×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
北京大学 [50]
厦门大学 [8]
武汉大学 [2]
内容类型
其他 [60]
发表日期
2017 [2]
2016 [5]
2015 [1]
2014 [5]
2013 [2]
2012 [12]
更多...
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共60条,第1-10条
帮助
限定条件
内容类型:其他
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
A Fast and Secure Transmission Method Based on Optocoupler for Mobile Storage
其他
2017-01-01
作者:
Zou, Lu
;
Zhang, Dejun
;
He, Fazhi
;
Xie, Zhuyang
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/12/05
Data security
Mobile storage
Protocol
CRC check
A Fast and Secure Transmission Method Based on Optocoupler for Mobile Storage
其他
2017-01-01
作者:
Zou, Lu
;
Zhang, Dejun
;
He, Fazhi
;
Xie, Zhuyang
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/05
Data security
Mobile storage
Protocol
CRC check
The Request for Better Measurement: A Comparative Evaluation of Two-Factor Authentication Schemes
其他
2016-01-01
Wang, Ding
;
Gu, Qianchen
;
Cheng, Haibo
;
Wang, Ping
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2017/12/03
Two-factor authentication
Smart card loss attack
Two-factor security
De-synchronization attack
Measurement
MEDICINE INFORMATION-SYSTEMS
SMART-CARDS
PASSWORD AUTHENTICATION
USER AUTHENTICATION
ROBUST
PROTOCOL
ANONYMITY
NETWORKS
Joint physical network coding and destination aided cooperative jamming for secure wireless sensor networks
其他
2016-01-01
Li, Dehuai
;
Zhang, Xiguang
;
Shang, Yong
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2017/12/03
Joint Physical Network Coding and Destination Aided Cooperative Jamming for Secure Wireless Sensor Networks
其他
2016-01-01
Li, Dehuai
;
Zhang, Xiguang
;
Shang, Yong
收藏
  |  
浏览/下载:6/0
  |  
提交时间:2017/12/03
wireless sensor networks
physical layer security
physical layer network coding
destination assisted cooperative jamming
LAYER SECURITY
RELAY SELECTION
CHANNEL
DESIGN
JAMMER
Trident: Context-based Reverse Authentication for Phishing AP Detection in Commodity WiFi Networks
其他
2016-01-01
Zhao, Peng
;
Bian, Kaigui
;
Chen, Ping
;
Zhao, Tong
;
Duan, Yichun
;
Yan, Wei
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2017/12/03
Research on Security Algorithm of Virtual Machine Live Migration for KVM Virtualization System
其他
2016-01-01
Fan, Wei
;
Zhang, Zhujun
;
Wang, Tingting
;
Hu, Bo
;
Qing, Sihan
;
Sun, Degang
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2017/12/03
Live migration
Security threats
Security algorithm
KVM virtualization system
Offline Dictionary Attack on Password Authentication Schemes Using Smart Cards
其他
2015-01-01
Wang, Ding
;
Wang, Ping
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2017/12/03
Password authentication
Offline dictionary attack
Smart card
Common memory device
Non-tamper resistant
USER AUTHENTICATION
KEY EXCHANGE
SECURITY ENHANCEMENT
EFFICIENT
ROBUST
IMPROVEMENTS
PROTOCOL
Efficient and feasible quantum private comparison of equality against the collective amplitude damping noise
其他
2014-01-01
Chen, Xiu-Bo
;
Su, Yuan
;
Niu, Xin-Xin
;
Yang, Yi-Xian
收藏
  |  
浏览/下载:8/0
  |  
提交时间:2015/11/11
Quantum private comparison of equality
Security
Feasible
Collective amplitude damping channel
SECURE DIRECT COMMUNICATION
W-STATE
ENTANGLEMENT
TELEPORTATION
REPEATERS
STORAGE
LIGHT
ROBUST VARIATIONS OF SECRET SHARING THROUGH NOISY QUANTUM CHANNEL
其他
2014-01-01
Chen, Xiu-Bo
;
Xu, Gang
;
Su, Yuan
;
Yang, Yi-Xian
收藏
  |  
浏览/下载:6/0
  |  
提交时间:2015/11/16
Quantum secret sharing
Information leakage
Security
SECURITY
©版权所有 ©2017 CSpace - Powered by
CSpace