×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
清华大学 [37]
华南理工大学 [15]
软件研究所 [10]
上海电子信息职业技术... [8]
兰州理工大学 [7]
北京航空航天大学 [5]
更多...
内容类型
期刊论文 [60]
会议论文 [31]
其他 [1]
发表日期
2021 [1]
2019 [3]
2018 [8]
2017 [3]
2016 [2]
2015 [2]
更多...
学科主题
Engineerin... [3]
engineerin... [1]
telecommun... [1]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共92条,第1-10条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Security and Efficient Authentication Scheme for Mobile Edge Computing
期刊论文
Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications, 2021, 卷号: 44, 期号: 1, 页码: 110-116
作者:
Xue, Jian-Bin
;
Bai, Zi-Mei
收藏
  |  
浏览/下载:13/0
  |  
提交时间:2021/06/03
Authentication
Computer terminals
Cryptography
Edge computing
Mobile telecommunication systems
Security systems
Authentication scheme
Computing environments
Efficient authentication
Lightweight identity authentication protocol
Man in the middle attacks
Mutual authentication
Physical layer security
Symmetric crypto systems
Research on secure routing technology based on NDN for VANET
会议论文
Hong Kong, Hong kong, June 1, 2019 - June 3, 2019
作者:
Gai, Xiaowei
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2020/11/15
Cryptography
Distributed computer systems
Dynamics
Floods
Memory architecture
Mobile security
Mobile telecommunication systems
Network architecture
Network routing
Signal processing
Transmission control protocol
Vehicular ad hoc networks
Data network
Forward-secure
Identity based cryptography
Named data networkings
Network environments
Security requirements
Trust values
Wireless mobile networks
Green and Sustainable Cloud of Things: Enabling Collaborative Edge Computing
期刊论文
IEEE COMMUNICATIONS MAGAZINE, 2019, 卷号: 57, 页码: 72-78
作者:
Ning, Zhaolong
;
Kong, Xiangjie
;
Xia, Feng
;
Hou, Weigang
;
Wang, Xiaojie
收藏
  |  
浏览/下载:20/0
  |  
提交时间:2019/12/02
Cloud computing
Edge computing
Energy efficiency
Optical communication
Smart city
Wireless telecommunication systems, Broad-band access networks
Broadband Communication
Collaboration
Data security and privacy
Low-latency transmission
Optical network units
Virtual network embedding
Wireless communications, Green computing
Beacon trust management system and fake data detection in vehicular ad-hoc networks
期刊论文
IET INTELLIGENT TRANSPORT SYSTEMS, 2019, 卷号: 13, 页码: 780-788
作者:
Arshad, Muhammad
;
Ullah, Zahid
;
Khalid, Muhammad
;
Ahmad, Naveed
;
Khalid, Waqar
收藏
  |  
浏览/下载:16/0
  |  
提交时间:2019/12/30
vehicular ad hoc networks
computer network security
mobile radio
wireless sensor networks
mobile ad hoc networks
telecommunication traffic
vehicular ad-hoc network
malicious data detection scheme
host intrusion detection system schemes
light-weight intrusion detection technique
false safety event detection scheme
fake data detection scheme
trust-based data detection scheme
based detection scheme
local based detection schemes performance
false safety messages
false messag
LBS privacy protection technology based on searchable encryption mechanism
会议论文
Beijing, China, May 25, 2018 - May 27, 2018
作者:
Feng, Tao
;
Wang, Xudong
;
Li, Xinghua
收藏
  |  
浏览/下载:0/0
  |  
提交时间:2020/11/15
Cryptography
Global positioning system
Information services
Location
Manufacture
Search engines
Telecommunication services
Wireless sensor networks
Location privacy protection
Mobile communication networks
Mobile intelligent terminals
Positioning technologies
Privacy protection model
Search information
Searchable encryptions
Security properties
Secure Probabilistic Caching for Stochastic Multi-User Multi-Relay Networks
会议论文
2018 10TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS AND SIGNAL PROCESSING (WCSP), 2018-01-01
作者:
Fan, Lisheng
;
Lei, Xianfu
;
Zhao, Nan
;
Fan, Pingzhi
;
Karagiannidis, George K.
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/12/02
Heuristic algorithms
Mobile telecommunication systems
Relay control systems
Signal processing
Stochastic systems, Caching strategy
Content transmission
File contents
Numerical results
Poisson point process
Relay transmission
Transmission mode
Transmission security, Network security
Maximising the degrees of freedom of the physical-layer secured relay networks with artificial jamming
期刊论文
IET COMMUNICATIONS, 2018, 卷号: 12, 期号: 6, 页码: 665-671
作者:
Zheng, Lina
;
Sang, Liu
;
Liu, Ju
;
Lu, Bing-Bing
;
Dong, Zheng
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/12/11
relay networks (telecommunication)
array signal processing
jamming
physical-layer secured relay networks
artificial jamming
network
security
artificial noise
DoF-optimal collaborative beamforming
algorithm
Towards comprehensive threat modeling for intelligent vehicle cyber security
会议论文
CICTP 2017: Transportation Reform and Change - Equity, Inclusiveness, Sharing, and Innovation - Proceedings of the 17th COTA International Conference of Transportation Professionals
作者:
Ji, H.
;
Yu, G.
;
Wang, Y.
;
Zhang, Z.
;
Qin, H.
收藏
  |  
浏览/下载:10/0
  |  
提交时间:2019/12/30
Advanced driver assistance systems
Automobile drivers
Automotive industry
Intelligent vehicle highway systems
Network security
Vehicles
Wireless telecommunication systems
Advanced driver assistant systems
Autonomous Vehicles
Connected vehicles
Network communications
Security challenges
Telematics system
Vehicular communications
Vulnerability analysis
Vehicle to vehicle communications
Split antenna array in millimeter wave for secure vehicular communication
会议论文
MATEC Web of Conferences
作者:
Marjan, S.
;
Bai, L.
;
Han, C.
收藏
  |  
浏览/下载:11/0
  |  
提交时间:2019/12/30
Beam forming networks
Digital storage
Directive antennas
Intelligent materials
Manufacture
Network layers
Personal computing
Radio transmission
Signal to noise ratio
Vehicle to vehicle communications
Wireless telecommunication systems
Directional transmission
Millimeter-wave (mm-wave)
Physical layer security
Safety and efficiencies
Vehicular communication systems
Vehicular communications
Vehicular transportations
Wireless communication system
Millimeter waves
Implementation of SM4 on FPGA: Trade-Off Analysis between Area and Speed
会议论文
2018 International Conference on Intelligence and Safety for Robotics, ISR 2018
作者:
Guan, Z.
;
Li, Y.
;
Shang, T.
;
Liu, J.
;
Sun, M.
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2019/12/30
Cryptography
Economic and social effects
Field programmable gate arrays (FPGA)
Hardware
Intellectual property core
Internet protocols
Machine design
Robotics
Robots
Speed
Wireless telecommunication systems
Block cipher algorithms
Hardware schemes
Resource utilizations
Security
Trade off
Trade-off analysis
Upper and lower bounds
Wireless communications
Network security
©版权所有 ©2017 CSpace - Powered by
CSpace