×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
兰州理工大学 [7]
华南理工大学 [5]
软件研究所 [4]
上海电子信息职业技术... [3]
清华大学 [2]
湖南大学 [2]
更多...
内容类型
期刊论文 [16]
会议论文 [14]
发表日期
2022 [2]
2020 [2]
2019 [1]
2018 [1]
2017 [3]
2016 [2]
更多...
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共30条,第1-10条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
A low-cost communication security scheme of UAV based on multi-round reverse auction model
期刊论文
Pervasive and Mobile Computing, 2022, 卷号: 85
作者:
Xue, Jianbin
;
Zhang, Han
;
Hu, Qingchun
收藏
  |  
浏览/下载:17/0
  |  
提交时间:2022/08/09
Combinatorial optimization
Cost functions
Cost reduction
Jamming
Mobile edge computing
Security systems
Communications security
Data offloading
Jamming
Low-costs
Reverse auction
Security performance
UAV communication
User groups
Wireless communication links
Wireless communications
Indexing-Min-Max Hashing: Relaxing the Security-Performance Tradeoff for Cancelable Fingerprint Templates
期刊论文
IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2022, 页码: 12
作者:
Li, Yuxing
;
Pang, Liaojun
;
Zhao, Heng
;
Cao, Zhicheng
;
Liu, Eryun
收藏
  |  
浏览/下载:38/0
  |  
提交时间:2022/03/17
Biometrics (access control)
Transforms
Cryptography
Privacy
Hash functions
Feature extraction
Life sciences
Biometrics template protection
cancelable fingerprint template
fixed-length fingerprint representation
Indexing-Min-Max (IMM) hashing
security-performance tradeoff
Formal Security Evaluation and Improvement of Industrial Ethernet EtherCAT Protocol
期刊论文
Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2020, 卷号: 57, 期号: 11, 页码: 2312-2327
作者:
Feng, Tao
;
Wang, Shuaishuai
;
Gong, Xiang
;
Fang, Junli
收藏
  |  
浏览/下载:14/0
  |  
提交时间:2020/12/18
Ethernet
Function evaluation
Hash functions
Industrial research
Man machine systems
Model checking
Petri netsIndustrial control systems
Industrial Ethernets
Key distribution centers
Man in the middle attacks
Real time performance
Security evaluation
Security functions
Security verification
Economic Dispatch of Wind Farm Cluster Integrated Power System Considering High Energy Load
会议论文
Tianjin, China, July 13, 2019 - July 15, 2019
作者:
Zhang, Xiaoying
;
Liao, Shun
;
Wang, Kun
;
Wang, Xiaolan
;
Chen, Wei
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2020/11/15
Economic analysis
Electric power system interconnection
Electric utilities
Integration
Scheduling
Wind power
Economic Dispatch
Integrated Power Systems
Large-scale wind power integrations
Multi objective
Objective functions
Optimization algorithms
Power system security
Wind power integrations
PUFPass: A password management mechanism based on software/hardware codesign
期刊论文
Integration, 2019, 卷号: 64, 页码: 173-183
作者:
Guo, Qingli
;
Ye, Jing
;
Li, Bing
;
Hu, Yu
;
Li, Xiaowei
收藏
  |  
浏览/下载:6/0
  |  
提交时间:2019/11/19
Password
Password management
Physical disorders
Physical unclonable functions (PUF)
Security
Shoulder-surfing attacks
Software/hardware co designs
Usability
Hardware-Based Protection for Data Security at Run-Time on Embedded Systems
会议论文
IOP Conference Series: Materials Science and Engineering
作者:
Wang, X.
;
Zhang, X.
;
Wang, W.
;
Du, P.
;
Zhang, Z.
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2019/12/30
Data privacy
Embedded systems
Hash functions
Memory architecture
Network security
Advanced Encryption Standard
Encryption algorithms
Hardware-based protection
Integrity protection
Performance penalties
Security Architecture
Security mechanism
System on a programmable chips
Hardware security
New integral attacks on SIMON
期刊论文
IET INFORMATION SECURITY, 2017, 卷号: 11, 期号: 5, 页码: 277-286
作者:
Fu, Kai
;
Sun, Ling
;
Wang, Meiqin
收藏
  |  
浏览/下载:16/0
  |  
提交时间:2019/12/12
cryptography
Boolean functions
integral attacks
lightweight block
ciphers
National Security Agency
NSA
zero-correlation linear
cryptanalysis
Boolean functions
zero-sum property
zero-sum integral
distinguisher
14-round SIMON32
16-round SIMON48
22-round SIMON32
22-round SIMON48-72
23-round SIMON48-96
The Adjacency Graphs of LFSRs With Primitive-Like Characteristic Polynomials.
期刊论文
IEEE Transactions on Information Theory, 2017, 卷号: Vol.63 No.2, 页码: 1325-1335
作者:
Lin,Dongdai
;
Li,Ming
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2019/12/24
adjacency
graph
Boolean
functions
De
Bruijn
sequence
Electronic
mail
Information
security
LFSR
Linear
feedback
shift
registers
primitive
polynomial
Effect of trigonometric functions-based watermarking on blood vessel extraction: an application in ophthalmology imaging
期刊论文
International Journal of Embedded Systems, 2017, 卷号: Vol.9 No.1, 页码: 90-100
作者:
Sk.SaddamAhmed
;
SayanChakraborty
;
AchintyaDas
;
NilanjanDey
;
PrasenjitMaji
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/24
blood
vessel
extraction
non-blind
watermarking
electronic
patient
records
EPR
K-means
clustering
peak
SNR
signal
to
noise
ratio
PSNR
trigonometric
functions
ophthalmology
imaging
information
security
medical
information
data
hiding
telemedicine
diabetic
retinopathy
disease
severity
fundus
images
image
segmentation
interpolation
image
security
retinal
images
diabetes.
集体土地所有权的三重功能属性——基于罗马氏族与我国农村集体土地的比较分析
期刊论文
2016, 2016
汪洋
;
Wang Yang
收藏
  |  
浏览/下载:3/0
©版权所有 ©2017 CSpace - Powered by
CSpace