×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
上海电子信息职业技术... [5]
兰州理工大学 [2]
清华大学 [1]
北京航空航天大学 [1]
兰州大学 [1]
华南理工大学 [1]
更多...
内容类型
会议论文 [6]
期刊论文 [6]
发表日期
2016 [4]
2013 [1]
2010 [1]
2008 [2]
学科主题
telecommun... [1]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共12条,第1-10条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Robust three-factor remote user authentication scheme with key agreement for multimedia systems
期刊论文
Security and Communication Networks, 2016, 卷号: Vol.9 No.13, 页码: 1916-1927
作者:
Li, Xiong
;
Niu, Jianwei
;
Khan, Muhammad Khurram
;
Liao, Junguo
;
Zhao, Xiaoke
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/31
multimedia information security
cryptanalysis
biometric
smart card
authentication
key agreement
Robust three-factor remote user authentication scheme with key agreement for multimedia systems
期刊论文
SECURITY AND COMMUNICATION NETWORKS, 2016, 卷号: 9, 页码: 1916-1927
作者:
Li, Xiong
;
Niu, Jianwei
;
Khan, Muhammad Khurram
;
Liao, Junguo
;
Zhao, Xiaoke
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/12/30
multimedia information security
cryptanalysis
biometric
smart card
authentication
key agreement
Research on Universal Model of Speech Perceptual Hashing Authentication System in Mobile Environment
会议论文
作者:
Zhang, Qiu-Yu
;
Hu, Wen-Jin
;
Huang, Yi-Bo
;
Qiao, Si-Bin
收藏
  |  
浏览/下载:8/0
  |  
提交时间:2019/11/15
Mobile computing environment
Multimedia information security
Speech authentication
Perceptual hashing
Perception feature extraction
Tamper detection
Security authentication method of speech perceptual hashing based on fuzzy commitment scheme
期刊论文
International Journal of Security and its Applications, 2016, 卷号: 10, 期号: 1, 页码: 229-240
作者:
Zhang, Qiu-Yu
;
Ren, Zhan-Wei
;
Huang, Yi-Bo
;
Shuang, Yu
;
Hu, Wen-Jin
收藏
  |  
浏览/下载:15/0
  |  
提交时间:2020/11/14
Algorithms
Authentication
Delta functions
Speech
Authentication algorithm
Fuzzy commitment
Multimedia security
Original algorithms
Perceptual hashing
Security
Security authentication
Speech information
The e-government system risk assessment model based on dynamic threat and fuzzy neural network
会议论文
2013 5th IEEE International Conference on Broadband Network and Multimedia Technology, IEEE IC-BNMT 2013, Guilin, China, November 17, 2013 - November 19, 2013
作者:
Liu, Xin
;
Shen, Yongjun
;
Zhang, Guidong
;
Li, Shuxian
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2017/01/18
Government data processing
Broadband networks
Fuzzy neural networks
Information systems
Multimedia systems
Neural networks
Risk assessment
Security of data
e-Government
E-government systems
Human judgments
Information security risk assessment
Information system security
Security assessment
Security performance
Traditional models
Modeling and optimizing of the information hiding communication system over streaming media
期刊论文
2010, 2010
Xiao Bo
;
Huang Yong-feng
收藏
  |  
浏览/下载:5/0
Application Potential of Multimedia Information Retrieval
期刊论文
Proceedings of the IEEE, 2008, 卷号: Vol.96 NO.4, 页码: 712-720
作者:
Rui,Y.
;
Kankanhalli,M.S.
收藏
  |  
浏览/下载:1/0
  |  
提交时间:2020/01/13
applications
consumer
electronics
information
retrieval
multimedia
systems
security
An Analysis of Electronic Media to Prepare Children for Safe and Ethical Practices in Digital Environments.
期刊论文
Contemporary Issues in Technology and Teacher Education, 2008, 卷号: Vol.8 No.3, 页码: 222-243
作者:
Fenaughty,John
;
Desai,Shreya
;
Falls,Donald
;
Berson,IleneR.
;
Berson,MichaelJ.
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2020/01/13
Child
Safety
Mass
Media
Effects
Mass
Media
Use
Multimedia
Instruction
Electronic
Learning
Media
Literacy
Information
Security
Instructional
Material
Evaluation
Ethical
Instruction
Scoring
Rubrics
Developmentally
Appropriate
Practices
Decision
Making
Skills
Risk
Assessment
Skill
Development
Intervention
Online
Courses
Role-based access contrl of digital right management - Use puppetking website as a case study (EI收录)
会议论文
NCM 2009 - 5th International Joint Conference on INC, IMS, and IDC, Seoul, Korea, Republic of, August 25, 2009 - August 27, 2009
作者:
Tsai, Dwen-Ren[1]
;
Chen, Wei-Yu[2]
;
Liang, Chia-Hao[3]
;
Hu, Chung-Chiang[4]
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/04/17
Computer graphics
Copyrights
Information management
Multimedia systems
Security systems
Semiconductor storage
World Wide Web
An Open, Secure and Flexible Platform Based on Internet of Things and Cloud Computing for Ambient Aiding Living and Telemedicine
会议论文
2011
作者:
NingZhang
;
XiaoMingZhang
收藏
  |  
浏览/下载:1/0
  |  
提交时间:2020/01/04
telemedicine
cloud
computing
cryptographic
protocols
Internet
medical
information
systems
open
systems
electronic
health
record
Internet
of
things
ambient
aiding
living
multimedia
technologies
IoT
interoperability
system
security
service
quality
ambient
communication
protocols
secure
sockets
layer
Logic
gates
Multimedia
communication
Streaming
media
Quality
of
service
Security
©版权所有 ©2017 CSpace - Powered by
CSpace