×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
兰州大学 [12]
内容类型
会议论文 [10]
期刊论文 [2]
发表日期
2014 [3]
2011 [1]
2010 [4]
2009 [1]
2007 [1]
2005 [1]
更多...
学科主题
computer s... [2]
Meteorolog... [1]
automation... [1]
computer s... [1]
education;... [1]
electron t... [1]
更多...
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共12条,第1-10条
帮助
限定条件
专题:兰州大学
第一署名单位
第一作者单位
通讯作者单位
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
NTP DRDoS attack vulnerability and mitigation
会议论文
International Conference on Machine Tool Technology and Mechatronics Engineering, ICMTTME 2014, Guilin, China, June 22, 2014 - June 23, 2014
作者:
Alfraih Abdulaziz Nasser, A.
;
Chen, Wen Bo
收藏
  |  
浏览/下载:8/0
  |  
提交时间:2017/01/18
Network security
Computer operating systems
Denial-of-service attack
Machine tools
Network protocols
Personal computers
Servers
Transmission control protocol
Amplification factors
Computer device
Denial of Service
Distributed networks
Linux servers
Network time protocol
Set time
An authentication protocol based on Chinese remainder theorem in wireless sensor networks
会议论文
2013 IEEE Conference Anthology, ANTHOLOGY 2013, China, January 1, 2013 - January 8, 2013
作者:
Qi, Ai-Qin
;
Shen, Yong-Jun
收藏
  |  
浏览/下载:1/0
  |  
提交时间:2017/01/18
Wireless sensor networks
Authentication
Cathode ray tubes
Network security
Authentication protocols
Chinese remainder theorem
Computing capability
Efficient authentication
High security levels
Performance testing
Security analysis
Stable performance
A Preconditioned GMRES Method for Elliptic PDE-constrained Optimization Problems
会议论文
10th International Conference on Computational Intelligence and Security CIS 2014, Kunming U Sci Technol, Kunming, PEOPLES R CHINA, NOV 15-16, 2014
作者:
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2017/01/20
the GMRES method
preconditioning matrix
distributed control problem
spectral distribution
eigenvalues and eigenvectors
A real-time electroencephalogram (EEG) based individual identification interface for mobile security in ubiquitous environment
会议论文
2011 IEEE Asia-Pacific Services Computing Conference, APSCC 2011, Jeju Island, Korea, Republic of, December 12, 2011 - December 15, 2011
作者:
Hu, Bin
;
Liu, Quanying
;
Zhao, Qinglin
;
Qi, Yanbing
;
Peng, Hong
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2017/01/18
Cellular telephone systems
Biometrics
Conference calls
Diseases
Electroencephalography
Experiments
Mobile telecommunication systems
Ubiquitous computing
Accuracy test
EEG signals
Individual identification
Mental illness
Mobile communications
Mobile Security
Password check
Predictive tools
Real time
Single channels
Smart phones
Time dimension
Ubiquitous
Ubiquitous application
Ubiquitous environments
基于生态安全的干旱区绿洲生态需水研究
期刊论文
水利学报, 2010, 卷号: 41, 期号: 2, 页码: 226-232
作者:
刘金鹏
;
费良军
;
南忠仁
;
尹亚坤
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2016/08/06
干旱区
绿洲
生态安全
生态需水量
民勤绿洲
Arid area
Ecological security
Ecological status
Ecological water demand
Ecological water requirements
Ground water table
In-line
Minqin oasis
Water demand
The key problems in the design of lift-sliding mechanical parking system
会议论文
Wuhan, China, June 26, 2010 - June 28, 2010
作者:
Zhou, Xuhong
;
Zhang, Jingshu
;
Nie, Huanhuan
;
Wang, Haicui
;
Li, Jiang,
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2017/01/18
Structural design
Mechanics
Parking
Steel structures
Building systems
Design standard
Key problems
Loads
Parking systems
Security protection systems
Similar design
Structure calculation
Structure type
Theoretical models
Transmission systems
An improved authentication approach to enhance security and privacy in RFID system
会议论文
2010 2nd International Conference on Intelligent Human-Machine Systems and Cybernetics, IHMSC 2010, Nanjing, China, August 26, 2010 - August 28, 2010
作者:
Chen, Xiaoyun
;
Su, Youli
;
Xiong, Hui
;
Yao, Yukai
;
Liu, Guohua
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2017/01/18
Security of data
Authentication
Cybernetics
Radio frequency identification (RFID)
Radio systems
Supply chain management
Supply chains
Wireless telecommunication systems
Hash lock
Mutual authentication
Random-list
RFID
Security and privacy
AKA Security Algorithm Design Based On Chaotic Mapping
会议论文
2nd IEEE International Conference on Advanced Computer Control, Shenyang, PEOPLES R CHINA, MAR 27-29, 2010
作者:
Pei, SL
;
Ma, ZL
;
Li, Y
;
Ma, YZ
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2017/01/18
AKA
Chaotic Mapping
One-Way Hash Function
Software Design of Security Monitoring and Early Warning System for Electric Power Security Control
会议论文
World Congress on Software Engineering, Xiamen, PEOPLES R CHINA, MAY 19-21, 2009
作者:
Feng, WC
;
Wang, ZB
;
Wang, JZ
;
Sun, DH
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2017/01/20
Study on the logistics management information system for discrete manufacturing enterprises
会议论文
2007 IEEE International Conference on Service Operations and Logistics, and Informatics, SOLI, Philadelphia, PA, United states, August 27, 2007 - August 29, 2007
作者:
Chunju, Jing
;
Zhiyuan, Fang
;
Zhou, Yu,
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2017/01/18
Manufacture
Computer software
Data communication systems
Flowcharting
Information systems
Knowledge management
Linear control systems
Logistics
Management information systems
Network security
Personnel training
Project management
Discrete manufacturing enterprises
Heavy machines
Large-scale networks
LMIS
Logistics managements
Logistics systems
Management mechanisms
Manufacturing enterprises
Network datum
Security strategies
Small batch productions
Staff trainings
Technical support systems
Waiting-time
©版权所有 ©2017 CSpace - Powered by
CSpace