×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
软件研究所 [38]
北京航空航天大学 [31]
华南理工大学 [29]
兰州理工大学 [27]
西安交通大学 [18]
山东大学 [17]
更多...
内容类型
会议论文 [251]
发表日期
2020 [3]
2019 [3]
2018 [11]
2017 [8]
2016 [11]
2015 [8]
更多...
学科主题
computer s... [1]
computer s... [1]
computer s... [1]
electron t... [1]
radio syst... [1]
telecommun... [1]
更多...
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共251条,第1-10条
帮助
限定条件
内容类型:会议论文
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Authentication Technology in Industrial Control System Based on Identity Password
会议论文
Shenyang, China, July 27-29, 2020
作者:
Yang LY(杨路瑶)
;
Shang WL(尚文利)
;
Chen CY(陈春雨)
;
Wang TY(王天宇)
;
Liu ZB(刘周斌)
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2020/10/10
Industrial control security
digital signature
identity authentication
SSL/TLS handshake protocol
Research and Implementation of Secure Industrial Communication Protocols
会议论文
Dalian, China, March 20-22, 2020
作者:
Wang JR(王靖然)
;
Liu MZ(刘明哲)
;
Xu AD(徐皑冬)
;
Hu B(胡波)
;
Han XJ(韩晓佳)
收藏
  |  
浏览/下载:6/0
  |  
提交时间:2020/12/18
ICS information security
industrial communication protocols
identity authentication
data encryption
Modbus/TCP
One-Stop Efficient PKI Authentication Service Model Based on Blockchain
会议论文
Chengdu, China, October 11, 2019 - October 13, 2019
作者:
Feng, Tao
;
Chen, Wuyang
;
Zhang, Di
;
Liu, Chunyan
收藏
  |  
浏览/下载:12/0
  |  
提交时间:2020/11/15
Blockchain
Public key cryptography
Authentication services
Batch update
Dynamic accumulators
Identity authentication
Public key infrastructure technologies
Storage overhead
Third-party service providers
User authentication
Research and Application of RFID System Security Authentication Protocol Based on ECC Algorithm
会议论文
作者:
Zu, Qiaohong
;
Cai, Kui
收藏
  |  
浏览/下载:12/0
  |  
提交时间:2019/12/05
An Architectural-Enhanced Secure Design in Embedded System
会议论文
Proceedings of the IEEE International Conference on Software Engineering and Service Sciences, ICSESS, 2018-11-23
作者:
Wang, X.
;
Xu, B.
;
Wang, W.
;
Zhang, Z.
;
Zhang, X.
收藏
  |  
浏览/下载:19/0
  |  
提交时间:2019/12/30
Cryptography
Hardware security
Intrusion detection
Software engineering
Architectural enhancement
Buffer overflows
Cryptographic algorithms
execution behavior
Memory authentication
Performance loss
Security solutions
Software and hardwares
Embedded systems
On the security of a three factor remote user authentication scheme using fuzzy extractor
会议论文
14th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2018, November 26, 2018 - November 28, 2018
作者:
Chen, Chien-Ming
;
Huang, Yanyu
;
Deng, Xiaoting
;
Wu, Tsu-Yang
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/31
FastTrust: Fast and Anonymous Spatial-Temporal Trust for Connected Cars on Expressways
会议论文
作者:
Lyu, Chen
;
Pande, Amit
;
Zhang, Yuanyuan
;
Gu, Dawu
;
Mohapatra, Prasant
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2019/08/22
A Review of Multimodal Facial Biometric Authentication Methods in Mobile Devices and their Application in Head Mounted Displays
会议论文
作者:
Olade, Ilesanmi
;
Liang, Hai-Ning
;
Fleming, Charles
收藏
  |  
浏览/下载:12/0
  |  
提交时间:2019/11/19
Usable security
Authentication
Head mounted display
Mobile devices
Facial biometric
Towards a User-Friendly and Secure Hand Shaking Authentication for Smartphones
会议论文
作者:
Yan, Jinpei
;
Qi, Yong
;
Rao, Qifan
;
Qi, Saiyu
收藏
  |  
浏览/下载:13/0
  |  
提交时间:2019/11/19
Authentication methods
Cold start
Efficient authentication
Ensemble learning
Machine learning models
Mobile authentication
Shoulder-surfing attacks
User experience
Traffic-driven intrusion detection for massive MTC towards 5G networks
会议论文
作者:
Lu, Nan
;
Du, Qinghe
;
Sun, Li
;
Ren, Pinyi
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2019/11/26
Authentication and key agreements
Detection probabilities
Intrusion detection scheme
Machinetype communication (MTC)
Security enhancements
Security requirements
Traffic characteristics
Ubiquitous information
©版权所有 ©2017 CSpace - Powered by
CSpace