CORC

浏览/检索结果: 共12条,第1-10条 帮助

已选(0)清除 条数/页:   排序方式:
Robust three-factor remote user authentication scheme with key agreement for multimedia systems 期刊论文
Security and Communication Networks, 2016, 卷号: Vol.9 No.13, 页码: 1916-1927
作者:  Li, Xiong;  Niu, Jianwei;  Khan, Muhammad Khurram;  Liao, Junguo;  Zhao, Xiaoke
收藏  |  浏览/下载:3/0  |  提交时间:2019/12/31
Robust three-factor remote user authentication scheme with key agreement for multimedia systems 期刊论文
SECURITY AND COMMUNICATION NETWORKS, 2016, 卷号: 9, 页码: 1916-1927
作者:  Li, Xiong;  Niu, Jianwei;  Khan, Muhammad Khurram;  Liao, Junguo;  Zhao, Xiaoke
收藏  |  浏览/下载:4/0  |  提交时间:2019/12/30
Research on Universal Model of Speech Perceptual Hashing Authentication System in Mobile Environment 会议论文
作者:  Zhang, Qiu-Yu;  Hu, Wen-Jin;  Huang, Yi-Bo;  Qiao, Si-Bin
收藏  |  浏览/下载:8/0  |  提交时间:2019/11/15
Security authentication method of speech perceptual hashing based on fuzzy commitment scheme 期刊论文
International Journal of Security and its Applications, 2016, 卷号: 10, 期号: 1, 页码: 229-240
作者:  Zhang, Qiu-Yu;  Ren, Zhan-Wei;  Huang, Yi-Bo;  Shuang, Yu;  Hu, Wen-Jin
收藏  |  浏览/下载:15/0  |  提交时间:2020/11/14
The e-government system risk assessment model based on dynamic threat and fuzzy neural network 会议论文
2013 5th IEEE International Conference on Broadband Network and Multimedia Technology, IEEE IC-BNMT 2013, Guilin, China, November 17, 2013 - November 19, 2013
作者:  Liu, Xin;  Shen, Yongjun;  Zhang, Guidong;  Li, Shuxian
收藏  |  浏览/下载:3/0  |  提交时间:2017/01/18
Modeling and optimizing of the information hiding communication system over streaming media 期刊论文
2010, 2010
Xiao Bo; Huang Yong-feng
收藏  |  浏览/下载:5/0
Application Potential of Multimedia Information Retrieval 期刊论文
Proceedings of the IEEE, 2008, 卷号: Vol.96 NO.4, 页码: 712-720
作者:  Rui,Y.;  Kankanhalli,M.S.
收藏  |  浏览/下载:1/0  |  提交时间:2020/01/13
An Analysis of Electronic Media to Prepare Children for Safe and Ethical Practices in Digital Environments. 期刊论文
Contemporary Issues in Technology and Teacher Education, 2008, 卷号: Vol.8 No.3, 页码: 222-243
作者:  Fenaughty,John;  Desai,Shreya;  Falls,Donald;  Berson,IleneR.;  Berson,MichaelJ.
收藏  |  浏览/下载:2/0  |  提交时间:2020/01/13
Role-based access contrl of digital right management - Use puppetking website as a case study (EI收录) 会议论文
NCM 2009 - 5th International Joint Conference on INC, IMS, and IDC, Seoul, Korea, Republic of, August 25, 2009 - August 27, 2009
作者:  Tsai, Dwen-Ren[1];  Chen, Wei-Yu[2];  Liang, Chia-Hao[3];  Hu, Chung-Chiang[4]
收藏  |  浏览/下载:2/0  |  提交时间:2019/04/17
An Open, Secure and Flexible Platform Based on Internet of Things and Cloud Computing for Ambient Aiding Living and Telemedicine 会议论文
2011
作者:  NingZhang;  XiaoMingZhang
收藏  |  浏览/下载:1/0  |  提交时间:2020/01/04


©版权所有 ©2017 CSpace - Powered by CSpace