×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
兰州理工大学 [19]
内容类型
会议论文 [19]
发表日期
2019 [1]
2016 [2]
2014 [1]
2013 [2]
2012 [4]
2011 [3]
更多...
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共19条,第1-10条
帮助
限定条件
内容类型:会议论文
专题:兰州理工大学
第一署名单位
第一作者单位
通讯作者单位
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
An efficient and anonymous KP-ABE scheme with keyword search
会议论文
Kowloon, Hong kong, June 25, 2018 - June 27, 2018
作者:
Feng, Tao
;
Yin, Xiaoyu
;
Liu, Chunyan
收藏
  |  
浏览/下载:11/0
  |  
提交时间:2020/11/15
Search engines
Approximate greatest common divisors
Cloud storage systems
Cloud storages
Ho-momorphic encryptions
Identity authentication
KP-ABE
PEKS
Privacy preserving
Research on Universal Model of Speech Perceptual Hashing Authentication System in Mobile Environment
会议论文
作者:
Zhang, Qiu-Yu
;
Hu, Wen-Jin
;
Huang, Yi-Bo
;
Qiao, Si-Bin
收藏
  |  
浏览/下载:6/0
  |  
提交时间:2019/11/15
Mobile computing environment
Multimedia information security
Speech authentication
Perceptual hashing
Perception feature extraction
Tamper detection
Research on universal model of speech perceptual hashing authentication system in mobile environment
会议论文
Lanzhou, China, August 2, 2016 - August 5, 2016
作者:
Zhang, Qiu-Yu
;
Hu, Wen-Jin
;
Huang, Yi-Bo
;
Qiao, Si-Bin
收藏
  |  
浏览/下载:10/0
  |  
提交时间:2020/11/15
Audio signal processing
Authentication
Computation theory
Feature extraction
Hash functions
Intelligent computing
Mobile computing
Speech
Speech communication
Authentication algorithm
Authentication systems
Mobile computing environment
Multimedia information
Perceptual hashing
Speech signal processing
Tamper detection
Theoretical foundations
An advanced ECC dynamic password-based remote authentication scheme for cloud computing
会议论文
作者:
Cao, Lai-Cheng
;
Han, Wei
收藏
  |  
浏览/下载:11/0
  |  
提交时间:2020/11/15
Cloud computing
Data processing
Personal computing
Elliptic Curve Cryptosystem
Identity management
Legitimate users
Mutual authentication
One-time passwords
Password changes
Password-based authentication
Remote authentication
Application research of two-dimensional barcode in information construction of colleges
会议论文
Beijing, China, December 8, 2012 - December 10, 2012
作者:
Yan, Yan
;
Li, Qifeng
;
Cao, Minghua
;
Chen, Haiyan
;
Xue, Jianbin
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2020/11/15
Bar codes
Digital libraries
Digital storage
Software engineering
Application method
Application research
Application scheme
Electronic admission certificate
Identity authentication
Information construction
Library management
Two-dimensional barcode
A Dependable Authentication Scheme Based Protecting Private Key in the Internet of Things
会议论文
作者:
Cao Lai-Cheng
;
Zhang Ming-Ming
;
Du Hong-Lin
;
Ru Qi
;
Li Xiao-Min
收藏
  |  
浏览/下载:20/0
  |  
提交时间:2019/11/15
Internet of Things
The private key
Certificate Authority Server
Fault-tolerant
The Image Process Technology in Fingerprint Identification
会议论文
作者:
Chen, HaiYan
;
Hui, Ling
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/11/15
Fingerprint identification
image preprocessing
characteristics match
Anonymous identity authentication scheme in wireless roaming communication
会议论文
Seoul, Korea, Republic of, April 24, 2012 - April 26, 2012
作者:
Feng, Tao
;
Zhou, Wenying
;
Li, Xinghua
收藏
  |  
浏览/下载:23/0
  |  
提交时间:2020/11/15
Information management
Anonymous authentication
Identity authentication
Mobile users
Mutual anonymity
Secure authentications
Security model
Selfcertified public key
Universally composable
The image process technology in fingerprint identification
会议论文
Singapore, Singapore, September 16, 2011 - September 18, 2011
作者:
Chen, Hai Yan
;
Hui, Ling
收藏
  |  
浏览/下载:0/0
  |  
提交时间:2020/11/15
Algorithms
Anthropometry
Biometrics
Image matching
Information technology
Materials science
Authentication methods
Biometric identifications
Characteristics match
Fingerprint identification
Fingerprint images
Image preprocessing
Image process
Social life
Secure re-authentication scheme for 3G-WLAN integrating network based on protocol composition logic
会议论文
Nanjing, China, August 11, 2012 - August 13, 2012
作者:
Feng, Tao
;
Chen, Hui
;
Ma, Jian-Feng
收藏
  |  
浏览/下载:12/0
  |  
提交时间:2020/11/15
Authentication
Internet protocols
Mobile security
Wireless local area networks (WLAN)
3G-WLAN
Authentication algorithm
EAP-AKA
Integrating networks
Parallel composition
Protocol composition logic
Re authentications
Re-authentication protocols
©版权所有 ©2017 CSpace - Powered by
CSpace