×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
北京大学 [48]
内容类型
其他 [27]
期刊论文 [21]
发表日期
2016 [5]
2015 [8]
2014 [6]
2013 [7]
2012 [6]
2011 [5]
更多...
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共48条,第1-10条
帮助
限定条件
专题:北京大学
第一署名单位
第一作者单位
通讯作者单位
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
The Request for Better Measurement: A Comparative Evaluation of Two-Factor Authentication Schemes
其他
2016-01-01
Wang, Ding
;
Gu, Qianchen
;
Cheng, Haibo
;
Wang, Ping
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2017/12/03
Two-factor authentication
Smart card loss attack
Two-factor security
De-synchronization attack
Measurement
MEDICINE INFORMATION-SYSTEMS
SMART-CARDS
PASSWORD AUTHENTICATION
USER AUTHENTICATION
ROBUST
PROTOCOL
ANONYMITY
NETWORKS
Targeted Online Password Guessing: An Underestimated Threat
其他
2016-01-01
Wang, Ding
;
Zhang, Zijian
;
Wang, Ping
;
Yan, Jeff
;
Huang, Xinyi
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2017/12/03
Password authentication
Targeted online guessing
Personal information
Password reuse
Probabilistic model
A Novel PUF based on Cell Error Rate Distribution of STT-RAM
其他
2016-01-01
Zhang, Xian
;
Sun, Guangyu
;
Zhang, Yaojun
;
Chen, Yiran
;
Li, Hai
;
Wen, Wujie
;
Di, Jia
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2017/12/03
MEMORY
On the Implications of Zipf's Law in Passwords
其他
2016-01-01
Wang, Ding
;
Wang, Ping
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2017/12/03
AUTHENTICATION
EFFICIENT
Delegation of signing rights for emerging 5G networks
期刊论文
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2016
Ge, Yongyong
;
Li, Yannan
;
Liu, Zhusong
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2017/12/03
5G
network security
digital signature
proxy signature
chameleon hash
PROXY SIGNATURE SCHEME
DESIGNATED VERIFIER SIGNATURE
RANDOM ORACLES
SECURE
HASH
FACTORIZATION
POWER
Efficient color image reversible data hiding based on channel-dependent payload partition and adaptive embedding
期刊论文
signal processing, 2015
Ou, Bo
;
Li, Xiaolong
;
Zhao, Yao
;
Ni, Rongrong
收藏
  |  
浏览/下载:1/0
  |  
提交时间:2015/11/11
Reversible data hiding
Color image
Payload partition
Adaptive embedding
PREDICTION-ERROR EXPANSION
GENERALIZED INTEGER TRANSFORM
HISTOGRAM-MODIFICATION
DIFFERENCE EXPANSION
PIXEL DIFFERENCES
WATERMARKING
SCHEME
AUTHENTICATION
FRAMEWORK
Preserving privacy for free: Efficient and provably secure two-factor authentication scheme with user anonymity
期刊论文
INFORMATION SCIENCES, 2015
Wang, Ding
;
Wang, Nan
;
Wang, Ping
;
Qing, Sihan
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2017/12/03
Password authentication
User anonymity
De-synchronization
Random oracle model
WIRELESS SENSOR NETWORKS
KEY AGREEMENT PROTOCOL
SMART-CARDS
PASSWORD AUTHENTICATION
MUTUAL AUTHENTICATION
MOBILE NETWORKS
ROBUST
EXCHANGE
ENHANCEMENT
CRYPTANALYSIS
Efficient Reversible Data Hiding Based on Multiple Histograms Modification
期刊论文
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015
Li, Xiaolong
;
Zhang, Weiming
;
Gui, Xinlu
;
Yang, Bin
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2017/12/03
Reversible data hiding
prediction-error expansion
multiple histograms modification
adaptive embedding
GENERALIZED INTEGER TRANSFORM
DIFFERENCE EXPANSION
IMAGE WATERMARKING
PREDICTION ERRORS
AUTHENTICATION
SCHEME
Efficient bit sifting scheme of post-processing in quantum key distribution
期刊论文
QUANTUM INFORMATION PROCESSING, 2015
Li, Qiong
;
Le, Dan
;
Wu, Xianyan
;
Niu, Xiamu
;
Guo, Hong
收藏
  |  
浏览/下载:6/0
  |  
提交时间:2017/12/03
Quantum cryptography
Quantum key distribution
Post-processing
Bit sifting
Source coding
Unconditionally secure authentication
Net secure key rate
HASH FUNCTIONS
Anonymous Two-Factor Authentication in Distributed Systems: Certain Goals Are Beyond Attainment
期刊论文
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2015
Wang, Ding
;
He, Debiao
;
Wang, Ping
;
Chu, Chao-Hsien
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2017/12/03
Two-factor authentication
user anonymity
offline dictionary attack
de-synchronization attack
smart card loss attack
SMART-CARDS
PASSWORD AUTHENTICATION
SECURITY ANALYSIS
USER ANONYMITY
SCHEME
ATTACKS
KEY
EFFICIENT
NETWORKS
PROTOCOLS
©版权所有 ©2017 CSpace - Powered by
CSpace