×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
武汉大学 [49]
软件研究所 [18]
清华大学 [10]
北京大学 [7]
厦门大学 [5]
兰州理工大学 [5]
更多...
内容类型
会议论文 [74]
期刊论文 [38]
其他 [6]
学位论文 [4]
会议 [3]
发表日期
2020 [1]
2019 [1]
2018 [5]
2017 [3]
2016 [6]
2015 [6]
更多...
学科主题
Computer S... [1]
Computer S... [1]
Informatio... [1]
Telecommun... [1]
computer a... [1]
computer s... [1]
更多...
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共125条,第1-10条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
The research and application of trusted startup of embedded TPM
会议论文
Shenyang, China, July 27-29, 2020
作者:
Shang WL(尚文利)
;
Zhang, Xiule
;
Chen, Xin
;
Liu XD(刘贤达)
;
Chen CY(陈春雨)
收藏
  |  
浏览/下载:10/0
  |  
提交时间:2020/10/10
Trusted computing environment
Industrial control system
Trusted startup
Embedded system
An efficient anonymous remote attestation scheme for trusted computing based on improved CPK
期刊论文
ELECTRONIC COMMERCE RESEARCH, 2019, 卷号: 19, 期号: 3
作者:
Yu Fajiang
;
Chen Jing
;
Xiang Yang
;
Zhu Jiacheng
;
Zhao Yangdi
收藏
  |  
浏览/下载:1/0
  |  
提交时间:2019/12/05
Remote attestation
Trusted computing
Trusted platform module (TPM)
Combined public key cryptography (CPK)
Constructing hierarchical spatiotemporal information for action recognition
会议论文
Guangzhou, China, October 7, 2018 - October 11, 2018
作者:
Yao, Guangle
;
Zhong, Jiandan
;
Lei, Tao
;
Liu, Xianyuan
收藏
  |  
浏览/下载:41/0
  |  
提交时间:2019/08/23
Big data
Convolution
Indexing (of information)
Network security
Neural networks
Optical flows
Security systems
Smart city
Trusted computing
A human flesh search algorithm based on information puzzle
会议论文
Guangzhou, China, October 7, 2018 - October 11, 2018
作者:
Nian, Fuzhong
;
Zhang, Yaqiong
;
X., Liu
收藏
  |  
浏览/下载:9/0
  |  
提交时间:2020/11/15
Big data
Complex networks
Information dissemination
Smart city
Trusted computing
Human flesh
Infectious disease
Information diffusion
Information propagation
Information puzzle
Propagation modeling
Theoretical derivations
Transmission mechanisms
Research on trusted DNP3-BAE protocol based on hash chain
期刊论文
EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2018, 卷号: 2018, 期号: 1
作者:
Lu, Ye
;
Feng, Tao
收藏
  |  
浏览/下载:0/0
  |  
提交时间:2019/11/15
Industrial control system
DNP3 protocol
Trusted Computing
Span
Securing display path for security-sensitive applications on mobile devices
期刊论文
CMC-COMPUTERS MATERIALS & CONTINUA, 2018, 卷号: 55, 期号: 1, 页码: 17-35
作者:
Cui, Jinhua
;
Zhang, Yuanyuan
;
Cai, Zhiping*
;
Liu, Anfeng
;
Li, Yangyang
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/12/03
Display path
Mobile device
Secure display
Trust anchor
Trusted computing base
Virtualization
SecTube: SGX-based trusted transmission system
期刊论文
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2018, 卷号: 10699 LNCS, 页码: 231-238
作者:
Chen, J.
;
Dai, B.
;
Wang, Y.
;
Yao, Y.
;
Li, B.
收藏
  |  
浏览/下载:6/0
  |  
提交时间:2019/12/30
Transmissions
Trusted computing
Application platforms
Computing paradigm
Design and implementations
Execution environments
Security software
Security technology
Transmission systems
Trusted communications
Cryptography
Multi-dimensional fuzzy trust evaluation for mobile social networks based on dynamic community structures
期刊论文
Concurrency and Computation: Practice and Experience, 2017, 卷号: 29, 期号: 7, 页码: -
作者:
Chen, Shuhong
;
Wang, Guojun*
;
Yan, Guofeng
;
Xie, Dongqing
收藏
  |  
浏览/下载:14/0
  |  
提交时间:2019/12/03
trusted computing
mobile social networks
dynamic implicit social behavioral graph
fuzzy detection
dynamic community structure
Provably Leakage-Resilient Password-Based Authenticated Key Exchange in the Standard Model
期刊论文
IEEE ACCESS, 2017, 卷号: 5
作者:
Ruan, Ou
;
Chen, Jing
;
Zhang, Mingwu
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/12/05
Leakage-resilience
password-based authenticated key exchange
side-channel attacks
trusted computing
internet of things
Presence Attestation: The Missing Link in Dynamic Trust Bootstrapping
会议论文
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017-01-01
作者:
Zhang, Zhangkai
;
Ding, Xuhua
;
Tsudik, Gene
;
Cui, Jinhua
;
Li, Zhoujun
收藏
  |  
浏览/下载:6/0
  |  
提交时间:2019/12/30
trusted computing
attestation
dynamic root of trust
human-in-the-loop
device I/O
©版权所有 ©2017 CSpace - Powered by
CSpace