×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
武汉大学 [46]
兰州理工大学 [25]
软件研究所 [20]
西安交通大学 [18]
厦门大学 [16]
北京大学 [16]
更多...
内容类型
期刊论文 [133]
会议论文 [81]
学位论文 [20]
其他 [11]
会议 [3]
发表日期
2022 [1]
2021 [3]
2020 [1]
2019 [11]
2018 [24]
2017 [16]
更多...
学科主题
Computer S... [1]
Computer S... [1]
Engineerin... [1]
Telecommun... [1]
Telecommun... [1]
computer s... [1]
更多...
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共248条,第1-10条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
System Error Calibration in Large Datasets of Wireless Channel Sounding for Industrial Applications
期刊论文
IEEE Journal of Emerging and Selected Topics in Industrial Electronics, 2022, 卷号: 3, 期号: 1, 页码: 113-123
作者:
Wang Q(王琪)
;
Candell, Richard
;
Liang W(梁炜)
;
Pang ZB(庞智博)
收藏
  |  
浏览/下载:24/0
  |  
提交时间:2022/01/27
Channel impulse response (CIR) calibration
National Institute of Standards and Technology (NIST) dataset
physical layer authentication
synchronization
wireless channel sounding
Energy-efficient Collaborative Sensing: Learning the Latent Correlations of Heterogeneous Sensors
期刊论文
ACM TRANSACTIONS ON SENSOR NETWORKS, 2021, 卷号: 17, 期号: 3, 页码: 28
作者:
Liang, Yunji
;
Wang, Xin
;
Yu, Zhiwen
;
Guo, Bin
;
Zheng, Xiaolong
收藏
  |  
浏览/下载:12/0
  |  
提交时间:2022/06/10
Energy efficiency
latent correlation learning
collaboration sensing
internet of things
temporal convolutional network
attention mechanism
multi-task learning
Security and Efficient Authentication Scheme for Mobile Edge Computing
期刊论文
Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications, 2021, 卷号: 44, 期号: 1, 页码: 110-116
作者:
Xue, Jian-Bin
;
Bai, Zi-Mei
收藏
  |  
浏览/下载:11/0
  |  
提交时间:2021/06/03
Authentication
Computer terminals
Cryptography
Edge computing
Mobile telecommunication systems
Security systems
Authentication scheme
Computing environments
Efficient authentication
Lightweight identity authentication protocol
Man in the middle attacks
Mutual authentication
Physical layer security
Symmetric crypto systems
Secure Data Exchange in M-Learning Platform using Adaptive Tunicate Slime-Mold-Based Hybrid Optimal Elliptic Curve Cryptography
期刊论文
APPLIED SCIENCES-BASEL, 2021, 卷号: 11, 期号: 12, 页码: 1-21
作者:
Aldabbagh, G (Aldabbagh, Ghadah)[ 1 ]
;
Alghazzawi, DM (Alghazzawi, Daniyal M.)[ 1 ]
;
Hasan, SH (Hasan, Syed Hamid)[ 1 ]
;
Alhaddad, M (Alhaddad, Mohammed)[ 1 ]
;
Malibari, A (Malibari, Areej)[ 1 ]
收藏
  |  
浏览/下载:26/0
  |  
提交时间:2021/07/14
mobile learningcloud storagehybrid optical elliptic curve cryptographyadaptive tunicate slime moldencryptiondecryptionsecurity
A Behavioral Authentication Method for Mobile Based on Browsing Behaviors
期刊论文
IEEE/CAA Journal of Automatica Sinica, 2020, 卷号: 7, 期号: 6, 页码: 1528-1541
作者:
Dongxiang Chen
;
Zhijun Ding
;
Chungang Yan
;
Mimi Wang
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2021/03/11
Behavioral authentication
browsing behaviors
mobile device
multiple factors
LAMANCO: A Lightweight Anonymous Mutual Authentication Scheme for N-Times Computing Offloading in IoT
期刊论文
IEEE INTERNET OF THINGS JOURNAL, 2019, 卷号: 6, 期号: 3, 页码: 4462-4471
作者:
Guizani, Mohsen
;
Du, Xiaojiang
;
Zhu, Liehuang
;
Xu, Yongjun
;
Wang, Fei
收藏
  |  
浏览/下载:49/0
  |  
提交时间:2019/08/16
Authentication
computing offloading (CO)
Internet of Things (IoT)
privacy preserving
基于 TPM 2.0 的协议设计与分析研究
学位论文
博士, 北京: 中国科学院研究生院, 2019
作者:
王微谨
收藏
  |  
浏览/下载:192/0
  |  
提交时间:2019/07/03
可信计算
TPM 2.0
API 分析
形式化方法
匿名认证协议
Flexible and Efficient Authenticated Key Agreement Scheme for BANs Based on Physiological Features
期刊论文
IEEE Transactions on Mobile Computing, 2019, 卷号: 18, 期号: 4, 页码: 845-856
作者:
Tang, Wenjuan
;
Zhang, Kuan
;
Ren, Ju*
;
Zhang, Yaoxue
;
Shen, Xuemin
收藏
  |  
浏览/下载:16/0
  |  
提交时间:2019/12/03
Key agreement
privacy
authentication
physiological features
BANs
e-healthcare
Secure Key Agreement and Key Protection for Mobile Device User Authentication
期刊论文
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 卷号: 14, 期号: 2
作者:
Wu, Libing
;
Wang, Jing
;
Choo, Kim-Kwang Raymond
;
He, Debiao
收藏
  |  
浏览/下载:19/0
  |  
提交时间:2019/12/05
Authentication
two-party
mobile
anonymity
Fingerprint authentication based on fuzzy extractor in the mobile device
期刊论文
International Journal of Electronic Security and Digital Forensics, 2019, 卷号: 11, 期号: 3
作者:
Li, Li
;
Zhou, Siqin
;
Tu, Hang
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/05
©版权所有 ©2017 CSpace - Powered by
CSpace