×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
西安交通大学 [6]
兰州理工大学 [4]
上海电子信息职业技术... [3]
长春光学精密机械与物... [2]
清华大学 [1]
北京大学 [1]
更多...
内容类型
期刊论文 [12]
会议论文 [11]
发表日期
2020 [2]
2018 [3]
2017 [1]
2016 [1]
2014 [1]
2013 [2]
更多...
学科主题
structural... [1]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共23条,第1-10条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
发表日期升序
发表日期降序
作者升序
作者降序
提交时间升序
提交时间降序
题名升序
题名降序
Multi-format speech BioHashing based on spectrogram
期刊论文
Multimedia Tools and Applications, 2020, 卷号: 79, 期号: 33-34, 页码: 24889-24909
作者:
Huang, Yi-bo
;
Wang, Yong
;
Zhang, Qiu-yu
;
Zhang, Wei-zhao
;
Fan, Man-hong
收藏
  |  
浏览/下载:13/0
  |  
提交时间:2020/11/14
Authentication
Chaotic systems
Discrete cosine transforms
Eigenvalues and eigenfunctions
Factorization
Spectrographs
Authentication algorithm
Nonnegative matrix factorization
Real time performance
Security problems
Speech perception
Strong robustness
Two dimensional discrete cosine transform
Unidirectionality
Research on the privacy security puzzle scheme of blockchain
会议论文
Hong Kong, Hong kong, June 15, 2019 - June 17, 2019
作者:
Feng, Tao
;
Hao, Wentao
;
Du, Jinze
收藏
  |  
浏览/下载:12/0
  |  
提交时间:2020/11/15
Bitcoin
Blockchain
Data transaction
Decentralization
Essential features
Non-interactive zero-knowledge proofs
Power calculation
Privacy problems
Security problems
Transaction data
Secure algorithm via hybrid relaying scheme and resource allocation for OFDM networks
会议论文
作者:
Zhou, Xianwen
;
Ren, Pinyi
;
Du, Qinghe
收藏
  |  
浏览/下载:6/0
  |  
提交时间:2019/11/19
Cooperative-ofdm
Multiple optimizations
Optimization problems
Physical layer security
Relaying schemes
Secrecy outage probabilities
Spectrum efficiency
Wireless communication system
Dimension of Distribution System Security Region
期刊论文
Dianli Xitong Zidonghua/Automation of Electric Power Systems, 2018, 卷号: 42, 页码: 16-22
作者:
Xiao, Jun
;
Zhang, Han
;
Zhang, Baoqiang
;
Zhang, Liyuan
收藏
  |  
浏览/下载:8/0
  |  
提交时间:2019/11/26
Boundary constraints
Connection vector
Dimension
Distribution systems
Main transformer
Preliminary analysis
Sectionalizing switch
Security problems
Modeling and Solving the Dynamic R-Neighbor P-Center Problem in the First-Aid System Based on Attack-Defense Game
会议论文
Proceedings - Annual Reliability and Maintainability Symposium
作者:
Zhu, C.
;
Xiao, Y.-Y.
;
Zuo, X.-R.
;
You, M.
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2019/12/30
Linear programming
Location
Maintainability
A-D game
Computational tests
Dynamic demand
First aids
General solutions
Location modeling
Optimal solutions
P-center problems
Network security
Ethical Issues in Designing Internet-Based Research: Recommendations for Good Practice
期刊论文
Journal of Research Practice, 2017, 卷号: Vol.13 No.2
作者:
Gupta,Shikha
收藏
  |  
浏览/下载:9/0
  |  
提交时间:2019/12/24
Ethics
Research
Design
Design
Requirements
Internet
Electronic
Learning
Definitions
Research
Methodology
Research
Problems
Interviews
Confidentiality
Online
Surveys
Information
Security
Computer
Mediated
Communication
Foreign
Countries
Security problems analysis and solving policy design for mobile agents running platform
会议论文
作者:
Tong, Yan
;
Zhang, Jian
;
Qin, Tao
收藏
  |  
浏览/下载:6/0
  |  
提交时间:2019/11/26
Asymmetric encryption
Encryption algorithms
Mobile agent system
Policy design
Security problems
Simulation environment
Socket communications
Symmetric encryption
Relay selection based on coalitional game for secure wireless networks
期刊论文
iet communications, 2014
Liu, Zhongjian
;
Shang, Yong
;
Zhang, Rongqing
;
Xiang, Haige
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2015/11/13
relay networks (telecommunication)
wireless channels
decode and forward communication
cooperative communication
game theory
coalitional game
secure wireless networks
two-stage decode-and-forward cooperative network
overall secrecy rate
secure beamforming problems
approximation
practical wireless channel
computation complexity
distributed relay selection problem
Max-Pareto order
distributed merge-and-split coalition formation algorithm
PHYSICAL LAYER SECURITY
COOPERATIVE NETWORKS
CHANNELS
Traceable, group-oriented, signature scheme with multiple signing policies in group-based trust management
期刊论文
IET INFORMATION SECURITY, 2013, 卷号: 7, 页码: 343-348
作者:
Jiao, Dong
;
Li, Mingchu
;
Ou, Jinping
;
Guo, Cheng
;
Ren, Yizhi
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2019/12/11
digital signatures
peer-to-peer computing
computer network security
trusted computing
multiple signing policies
group-based trust management scheme
super peer
reputation value distribution
reputation value storage
disguised peer
malicious peer
security problems
signature group
SP signature
traceable group-oriented signature scheme
Based on the attribute encrypted cloud storage scheme
会议论文
Shiyan, Hubei, China, June 21, 2013 - June 23, 2013
作者:
Zhu, Li-Ye
收藏
  |  
浏览/下载:23/0
  |  
提交时间:2020/11/15
Cryptography
Access control models
Access control policies
Ciphertexts
Cloud storage services
Cloud storages
Conspiracy attack
Formatting
Security problems
©版权所有 ©2017 CSpace - Powered by
CSpace