×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
兰州理工大学 [7]
软件研究所 [3]
清华大学 [1]
北京大学 [1]
自动化研究所 [1]
上海大学 [1]
更多...
内容类型
期刊论文 [8]
会议论文 [5]
其他 [1]
学位论文 [1]
发表日期
2016 [2]
2015 [1]
2013 [1]
2012 [3]
2011 [4]
2010 [1]
更多...
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共15条,第1-10条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
凝结水节流控制与经济效益分析
期刊论文
2016, 2016
钱能
;
金生祥
;
王琪
;
赵岩
;
王六虎
;
QIAN Neng
;
JIN Sheng-xiang
;
WANG Qi
;
ZHAO Yan
;
WANG Liu-hu
收藏
  |  
浏览/下载:9/0
Secure content delivery scheme based on yaksha system for CCMANETs
期刊论文
Journal of Communications, 2016, 卷号: 11, 期号: 2, 页码: 221-230
作者:
Guo, Xian
;
Feng, Tao
;
Fang, Jun-Li
;
Wang, Jing
;
Lu, Ye
收藏
  |  
浏览/下载:14/0
  |  
提交时间:2020/11/14
Mobile security
CCN/NDN
Content deliverly
Content-centric networkings
Future internet architecture
MANET
Protocol composition logic
Secure content deliveries
Yaksha
SuperCall: A secure interface for isolated execution environment to dynamically use external services
其他
2015-01-01
Cheng, Yueqiang
;
Li, Qing
;
Yu, Miao
;
Ding, Xuhua
;
Shen, Qingni
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2017/12/03
基于扩展 LS2的可信虚拟平台信任链分析
期刊论文
通信学报, 2013, 卷号: 34, 期号: 5, 页码: 31-41
常德显
;
冯登国
;
秦宇
;
张倩颖
收藏
  |  
浏览/下载:21/0
  |  
提交时间:2014/12/16
可信计算
可信虚拟平台
安全系统逻辑
信任链
虚拟信任根
trusted computing
trusted virtualization platform
logic of secure system
trust chain
virtual root of trust
Coding-aware secure routing for multi-hop wireless networks
期刊论文
Tongxin Xuebao/Journal on Communications, 2012, 卷号: 33, 期号: 6, 页码: 133-142
作者:
Guo, Xian
;
Feng, Tao
;
Yuan, Zhan-Ting
收藏
  |  
浏览/下载:8/0
  |  
提交时间:2020/11/14
Codes (symbols)
Formal methods
Location
Network coding
Network routing
Wireless networks
DCAR
Distributed coding
Dynamic topologies
Multihop wireless network
Secure routing
Security issues
Security properties
Wireless broadcast
Secure access authentication scheme for 4G wireless network based on PCL
期刊论文
Tongxin Xuebao/Journal on Communications, 2012, 卷号: 33, 期号: 4, 页码: 77-84
作者:
Wang, Li-Li
;
Feng, Tao
;
Ma, Jian-Feng
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2020/11/14
4G mobile communication systems
Authentication
Computer circuits
Computer terminals
Cryptography
Mobile telecommunication systems
Network security
Wireless networks
4G wireless networks
Access authentications
Authentication protocols
Comprehensive analysis
Protocol composition logic
Protocol derivation systems
Security attributes
Selfcertified public key
Secure re-authentication scheme for 3G-WLAN integrating network based on protocol composition logic
会议论文
Nanjing, China, August 11, 2012 - August 13, 2012
作者:
Feng, Tao
;
Chen, Hui
;
Ma, Jian-Feng
收藏
  |  
浏览/下载:12/0
  |  
提交时间:2020/11/15
Authentication
Internet protocols
Mobile security
Wireless local area networks (WLAN)
3G-WLAN
Authentication algorithm
EAP-AKA
Integrating networks
Parallel composition
Protocol composition logic
Re authentications
Re-authentication protocols
Formal modeling and analysis in a logic for mobile Ad Hoc networks
期刊论文
Dongnan Daxue Xuebao (Ziran Kexue Ban)/Journal of Southeast University (Natural Science Edition), 2011, 卷号: 41, 期号: 2, 页码: 258-265
作者:
Guo, Xian
;
Feng, Tao
;
Yuan, Zhanting
;
Ma, Jianfeng
收藏
  |  
浏览/下载:58/0
  |  
提交时间:2020/11/14
Ad hoc networks
Computation theory
Computer circuits
Mobile ad hoc networks
Mobile security
Network security
Semantics
Correctness properties
Formal modeling and analysis
Logic
Logic of secure systems
Mobile iP
Network evolution
Physical locations
Wireless broadcast
a drtm-based method for trusted network connection
会议论文
10th IEEE Int. Conf. on Trust, Security and Privacy in Computing and Communications, TrustCom 2011, 8th IEEE Int. Conf. on Embedded Software and Systems, ICESS 2011, 6th Int. Conf. on Frontier of Computer Science and Technology, FCST 2011, Changsha, China, November 1
Feng Wei
;
Qin Yu
;
Yu Ai-Min
;
Feng Dengguo
收藏
  |  
浏览/下载:11/0
  |  
提交时间:2013/10/08
Access control
Computer privacy
Software agents
Software reliability
一种基于移动Agent的云端计算任务安全分割与分配算法
期刊论文
北京理工大学学报, 2011, 卷号: 31, 期号: 8, 页码: 922-926
徐小龙
;
程春玲
;
熊婧夷
;
王汝传
收藏
  |  
浏览/下载:11/0
  |  
提交时间:2013/10/08
云计算
安全
移动Agent
任务分割
任务分配
©版权所有 ©2017 CSpace - Powered by
CSpace