×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
软件研究所 [160]
清华大学 [108]
北京大学 [99]
武汉大学 [85]
山东大学 [83]
兰州理工大学 [48]
更多...
内容类型
期刊论文 [590]
会议论文 [292]
学位论文 [67]
其他 [60]
专利 [3]
专著章节/文集论文 [1]
更多...
发表日期
2022 [4]
2021 [13]
2020 [12]
2019 [26]
2018 [39]
2017 [40]
更多...
学科主题
Computer ... [19]
Informatio... [7]
Engineerin... [6]
Telecommun... [5]
原子分子物理学 [3]
Computer S... [2]
更多...
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共1014条,第1-10条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Certified random-number generation from quantum steering
期刊论文
PHYSICAL REVIEW A, 2022, 卷号: 106, 期号: 5, 页码: 6
作者:
Joch, Dominick J.
;
Slussarenko, Sergei
;
Wang, Yuanlong
;
Pepper, Alex
;
Xie, Shouyi
收藏
  |  
浏览/下载:11/0
  |  
提交时间:2023/02/07
An Anonymous Authentication and Key Update Mechanism for IoT Devices Based on EnOcean Protocol
期刊论文
SENSORS, 2022, 卷号: 22, 期号: 17
作者:
Wu, Yi
;
Feng, Tao
收藏
  |  
浏览/下载:19/0
  |  
提交时间:2022/09/22
smart lighting control
EnOcean protocol
colored Petri net
Dolev-Yao attacker model
Distributed storage scheme for encryption speech data based on blockchain and IPFS
期刊论文
Journal of Supercomputing, 2022
作者:
Zhang, Qiuyu
;
Zhao, Zhenyu
收藏
  |  
浏览/下载:12/0
  |  
提交时间:2022/08/09
Access control
Blockchain
Cloud storage
Computer operating systems
Cryptography
Ethereum
File organization
Quality control
Sensitive data
Speech
Attribute-based encryptions
Block-chain
Ciphertext policies
Ciphertext policy hierarchical attribute-based encryption
Distributed storage
Filesystem
Hierarchical attributes
Interplanetary file system
Speech data
Storage schemes
Privacy-Preserving Publicly Verifiable Databases
期刊论文
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 卷号: 19, 期号: 3, 页码: 1639-1654
作者:
Wang Q(王强)
;
Zhou FC(周福才)
;
Zhou BY(周搏洋)
;
Xu J(徐剑)
;
Chen CY(陈春雨)
收藏
  |  
浏览/下载:18/0
  |  
提交时间:2022/05/29
Cloud computing
Encryption
Protocols
Indexes
Verifiable databases
privacy-preserving
publicly verifiable
cloud computing
Formal modeling and security analysis method of security protocol based on CPN
期刊论文
Tongxin Xuebao/Journal on Communications, 2021, 卷号: 42, 期号: 9, 页码: 240-253
作者:
Gong, Xiang
;
Feng, Tao
;
Du, Jinze
收藏
  |  
浏览/下载:8/0
  |  
提交时间:2022/02/17
Analysis method
Attack path
Colored Petri Nets
Formal analysis
Formal modeling
Formal security
Modeling analyzes
Security analysis
Security protocols
State-space
Performance Modeling Analysis of D-MSMR-CARQ with Relay Selection in Wireless Sensor Networks
期刊论文
SECURITY AND COMMUNICATION NETWORKS, 2021, 卷号: 2021
作者:
Zhou, Yongqiang
;
Qian, Huan
;
Wang, Qihao
;
Li, Suoping
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2021/10/14
BCP-based joint delegation learning model and protocol
期刊论文
Tongxin Xuebao/Journal on Communications, 2021, 卷号: 42, 期号: 5, 页码: 137-148
作者:
Gao, Sheng
;
Xiang, Kang
;
Tian, Youliang
;
Tan, Weijie
;
Feng, Tao
收藏
  |  
浏览/下载:10/0
  |  
提交时间:2022/02/17
Crime
Cryptography
Data mining
Decision trees
Privacy by design
Random forests
Data mining process
Decision tree modeling
Entropy algorithms
Ho-momorphic encryptions
Horizontal distribution
Model construction
Performance analysis
Privacy protection
工业通信协议的信息安全技术研究与开发
学位论文
沈阳: 中国科学院沈阳自动化研究所, 2021
作者:
王靖然
收藏
  |  
浏览/下载:25/0
  |  
提交时间:2021/06/12
工业控制网络
信息安全
身份认证
数据完整性检验
数据保密性
LOPE: A Low-Overhead Payment Verification Method for Blockchains
期刊论文
CHINESE JOURNAL OF ELECTRONICS, 2021, 卷号: 30, 期号: 2, 页码: 349-358
作者:
Ying Zhang
;
Zhengyuan He
;
Linpeng Jia
;
Donghui Ding
;
Hanwen Zhang
收藏
  |  
浏览/下载:16/0
  |  
提交时间:2021/12/01
Blockchain
Light client
Low‐
overhead
Payment verification
Security and Efficient Authentication Scheme for Mobile Edge Computing
期刊论文
Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications, 2021, 卷号: 44, 期号: 1, 页码: 110-116
作者:
Xue, Jian-Bin
;
Bai, Zi-Mei
收藏
  |  
浏览/下载:11/0
  |  
提交时间:2021/06/03
Authentication
Computer terminals
Cryptography
Edge computing
Mobile telecommunication systems
Security systems
Authentication scheme
Computing environments
Efficient authentication
Lightweight identity authentication protocol
Man in the middle attacks
Mutual authentication
Physical layer security
Symmetric crypto systems
©版权所有 ©2017 CSpace - Powered by
CSpace