×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
兰州理工大学 [27]
内容类型
期刊论文 [20]
会议论文 [7]
发表日期
2021 [3]
2020 [4]
2019 [1]
2018 [2]
2017 [1]
2016 [3]
更多...
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共27条,第1-10条
帮助
限定条件
专题:兰州理工大学
第一署名单位
第一作者单位
通讯作者单位
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Security and Efficient Authentication Scheme for Mobile Edge Computing
期刊论文
Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications, 2021, 卷号: 44, 期号: 1, 页码: 110-116
作者:
Xue, Jian-Bin
;
Bai, Zi-Mei
收藏
  |  
浏览/下载:12/0
  |  
提交时间:2021/06/03
Authentication
Computer terminals
Cryptography
Edge computing
Mobile telecommunication systems
Security systems
Authentication scheme
Computing environments
Efficient authentication
Lightweight identity authentication protocol
Man in the middle attacks
Mutual authentication
Physical layer security
Symmetric crypto systems
Group signature with time-bound keys and unforgeability of expiry time for smart cities
期刊论文
EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2021, 卷号: 2021, 期号: 1
作者:
Fang, Junli
;
Feng, Tao
收藏
  |  
浏览/下载:12/0
  |  
提交时间:2021/06/03
Group signatures
Unforgeability of expiry time
Time-bound keys
Internet of things
Smart cities
Cross-domain single sign-on authentication of information security in network environment
期刊论文
International Journal of Information and Communication Technology, 2021, 卷号: 18, 期号: 1, 页码: 89-104
作者:
Cui, A-Jun
;
Wang, Wei
;
Zhang, Hua-Feng
;
Ma, Yan-Hong
;
Li, Chen
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2021/03/02
Authentication
Authentication methods
Authentication scheme
Data packet loss rate
Efficient interaction
Identity providers
Information integrity
Revocation scheme
Service provider
An efficient retrieval approach for encrypted speech based on biological hashing and spectral subtraction
期刊论文
Multimedia Tools and Applications, 2020, 卷号: 79, 期号: 39-40, 页码: 29775-29798
作者:
Zhang, Qiu-yu
;
Li, Gai-li
;
Huang, Yi-bo
收藏
  |  
浏览/下载:14/0
  |  
提交时间:2020/11/14
Authentication
Conformal mapping
Cryptography
Discrete wavelet transforms
Efficiency
Fast Fourier transforms
Hamming distance
Photomapping
Signal reconstruction
Speech
Speech communication
Autocorrelation functions
Distance algorithm
Encrypted speech
Integrity authentications
Mapping algorithms
Retrieval efficiency
Spectral subtractions
Strong robustness
One-Stop Efficient PKI Authentication Service Model Based on Blockchain
会议论文
Chengdu, China, October 11, 2019 - October 13, 2019
作者:
Feng, Tao
;
Chen, Wuyang
;
Zhang, Di
;
Liu, Chunyan
收藏
  |  
浏览/下载:12/0
  |  
提交时间:2020/11/15
Blockchain
Public key cryptography
Authentication services
Batch update
Dynamic accumulators
Identity authentication
Public key infrastructure technologies
Storage overhead
Third-party service providers
User authentication
An encrypted speech authentication method based on uniform subband spectrum variance and perceptual hashing
期刊论文
TURKISH JOURNAL OF ELECTRICAL ENGINEERING AND COMPUTER SCIENCES, 2020, 卷号: 28, 期号: 5, 页码: 2467-2482
作者:
Zhang, Qiuyu
;
Zhang, Denghai
;
Zhou, Liang
收藏
  |  
浏览/下载:20/0
  |  
提交时间:2022/03/01
Encrypted speech authentication
perceptual hashing
uniform subband spectrum variance
feature extraction of encrypted speech
tamper location
An encrypted speech authentication method based on uniform subband spectrum variance and perceptual hashing
期刊论文
Turkish Journal of Electrical Engineering and Computer Sciences, 2020, 卷号: 28, 期号: 5, 页码: 2467-2482
作者:
Zhang, Qiuyu
;
Zhang, Denghai
;
Zhou, Liang
收藏
  |  
浏览/下载:12/0
  |  
提交时间:2022/02/18
Authentication
Cloud computing
Cryptography
Hamming distance
Privacy by design
An efficient and anonymous KP-ABE scheme with keyword search
会议论文
Kowloon, Hong kong, June 25, 2018 - June 27, 2018
作者:
Feng, Tao
;
Yin, Xiaoyu
;
Liu, Chunyan
收藏
  |  
浏览/下载:11/0
  |  
提交时间:2020/11/15
Search engines
Approximate greatest common divisors
Cloud storage systems
Cloud storages
Ho-momorphic encryptions
Identity authentication
KP-ABE
PEKS
Privacy preserving
An efficient perceptual hashing based on improved spectral entropy for speech authentication
期刊论文
MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 卷号: 77, 期号: 2, 页码: 1555-1581
作者:
Zhang, Qiu-yu
;
Hu, Wen-jin
;
Huang, Yi-bo
;
Qiao, Si-bin
收藏
  |  
浏览/下载:9/0
  |  
提交时间:2019/11/15
Speech authentication
Perceptual hashing
Improved spectral entropy
Linear prediction-minimummean squared error (LP-MMSE)
Teager energy operator
Sub-band spectral line
An efficient speech perceptual hashing authentication algorithm based on DWT and symmetric ternary string
期刊论文
International Journal of Information and Communication Technology, 2018, 卷号: 12, 期号: 1-2, 页码: 31-50
作者:
Qiuyu, Zhang
;
Pengfei, Xing
;
Yibo, Huang
;
Ruihong, Dong
;
Zhongping, Yang
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2020/11/14
Authentication
Discrete wavelet transforms
Frequency domain analysis
Signal reconstruction
Speech
Speech communication
Time domain analysis
Wavelet decomposition
Authentication algorithm
Coefficients of low frequencies
Frequency domains
Localisation
Mobile computing environment
Perceptual hashing
Short-time energy
Symmetric ternary string
©版权所有 ©2017 CSpace - Powered by
CSpace