×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
软件研究所 [8]
兰州理工大学 [6]
北京大学 [5]
大连理工大学 [5]
山东大学 [5]
厦门大学 [3]
更多...
内容类型
期刊论文 [35]
会议论文 [14]
其他 [7]
学位论文 [4]
发表日期
2024 [1]
2022 [1]
2021 [2]
2019 [5]
2018 [5]
2017 [3]
更多...
学科主题
计算机科学技术基础学... [1]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共60条,第1-10条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Quantization and Event-Triggered Policy Design for Encrypted Networked Control
期刊论文
IEEE/CAA Journal of Automatica Sinica, 2024, 卷号: 11, 期号: 4, 页码: 946-955
作者:
Yongxia Shi
;
Ehsan Nekouei
收藏
  |  
浏览/下载:0/0
  |  
提交时间:2024/03/18
Cyber-security
encrypted control
event-triggered control (ETC)
networked control systems (NCSs)
semi-homomorphic encryption
Speech BioHashing security authentication algorithm based on CNN hyperchaotic map
期刊论文
Multimedia Tools and Applications, 2022
作者:
Huang, Yi-bo
;
Yuan-Zhang
;
Chen, Teng-Fei
;
Yan, Shao-Hui
;
Zhang, Qiu-yu
收藏
  |  
浏览/下载:20/0
  |  
提交时间:2022/07/20
Authentication
Cryptography
Speech recognition
BioHashing
Biosafety template
CNN hyperchaotic map
Content authentication
Hyperchaotic maps
Security authentication
Speech content
Speech content authentication
Tamper detection
Tamper detection and location
Blockchain Data Privacy Access Control Based on Searchable Attribute Encryption
期刊论文
CMC-COMPUTERS MATERIALS & CONTINUA, 2021, 卷号: 66, 期号: 1, 页码: 871-884
作者:
Feng, Tao
;
Pei, Hongmei
;
Ma, Rong
;
Tian, Youliang
;
Feng, Xiaoqin
收藏
  |  
浏览/下载:13/0
  |  
提交时间:2021/03/12
Blockchain
privacy protection
attribute encryption
access control
searchable-encryption
Blockchain data privacy access control based on searchable attribute encryption
期刊论文
Computers, Materials and Continua, 2021, 卷号: 66, 期号: 1, 页码: 871-884
作者:
Feng, Tao
;
Pei, Hongmei
;
Ma, Rong
;
Tian, Youliang
;
Feng, Xiaoqin
收藏
  |  
浏览/下载:12/0
  |  
提交时间:2020/12/18
Access control
Blockchain
Predictive analytics
Privacy by designAccess structure
Authorized users
Data privacy protections
Exposure problem
Hierarchical attributes
Prediction model
Searchable encryptions
Transaction information
A Fast and Simple Method for Obtaining Microcircuit Card Information
会议论文
Chongqing, China, October 11, 2019 - October 13, 2019
作者:
Yuan, Hui
;
Chang, Sheng
;
Zhao, Jinxiong
;
Zhao, Bo
;
Xie, Xiaodi
收藏
  |  
浏览/下载:1/0
  |  
提交时间:2020/11/15
Cryptography
Information management
Number theory
Shift registers
Encryption algorithms
Experimental methods
Linear feedback shift registers
microcircuit card
Nonlinear functions
PRNG
Pseudo random number generators
Random sequence
Linear space-variant optical cryptosystem via Fourier ptychography
期刊论文
OPTICS LETTERS, 2019, 卷号: 44, 期号: 8, 页码: 2032-2035
作者:
Pan, An
;
Wen, Kai
;
Yao, Baoli
收藏
  |  
浏览/下载:38/0
  |  
提交时间:2019/05/15
Linear space-variant optical cryptosystem via Fourier ptychography
会议论文
San Francisco, CA, United states, 2019-02-02
作者:
Pan, An
;
Wen, Kai
;
Yao, Baoli
收藏
  |  
浏览/下载:43/0
  |  
提交时间:2019/07/08
Fourier optics and signal processing
Computational imaging
Pattern recognition
optical security and encryption
Fourier ptychography
Image encryption based on the combination of roulette wheel selection with linear congruence pixel transformation
期刊论文
MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 卷号: 78, 页码: 10625-10647
作者:
Cao, Guanghui
;
Wang, Xingyuan
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2019/12/02
Chaotic system
Roulette wheel selection
Linear congruence
Linear congruence transformation
An efficient and anonymous KP-ABE scheme with keyword search
会议论文
Kowloon, Hong kong, June 25, 2018 - June 27, 2018
作者:
Feng, Tao
;
Yin, Xiaoyu
;
Liu, Chunyan
收藏
  |  
浏览/下载:11/0
  |  
提交时间:2020/11/15
Search engines
Approximate greatest common divisors
Cloud storage systems
Cloud storages
Ho-momorphic encryptions
Identity authentication
KP-ABE
PEKS
Privacy preserving
Cryptanalysis of a Chaotic Stream Cipher and Its Improved Scheme
期刊论文
INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 2018, 卷号: 28, 期号: 7, 页码: 27
作者:
Lin, Zhuosheng
;
Yu, Simin
;
Feng, Xiutao
;
Lu, Jinhu
收藏
  |  
浏览/下载:22/0
  |  
提交时间:2019/12/13
Chaotic stream cipher
divide-and-conquer attack
chosen-ciphertext attack
improved chaotic encryption algorithm
©版权所有 ©2017 CSpace - Powered by
CSpace