×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
湖南大学 [5]
山东大学 [3]
安徽大学 [1]
山东师范大学 [1]
天津大学 [1]
贵州大学 [1]
更多...
内容类型
期刊论文 [12]
发表日期
2018 [12]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共12条,第1-10条
帮助
限定条件
发表日期:2018
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Optical colour image watermarking based on phase-truncated linear canonical transform and image decomposition
期刊论文
JOURNAL OF OPTICS, 2018, 卷号: Vol.20 No.5
作者:
Su, Y.a
;
Tang, C.a
;
Li, B.a
;
Lei, Z.b
收藏
  |  
浏览/下载:8/0
  |  
提交时间:2019/11/21
colour image watermarking
optical asymmetric cryptography
double random phase encoding
linear canonical transform
image decomposition
Multi-bit quantisation for similarity-preserving hashing
期刊论文
IET COMPUTER VISION, 2018, 卷号: Vol.12 No.5, 页码: 616-622
作者:
Liang, Dong
;
Zhu, Ming
;
Tang, Jun
;
Su, Liang Liang
收藏
  |  
浏览/下载:6/0
  |  
提交时间:2019/04/24
quantisation
cryptography
search problems
Big Data
Hamming codes
image segmentation
learning
image coding
multibit quantisation
similarity-preserving hashing
hashing-based approximate nearest neighbour search
Big Data
Hamming space
MBQ method
Matthews correlation coefficient
MCC
original data point distribution information
multiple bits per projection dimension
image data sets
feature space
Towards security authentication for IoT devices with lattice-based ZK
期刊论文
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2018, 卷号: 11058 LNCS, 页码: 141-150
作者:
Cai, Jie
;
Jiang, Han
;
Xu, Qiuliang
;
Lv, Guangshi
;
Zhao, Minghao
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/12/11
Hash function
Identification
Lattice-based cryptography
SIS problem
Zero-knowledge
Cryptanalysis and Improvements on Three-party-authenticated Key Agreement Protocols Based on Chaotic Maps
期刊论文
JOURNAL OF INTERNET TECHNOLOGY, 2018, 卷号: 19, 期号: 3, 页码: 679-687
作者:
Chen, Chien-Ming
;
Xu, Linlin
;
Wang, King-Hang
;
Liu, Shuai
;
Wu, Tsu-Yang
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/12/11
Chaotic map
Cryptography
Authentication key exchange protocol
Position based cryptography with location privacy: A step for Fog Computing
期刊论文
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 卷号: 78, 页码: 799-806
作者:
Yang, Rupeng
;
Xu, Qiuliang
;
Au, Man Ho
;
Yu, Zuoxia
;
Wang, Hao
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/12/11
Fog Computing
Location verification
Location privacy
Position based
cryptography
Bounded retrieval model
Cryptanalysis of a Chaotic Image Encryption Algorithm Based on Information Entropy
期刊论文
Cryptography and Security, 2018
作者:
Li, CQ
;
Lin, DD
;
Feng, BB
;
Lu, JH
;
Hao, F
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/26
Cryptanalysis of a Chaotic Image Encryption Algorithm Based on Information Entropy
期刊论文
IEEE Access, 2018, 卷号: Vol.6, 页码: 75834-75842
作者:
Chengqing Li
;
Dongdong Lin
;
Bingbing Feng
;
Jinhu Lü
;
Feng Hao
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/26
Encryption
Chaotic
communication
Information
entropy
Sensitivity
Chaotic
cryptanalysis
multimedia
cryptography
image
encryption
secure
communication
privacy
protection
A Secure and Efficient Privacy-Preserving Range Query Scheme in Location-Based Services
期刊论文
IEEE Access, 2018, 卷号: Vol.6, 页码: 72796-72807
作者:
Zhisheng Huang
;
Xiai Yan
;
Yaping Lin
;
Zhou Xu
;
Feng Lin
收藏
  |  
浏览/下载:15/0
  |  
提交时间:2019/12/26
Indexes
Privacy
Cryptography
Protocols
Encoding
Optimization
Bloom
filter
range
query
location-based
services
privacy-preserving
The improved elite multi-parent hybrid optimization algorithm based on bat algorithm to optimum design of automobile gearbox
期刊论文
JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2018, 卷号: Vol.21 No.2, 页码: 513-517
作者:
Wang, Chao
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/12/26
Bat algorithm
elite multi-parent evolutionary optimization algorithm
gearbox optimization
elite-preservation
hybrid discrete variable
Sine Chaotification Model for Enhancing Chaos and Its Hardware Implementation
期刊论文
IEEE Transactions on Industrial Electronics, 2018, 页码: 1
作者:
Zhongyun Hua
;
Binghang Zhou
;
Yicong Zhou
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2019/12/26
Complexity
theory
Transforms
Field
programmable
gate
arrays
Generators
Cryptography
Electronic
mail
Chaotic
system
chaotification
cryptography
FPGA
implementation
nonlinear
control
chaos-based
application
©版权所有 ©2017 CSpace - Powered by
CSpace