CORC

浏览/检索结果: 共14条,第1-10条 帮助

已选(0)清除 条数/页:   排序方式:
Verifiable speech retrieval algorithm based on KNN secure hashing 期刊论文
Multimedia Tools and Applications, 2022
作者:  An, Li;  Huang, Yi-bo;  Zhang, Qiu-yu
收藏  |  浏览/下载:20/0  |  提交时间:2022/09/22
Image encryption algorithm based on image hashing, improved chaotic mapping and DNA coding 期刊论文
IET IMAGE PROCESSING, 2019, 卷号: 13, 期号: 14, 页码: 2905-2915
作者:  Zhang, Qiuyu;  Han, Jitian;  Ye, Yutong
收藏  |  浏览/下载:4/0  |  提交时间:2020/06/16
A Fast and Simple Method for Obtaining Microcircuit Card Information 会议论文
Chongqing, China, October 11, 2019 - October 13, 2019
作者:  Yuan, Hui;  Chang, Sheng;  Zhao, Jinxiong;  Zhao, Bo;  Xie, Xiaodi
收藏  |  浏览/下载:1/0  |  提交时间:2020/11/15
A secure and targeted mobile coupon delivery scheme using blockchain 会议论文
作者:  Gu, Yingjie;  Gui, Xiaolin;  Xu, Pan;  Gui, Ruowei;  Zhao, Yingliang
收藏  |  浏览/下载:6/0  |  提交时间:2019/11/19
Hardware-Based Protection for Data Security at Run-Time on Embedded Systems 会议论文
IOP Conference Series: Materials Science and Engineering
作者:  Wang, X.;  Zhang, X.;  Wang, W.;  Du, P.;  Zhang, Z.
收藏  |  浏览/下载:5/0  |  提交时间:2019/12/30
Security problems analysis and solving policy design for mobile agents running platform 会议论文
作者:  Tong, Yan;  Zhang, Jian;  Qin, Tao
收藏  |  浏览/下载:6/0  |  提交时间:2019/11/26
A high-performance transparent file encryption mechanism on android platform 期刊论文
Hsi-An Chiao Tung Ta Hsueh/Journal of Xi'an Jiaotong University, 2016, 卷号: 50, 页码: 120-126
作者:  Hu, Yang;  Tao, Jing;  Liu, Linfeng;  Li, Jianfeng;  Hu, Wenjun
收藏  |  浏览/下载:5/0  |  提交时间:2019/11/26
Encryption algorithm supporting relational calculations in cloud computing 期刊论文
Ruan Jian Xue Bao/Journal of Software, 2015, 卷号: 26, 期号: [db:dc_citation_issue], 页码: 1181-1195
作者:  Huang, Ru-Wei;  Gui, Xiao-Lin;  Chen, Ning-Jiang;  Yao, Jing
收藏  |  浏览/下载:2/0  |  提交时间:2019/12/02
Differential power analysis attacks on PRESENT. 期刊论文
Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, 卷号: Vol.31 No.3, 页码: 843-845
作者:  LI Lang;  LI Ren-fa;  LI Ken-li;  WANG Yi;  JIAO Ge
收藏  |  浏览/下载:2/0  |  提交时间:2019/12/31
Verifiable multi-authority attribute based encryption scheme with different permissions 期刊论文
Journal of Chemical and Pharmaceutical Research, 2014, 卷号: 6, 期号: 7, 页码: 611-620
作者:  Liu, Xueyan;  Li, Zhanming;  Hao, Zhanjun;  Zhang, Qiang
收藏  |  浏览/下载:10/0  |  提交时间:2020/11/14


©版权所有 ©2017 CSpace - Powered by CSpace