×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
武汉大学 [39]
兰州理工大学 [32]
北京航空航天大学 [27]
西安交通大学 [26]
软件研究所 [26]
清华大学 [22]
更多...
内容类型
期刊论文 [196]
会议论文 [86]
学位论文 [15]
其他 [8]
会议 [3]
发表日期
2022 [2]
2021 [3]
2020 [3]
2019 [18]
2018 [25]
2017 [19]
更多...
学科主题
Telecommun... [4]
Computer S... [3]
Engineerin... [2]
Electrical... [1]
Engineerin... [1]
Informatio... [1]
更多...
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共308条,第1-10条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Automation and Orchestration of Zero Trust Architecture: Potential Solutions and Challenges
期刊论文
Machine Intelligence Research, 2024, 卷号: 21, 期号: 2, 页码: 294-317
作者:
Yang Cao
;
Shiva Raj Pokhrel
;
Ye Zhu
;
Robin Doss
;
Gang Li
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2024/04/23
Zero trust architecture, cyber security, artificial intelligence, access control, authentication
Speech BioHashing security authentication algorithm based on CNN hyperchaotic map
期刊论文
Multimedia Tools and Applications, 2022
作者:
Huang, Yi-bo
;
Yuan-Zhang
;
Chen, Teng-Fei
;
Yan, Shao-Hui
;
Zhang, Qiu-yu
收藏
  |  
浏览/下载:24/0
  |  
提交时间:2022/07/20
Authentication
Cryptography
Speech recognition
BioHashing
Biosafety template
CNN hyperchaotic map
Content authentication
Hyperchaotic maps
Security authentication
Speech content
Speech content authentication
Tamper detection
Tamper detection and location
Encrypted speech perceptual hashing authentication algorithm based on improved 2D-Henon encryption and harmonic product spectrum
期刊论文
MULTIMEDIA TOOLS AND APPLICATIONS, 2022, 卷号: 81, 期号: 18, 页码: 25829-25852
作者:
Huang, Yi-bo
;
Chen, Teng-fei
;
Zhang, Qiu-yu
;
Zhang, Yuan
;
Yan, Shao-hui
收藏
  |  
浏览/下载:21/0
  |  
提交时间:2022/04/21
Encrypted speech authentication
Perceptual hashing
Improved 2D-Henon
HPS
Matching accuracy
Security
Long sequence biometric hashing authentication based on 2D-SIMM and CQCC cosine values
期刊论文
MULTIMEDIA TOOLS AND APPLICATIONS, 2021, 卷号: 81, 期号: 2, 页码: 2873-2899
作者:
Huang, Yi-bo
;
Hou, Hexiang
;
Chen, Tengfei
;
Li, Hao
;
Zhang, Qiu-yu
收藏
  |  
浏览/下载:23/0
  |  
提交时间:2021/12/17
Speech content authentication
Biometric security template
2D-SIMM
CQCC cosine
Discrimination
Unidirectional
Security and Efficient Authentication Scheme for Mobile Edge Computing
期刊论文
Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications, 2021, 卷号: 44, 期号: 1, 页码: 110-116
作者:
Xue, Jian-Bin
;
Bai, Zi-Mei
收藏
  |  
浏览/下载:20/0
  |  
提交时间:2021/06/03
Authentication
Computer terminals
Cryptography
Edge computing
Mobile telecommunication systems
Security systems
Authentication scheme
Computing environments
Efficient authentication
Lightweight identity authentication protocol
Man in the middle attacks
Mutual authentication
Physical layer security
Symmetric crypto systems
Blockchain-Based Secured IPFS-Enable Event Storage Technique With Authentication Protocol in VANET
期刊论文
IEEE/CAA Journal of Automatica Sinica, 2021, 卷号: 8, 期号: 12, 页码: 1913-1922
作者:
Sanjeev Kumar Dwivedi
;
Ruhul Amin
;
Satyanarayana Vollala
收藏
  |  
浏览/下载:21/0
  |  
提交时间:2021/09/03
Authentication
blockchain
interplanetary file system (
IPFS
)
secure information sharing
security
Multi-format speech BioHashing based on spectrogram
期刊论文
Multimedia Tools and Applications, 2020, 卷号: 79, 期号: 33-34, 页码: 24889-24909
作者:
Huang, Yi-bo
;
Wang, Yong
;
Zhang, Qiu-yu
;
Zhang, Wei-zhao
;
Fan, Man-hong
收藏
  |  
浏览/下载:12/0
  |  
提交时间:2020/11/14
Authentication
Chaotic systems
Discrete cosine transforms
Eigenvalues and eigenfunctions
Factorization
Spectrographs
Authentication algorithm
Nonnegative matrix factorization
Real time performance
Security problems
Speech perception
Strong robustness
Two dimensional discrete cosine transform
Unidirectionality
Authentication Technology in Industrial Control System Based on Identity Password
会议论文
Shenyang, China, July 27-29, 2020
作者:
Yang LY(杨路瑶)
;
Shang WL(尚文利)
;
Chen CY(陈春雨)
;
Wang TY(王天宇)
;
Liu ZB(刘周斌)
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2020/10/10
Industrial control security
digital signature
identity authentication
SSL/TLS handshake protocol
Research and Implementation of Secure Industrial Communication Protocols
会议论文
Dalian, China, March 20-22, 2020
作者:
Wang JR(王靖然)
;
Liu MZ(刘明哲)
;
Xu AD(徐皑冬)
;
Hu B(胡波)
;
Han XJ(韩晓佳)
收藏
  |  
浏览/下载:8/0
  |  
提交时间:2020/12/18
ICS information security
industrial communication protocols
identity authentication
data encryption
Modbus/TCP
PHY-Layer Cover-Free Coding for Wireless Pilot Authentication in IoV Communications: Protocol Design and Ultra-Security Proof
期刊论文
IEEE Internet of Things Journal, 2019, 卷号: 6, 页码: 171-187
作者:
Xu, Dongyang
;
Ren, Pinyi
;
Ritcey, James A.
收藏
  |  
浏览/下载:45/0
  |  
提交时间:2019/11/19
Authentication
channel training
Cloud computing
Communication system security
cover-free coding.
Encoding
OFDM
Physical-layer authentication
pilot-aware attack
Protocols
V2I
©版权所有 ©2017 CSpace - Powered by
CSpace