CORC

浏览/检索结果: 共465条,第1-10条 帮助

已选(0)清除 条数/页:   排序方式:
An Improved Outsourcing Algorithm to Solve Quadratic Congruence Equations in Internet of Things 期刊论文
IEEE INTERNET OF THINGS JOURNAL, 2022, 卷号: 9, 期号: 9, 页码: 6790-6802
作者:  Li, Xiulan;  Bi, Jingguo;  Tian, Chengliang;  Zhang, Hanlin;  Yu, Jia
收藏  |  浏览/下载:5/0  |  提交时间:2023/02/07
TRUSTED MEASUREMENT AND CONTROL NETWORK AUTHENTICATION METHOD BASED ON DOUBLE CRYPTOGRAPHIC VALUES AND CHAOTIC ENCRYPTION 专利
申请日期: 2021-11-25,
作者:  Shang WL(尚文利);  Zeng P(曾鹏);  Yin L(尹隆);  Chen CY(陈春雨);  Zhao JM(赵剑明)
收藏  |  浏览/下载:105/0  |  提交时间:2022/01/02
Content-adaptive image encryption with partial unwinding decomposition 期刊论文
SIGNAL PROCESSING, 2021, 卷号: 181, 页码: 14
作者:  Wu, Yongfei;  Zhang, Liming;  Qian, Tao;  Liu, Xilin;  Xie, Qiwei
收藏  |  浏览/下载:19/0  |  提交时间:2021/03/29
Research on attribute-based encryption access control technology in edge computing environment 会议论文
Beijing, China, October 22-24, 2021
作者:  Jiang YH(蒋一恒);  Zhang Chen;  Zhang BW(张博文)(2.3);  Yuan DC(袁德成);  Wang C(王晨)
收藏  |  浏览/下载:7/0  |  提交时间:2022/04/23
A Guaranteed Secure Scan Design Based on Test Data Obfuscation by Cryptographic Hash 期刊论文
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2020, 卷号: 39, 期号: 12, 页码: 4524-4536
作者:  Cui, Aijiao;  Li, Mengyang;  Qu, Gang;  Li, Huawei
收藏  |  浏览/下载:14/0  |  提交时间:2021/12/01
A Subject-Sensitive Perceptual Hash Based on MUM-Net for the Integrity Authentication of High Resolution Remote Sensing Images 期刊论文
ISPRS INTERNATIONAL JOURNAL OF GEO-INFORMATION, 2020, 卷号: 9, 期号: 8, 页码: 28
作者:  Ding, Kaimeng;  Liu, Yueming;  Xu, Qin;  Lu, Fuqiang
收藏  |  浏览/下载:13/0  |  提交时间:2021/03/18
Information Coding in a Reconfigurable DNA Origami Domino Array 期刊论文
ANGEWANDTE CHEMIE-INTERNATIONAL EDITION, 2020
作者:  Fan, Sisi;  Wang, Dongfang;  Cheng, Jin;  Liu, Yan;  Luo, Tao
收藏  |  浏览/下载:18/0  |  提交时间:2020/11/26
Monogamy relations within quadripartite Einstein-Podolsky-Rosen steering based on cascaded four-wave mixing processes 期刊论文
PHYSICAL REVIEW A, 2020, 卷号: 101, 期号: 5
作者:  Xiang, Yu;  Liu, Yang;  Cai, Yin;  Li, Feng;  Zhang, Yanpeng
收藏  |  浏览/下载:2/0  |  提交时间:2020/05/29
TRUSTED AUTHENTICATION METHOD EMPLOYING TWO CRYPTOGRAPHIC VALUES AND CHAOTIC ENCRYPTION IN MEASUREMENT AND CONTROL NETWORK [EN] 专利
申请日期: 2020-05-07,
作者:  Shang WL(尚文利);  Zeng P(曾鹏);  Yin L(尹隆);  Chen CY(陈春雨);  Zhao JM(赵剑明)
收藏  |  浏览/下载:19/0  |  提交时间:2020/07/04
Energy-Aware Green Adversary Model for Cyberphysical Security in Industrial System 期刊论文
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2020, 卷号: 16, 期号: 5, 页码: 3322-3329
作者:  Sangaiah, Arun Kumar;  Medhane, Darshan Vishwasrao;  Bian, Gui-Bin;  Ghoneim, Ahmed;  Alrashoud, Mubarak
收藏  |  浏览/下载:19/0  |  提交时间:2020/06/02


©版权所有 ©2017 CSpace - Powered by CSpace