×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
山东大学 [83]
内容类型
期刊论文 [47]
会议论文 [36]
发表日期
2019 [3]
2018 [4]
2017 [3]
2016 [3]
2015 [2]
2014 [2]
更多...
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共83条,第1-10条
帮助
限定条件
专题:山东大学
第一署名单位
第一作者单位
通讯作者单位
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Finding Sands in the Eyes: Vulnerabilities Discovery in IoT With EUFuzzer on Human Machine Interface
期刊论文
IEEE ACCESS, 2019, 卷号: 7, 页码: 103751-103759
作者:
Men, Jiaping
;
Xu, Guangquan
;
Han, Zhen
;
Sun, Zhonghao
;
Zhou, Xiaojun
收藏
  |  
浏览/下载:15/0
  |  
提交时间:2019/12/11
Protocol format parsing
vulnerability mining
fuzzing test
HMI
security
IoT
Key reuse attack on newhope key exchange protocol
期刊论文
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2019, 卷号: 11396 LNCS, 页码: 163-176
作者:
Liu, Chao
;
Zheng, Zhongxiang
;
Zou, Guangnan
收藏
  |  
浏览/下载:6/0
  |  
提交时间:2019/12/11
Active attack
Key exchange
Key reuse
Post quantum
RLWE
Secure Multi-Party Computation: Theory, practice and applications
期刊论文
INFORMATION SCIENCES, 2019, 卷号: 476, 页码: 357-372
作者:
Zhao, Chuan
;
Zhao, Shengnan
;
Zhao, Minghao
;
Chen, Zhenxiang
;
Gao, Chong-Zhi
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2019/12/11
Secure Multi-Party Computation
Generic protocol
Cloud security
Secure
outsourcing
Privacy-preserving technology
A provably-secure two-factor authenticated key exchange protocol with stronger anonymity
期刊论文
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2018, 卷号: 11058 LNCS, 页码: 111-124
作者:
Yang, Xiaoyan
;
Jiang, Han
;
Hou, Mengbo
;
Zheng, Zhihua
;
Xu, Qiuliang
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/12/11
Anonymous authentication
Authenticated key exchange
Two-factor authentication
Lattice-based universal accumulator with nonmembership arguments
期刊论文
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2018, 卷号: 10946 LNCS, 页码: 502-519
作者:
Yu, Zuoxia
;
Au, Man Ho
;
Yang, Rupeng
;
Lai, Junzuo
;
Xu, Qiuliang
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/12/11
Abstract stern-like protocol
Lattice-based universal accumulator
Zero-knowledge arguments of nonmembership
Evaluation of Flexilink as Deterministic Unified Real-Time Protocol for Industrial Networks
期刊论文
Proceedings - 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications and 12th IEEE International Conference on Big Data Science and Engineering, Trustcom/BigDataSE 2018, 2018, 页码: 22-27
作者:
Ma, Tianao
;
Hu, Wei
;
Wang, Yonghao
;
El-Banna, Dalia
;
Grant, John
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2019/12/11
band width allocation
protocols
QoS
real-time transmission
Framework and applications of WAMS light communication system
期刊论文
2017 IEEE Conference on Energy Internet and Energy System Integration, EI2 2017 - Proceedings, 2018, 卷号: 2018-January, 页码: 1-6
作者:
Cao, Benqing
;
Ochani, Manesh Kumar
;
Zhang, Hengxu
;
Xie, Wei
;
Liu, Jinsong
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/11
communication mode
communication protocol
communication security
distribution network
Synchronous phasor measurement unit light (PMU Light)
wide-area measurement system light (WAMS Light)
Distributed Aggregate Privacy-Preserving Authentication in VANETs
期刊论文
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2017, 卷号: 18, 期号: 3, 页码: 516-526
作者:
Zhang, Lei
;
Wu, Qianhong
;
Domingo-Ferrer, Josep
;
Qin, Bo
;
Hu, Chuanyan
收藏
  |  
浏览/下载:13/0
  |  
提交时间:2019/12/11
Data compression
privacy
protocol design
security
vehicular ad hoc
networks (VANETs)
k-out-of-n Oblivious transfer protocol with security against malicious adversaries
期刊论文
COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2017, 卷号: 32, 期号: 2, 页码: 81-91
作者:
Wei, Xiaochao
;
Xu, Qiuliang
;
Tang, Yi
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2019/12/12
k-out-of-n oblivious transfer
full simulation
proof of partial
knowledge
dual-mode cryptosystem
Decisional Diffie-Hellman assumption
Framework and Applications of WAMS Light Communication System
会议论文
IEEE Conference on Energy Internet and Energy System Integration (EI2), NOV 26-28, 2017
作者:
Cao, Benqing
;
Ochani, Manesh Kumar
;
Zhang, Hengxu
;
Xie, Wei
;
Liu, Jinsong
收藏
  |  
浏览/下载:6/0
  |  
提交时间:2019/12/31
Synchronous phasor measurement unit light (PMU Light)
wide-area
measurement system light (WAMS Light)
distribution network
communication mode
communication protocol
communication security
©版权所有 ©2017 CSpace - Powered by
CSpace