×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
软件研究所 [45]
华南理工大学 [18]
兰州理工大学 [12]
贵州大学 [9]
清华大学 [8]
西安交通大学 [8]
更多...
内容类型
会议论文 [140]
发表日期
2020 [1]
2018 [6]
2016 [5]
2015 [3]
2014 [3]
2013 [5]
更多...
学科主题
computer s... [2]
electron t... [1]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共140条,第1-10条
帮助
限定条件
内容类型:会议论文
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Research and Implementation of Secure Industrial Communication Protocols
会议论文
Dalian, China, March 20-22, 2020
作者:
Wang JR(王靖然)
;
Liu MZ(刘明哲)
;
Xu AD(徐皑冬)
;
Hu B(胡波)
;
Han XJ(韩晓佳)
收藏
  |  
浏览/下载:6/0
  |  
提交时间:2020/12/18
ICS information security
industrial communication protocols
identity authentication
data encryption
Modbus/TCP
A Security Analysis and Evaluation Model on Distributed Autonomous Robotic Systems
会议论文
Milan, ITALY, JUL 09-11, 2018
作者:
Zhou, Qing
;
He, Xin
;
Xue, Changbin
;
Lin, Kexin
收藏
  |  
浏览/下载:23/0
  |  
提交时间:2019/01/07
Distributed System Security
Distributed Autonomous Robotic Systems
Security Analysis
Security Evaluation
FastTrust: Fast and Anonymous Spatial-Temporal Trust for Connected Cars on Expressways
会议论文
作者:
Lyu, Chen
;
Pande, Amit
;
Zhang, Yuanyuan
;
Gu, Dawu
;
Mohapatra, Prasant
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2019/08/22
An overview of smart contract: Architecture, applications, and future trends
会议论文
Changshu, China, Jun. 26-29, 2018.
作者:
Shuai Wang
;
Yong Yuan
;
Xiao Wang
;
Juanjuan Li
;
Rui Qin
收藏
  |  
浏览/下载:44/0
  |  
提交时间:2018/10/10
Lessons Learned from Developing Permissioned Blockchains
会议论文
2018 IEEE 18TH INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY COMPANION (QRS-C), 2018-01-01
作者:
Tsai, Wei-Tek
;
Yu, Lian
收藏
  |  
浏览/下载:9/0
  |  
提交时间:2019/12/30
Blockchain
Computer software selection and evaluation
Network protocols
Software reliability
Communications protocols
Consensus protocols
High Speed
Innovative solutions
Permissioned-blockchains
C (programming language)
Implementation of SM4 on FPGA: Trade-Off Analysis between Area and Speed
会议论文
2018 International Conference on Intelligence and Safety for Robotics, ISR 2018
作者:
Guan, Z.
;
Li, Y.
;
Shang, T.
;
Liu, J.
;
Sun, M.
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2019/12/30
Cryptography
Economic and social effects
Field programmable gate arrays (FPGA)
Hardware
Intellectual property core
Internet protocols
Machine design
Robotics
Robots
Speed
Wireless telecommunication systems
Block cipher algorithms
Hardware schemes
Resource utilizations
Security
Trade off
Trade-off analysis
Upper and lower bounds
Wireless communications
Network security
A Blockchain-Based Collocation Storage Architecture for Data Security Process Platform of WSN
会议论文
Proceedings of the 2018 IEEE 22nd International Conference on Computer Supported Cooperative Work in Design, CSCWD 2018
作者:
Feng, L.
;
Zhang, H.
;
Lou, L.
;
Chen, Y.
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/30
Blockchain
Computer supported cooperative work
Digital storage
Distributed computer systems
Interactive computer systems
Network architecture
Network security
Asymmetric signature
Consensus algorithms
Consensus protocols
Distributed database
Distributed systems
Process platforms
Storage architectures
Terminal devices
Sensor nodes
Design and research of a new secure authentication protocol in GSM networks
会议论文
International Seminar on Applied Physics, Optoelectronics and Photonics, APOP 2016, Shanghai, China, May 28, 2016 - May 29, 2016
作者:
Qi, Ai-Qin
;
Shen, Yong-Jun
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2017/01/17
Network security
Authentication
Global system for mobile communications
Network protocols
Authentication protocols
Following problem
Secure authentications
Security and performance
Security application
Security protection
Security services
Square roots
Model checking quantum key distribution protocols
会议论文
作者:
Huang, Baichuan
;
Huang, Yan
;
Kong, Jiaming
;
Huang, Xin
收藏
  |  
浏览/下载:10/0
  |  
提交时间:2019/11/26
BB84
Discrete time Markov chains
Group QKD
Probabilistic computation tree logic
Quantum information theory
Quantum key distribution protocols
Security properties
Verification techniques
Formal Verification of Security Protocols Using Spin
会议论文
15th IEEE/ACIS International Conference on Computer and Information Science (ICIS), 2016-06-26
作者:
Chen, Shengbo[1]
;
Fu, Hao[2]
;
Miao, Huaikou[3]
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/04/26
security protocols
network security
model checking
Spin
LTL
©版权所有 ©2017 CSpace - Powered by
CSpace