30
A Novel Security Validation in Embedded System 会议论文
PROCEEDINGS OF 2017 8TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS 2017), 2017-01-01
作者:  Wang, Xiang;  Xu, Bin;  Wang, Weike;  Li, Lin;  Du, Pei
收藏  |  浏览/下载:4/0  |  提交时间:2019/12/30
Keep all mobile users' whereabouts secure: a radio frequency identification protocol anti-tracking in 5G 期刊论文
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2016, 卷号: 29, 期号: 16, 页码: 2375-2387
作者:  Yin, Xi;  Fang, Binxing;  Jin, Shuyuan;  Qiu, Meikang;  Vasilakos, Athanasios V.
收藏  |  浏览/下载:16/0  |  提交时间:2019/12/12
A multi-tag secure network coding scheme against pollution attacks in WSNs 期刊论文
Journal of Computational Information Systems, 2015, 卷号: Vol.11 No.12, 页码: 4413-4420
作者:  Zhang, Dafang;  Li, Youpeng;  Ning, Zuoting
收藏  |  浏览/下载:1/0  |  提交时间:2019/12/31
Secure tag search in RFID systems using mobile readers 期刊论文
IEEE Transactions on Dependable and Secure Computing, 2015, 卷号: 12, 期号: 2, 页码: 230-242
作者:  Sundaresan, Saravanan*;  Doss, Robin;  Piramuthu, Selwyn;  Zhou, Wanlei
收藏  |  浏览/下载:2/0  |  提交时间:2019/12/27
Cloud-based Iterative RFID Tag Search Protocol Using Bloom Filters 会议论文
5th International Conference on Cloud Computing, CloudComp 2014, Guilin, China
作者:  Qian, Yuming;  Zhang, Daqiang;  Zhao, Shengjie;  Fan, Xiaopeng;  Fan, Ke
收藏  |  浏览/下载:18/0  |  提交时间:2015/09/02
End-to-end aggregate authentication of time-series data 其他
2013-01-01
Ma, Di; Zhu, Yan; Yu, Mengyang
收藏  |  浏览/下载:3/0  |  提交时间:2015/11/17
Tag Group Authentication Using Bit-Collisions 会议论文
Leng, X.; Hancke, G. P.; Mayes, K. E.; Markantonakis, K.
收藏  |  浏览/下载:2/0  |  提交时间:2015/11/13


©版权所有 ©2017 CSpace - Powered by CSpace