CORC

浏览/检索结果: 共183条,第1-10条 帮助

已选(0)清除 条数/页:   排序方式:
A retrieval method for encrypted speech based on improved power normalized cepstrum coefficients and perceptual hashing 期刊论文
Multimedia Tools and Applications, 2022, 卷号: 81, 期号: 11, 页码: 15127-15151
作者:  Zhang, Qiu-yu;  Bai, Jian;  Xu, Fu-jiu
收藏  |  浏览/下载:19/0  |  提交时间:2022/06/20
Speech BioHashing security authentication algorithm based on CNN hyperchaotic map 期刊论文
Multimedia Tools and Applications, 2022
作者:  Huang, Yi-bo;  Yuan-Zhang;  Chen, Teng-Fei;  Yan, Shao-Hui;  Zhang, Qiu-yu
收藏  |  浏览/下载:20/0  |  提交时间:2022/07/20
Encrypted speech perceptual hashing authentication algorithm based on improved 2D-Henon encryption and harmonic product spectrum 期刊论文
MULTIMEDIA TOOLS AND APPLICATIONS, 2022, 卷号: 81, 期号: 18, 页码: 25829-25852
作者:  Huang, Yi-bo;  Chen, Teng-fei;  Zhang, Qiu-yu;  Zhang, Yuan;  Yan, Shao-hui
收藏  |  浏览/下载:18/0  |  提交时间:2022/04/21
TRUSTED MEASUREMENT AND CONTROL NETWORK AUTHENTICATION METHOD BASED ON DOUBLE CRYPTOGRAPHIC VALUES AND CHAOTIC ENCRYPTION 专利
申请日期: 2021-11-25,
作者:  Shang WL(尚文利);  Zeng P(曾鹏);  Yin L(尹隆);  Chen CY(陈春雨);  Zhao JM(赵剑明)
收藏  |  浏览/下载:103/0  |  提交时间:2022/01/02
Blockchain-Enhanced Data Sharing With Traceable and Direct Revocation in IIoT 期刊论文
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2021, 卷号: 17, 期号: 11, 页码: 7669-7678
作者:  Yu, Keping;  Tan, Liang;  Aloqaily, Moayad;  Yang, Hekun;  Jararweh, Yaser
收藏  |  浏览/下载:21/0  |  提交时间:2021/12/01
IoT Data Privacy Protection Scheme based on Blockchain 期刊论文
IOP Conference Series: Earth and Environmental Science, 2021, 卷号: 769
作者:  Wu,Yue;  Song,Liangtu;  Liu,Lei;  Wang,Qijin
收藏  |  浏览/下载:12/0  |  提交时间:2021/06/21
Enhancing the security of memory in cloud infrastructure through in-phase change memory data randomisation 期刊论文
IET COMPUTERS AND DIGITAL TECHNIQUES, 2021, 页码: 14
作者:  Zhou, Xianzhong;  Wang, Ying
收藏  |  浏览/下载:19/0  |  提交时间:2021/12/01
Secure Data Exchange in M-Learning Platform using Adaptive Tunicate Slime-Mold-Based Hybrid Optimal Elliptic Curve Cryptography 期刊论文
APPLIED SCIENCES-BASEL, 2021, 卷号: 11, 期号: 12, 页码: 1-21
作者:  Aldabbagh, G (Aldabbagh, Ghadah)[ 1 ];  Alghazzawi, DM (Alghazzawi, Daniyal M.)[ 1 ];  Hasan, SH (Hasan, Syed Hamid)[ 1 ];  Alhaddad, M (Alhaddad, Mohammed)[ 1 ];  Malibari, A (Malibari, Areej)[ 1 ]
收藏  |  浏览/下载:26/0  |  提交时间:2021/07/14
A Novel Compressive Image Encryption with an Improved 2D Coupled Map Lattice Model 期刊论文
SECURITY AND COMMUNICATION NETWORKS, 2021, 卷号: 2021
作者:  Liu, Zhuo;  Wang, Yong;  Zhang, Leo Yu;  Ma, Jun
收藏  |  浏览/下载:4/0  |  提交时间:2021/06/03
TRUSTED AUTHENTICATION METHOD EMPLOYING TWO CRYPTOGRAPHIC VALUES AND CHAOTIC ENCRYPTION IN MEASUREMENT AND CONTROL NETWORK [EN] 专利
申请日期: 2020-05-07,
作者:  Shang WL(尚文利);  Zeng P(曾鹏);  Yin L(尹隆);  Chen CY(陈春雨);  Zhao JM(赵剑明)
收藏  |  浏览/下载:19/0  |  提交时间:2020/07/04


©版权所有 ©2017 CSpace - Powered by CSpace