×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
西安交通大学 [6]
兰州理工大学 [4]
上海电子信息职业技术... [2]
北京航空航天大学 [1]
湖南大学 [1]
内容类型
会议论文 [7]
期刊论文 [7]
发表日期
2022 [1]
2019 [2]
2018 [2]
2016 [2]
2015 [1]
2014 [2]
更多...
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共14条,第1-10条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Verifiable speech retrieval algorithm based on KNN secure hashing
期刊论文
Multimedia Tools and Applications, 2022
作者:
An, Li
;
Huang, Yi-bo
;
Zhang, Qiu-yu
收藏
  |  
浏览/下载:20/0
  |  
提交时间:2022/09/22
Biometrics
Cryptography
Efficiency
Learning algorithms
Speech communication
Speech transmission
Biometric template
Compressed-Sensing
Encryption algorithms
Hyperchaotic
Hyperchaotic lorenz compressed sensing encryption algorithm
KNN secure hash
Secure hash
Security
Speech retrieval
Verifiable speech retrieval
Image encryption algorithm based on image hashing, improved chaotic mapping and DNA coding
期刊论文
IET IMAGE PROCESSING, 2019, 卷号: 13, 期号: 14, 页码: 2905-2915
作者:
Zhang, Qiuyu
;
Han, Jitian
;
Ye, Yutong
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2020/06/16
image coding
DNA
statistical analysis
cryptography
image processing
entropy
random sequences
chaos
chaotic communication
image encryption algorithm
image hashing
improved chaotic mapping
image features
fingerprint image
binary hash sequence
generated hash sequence
improved chaotic map
Chen's chaotic system
encryption algorithms
A Fast and Simple Method for Obtaining Microcircuit Card Information
会议论文
Chongqing, China, October 11, 2019 - October 13, 2019
作者:
Yuan, Hui
;
Chang, Sheng
;
Zhao, Jinxiong
;
Zhao, Bo
;
Xie, Xiaodi
收藏
  |  
浏览/下载:1/0
  |  
提交时间:2020/11/15
Cryptography
Information management
Number theory
Shift registers
Encryption algorithms
Experimental methods
Linear feedback shift registers
microcircuit card
Nonlinear functions
PRNG
Pseudo random number generators
Random sequence
A secure and targeted mobile coupon delivery scheme using blockchain
会议论文
作者:
Gu, Yingjie
;
Gui, Xiaolin
;
Xu, Pan
;
Gui, Ruowei
;
Zhao, Yingliang
收藏
  |  
浏览/下载:6/0
  |  
提交时间:2019/11/19
Analysis and simulation
Behavioral profiles
Data contracts
Encryption algorithms
Non repudiation
Targeted coupon delivery
Transfer of information
Trusted third parties
Hardware-Based Protection for Data Security at Run-Time on Embedded Systems
会议论文
IOP Conference Series: Materials Science and Engineering
作者:
Wang, X.
;
Zhang, X.
;
Wang, W.
;
Du, P.
;
Zhang, Z.
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2019/12/30
Data privacy
Embedded systems
Hash functions
Memory architecture
Network security
Advanced Encryption Standard
Encryption algorithms
Hardware-based protection
Integrity protection
Performance penalties
Security Architecture
Security mechanism
System on a programmable chips
Hardware security
Security problems analysis and solving policy design for mobile agents running platform
会议论文
作者:
Tong, Yan
;
Zhang, Jian
;
Qin, Tao
收藏
  |  
浏览/下载:6/0
  |  
提交时间:2019/11/26
Asymmetric encryption
Encryption algorithms
Mobile agent system
Policy design
Security problems
Simulation environment
Socket communications
Symmetric encryption
A high-performance transparent file encryption mechanism on android platform
期刊论文
Hsi-An Chiao Tung Ta Hsueh/Journal of Xi'an Jiaotong University, 2016, 卷号: 50, 页码: 120-126
作者:
Hu, Yang
;
Tao, Jing
;
Liu, Linfeng
;
Li, Jianfeng
;
Hu, Wenjun
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2019/11/26
Android platforms
Block cipher algorithms
Block encryption
File encryption
Performance analysis
Performance tests
Reading performance
Writing performance
Encryption algorithm supporting relational calculations in cloud computing
期刊论文
Ruan Jian Xue Bao/Journal of Software, 2015, 卷号: 26, 期号: [db:dc_citation_issue], 页码: 1181-1195
作者:
Huang, Ru-Wei
;
Gui, Xiao-Lin
;
Chen, Ning-Jiang
;
Yao, Jing
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/12/02
Cloud securities
Data utilization
Encryption algorithms
Encryption schemes
Order preserving
Performance evaluations
Security analysis
Sensitive datas
Differential power analysis attacks on PRESENT.
期刊论文
Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, 卷号: Vol.31 No.3, 页码: 843-845
作者:
LI Lang
;
LI Ren-fa
;
LI Ken-li
;
WANG Yi
;
JIAO Ge
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/12/31
DIFFERENTIAL analyzers
STATISTICAL power analysis
COMPUTER algorithms
BLOCK ciphers
DATA encryption (Computer science)
INTERNET of things
FIRST-order logic
Verifiable multi-authority attribute based encryption scheme with different permissions
期刊论文
Journal of Chemical and Pharmaceutical Research, 2014, 卷号: 6, 期号: 7, 页码: 611-620
作者:
Liu, Xueyan
;
Li, Zhanming
;
Hao, Zhanjun
;
Zhang, Qiang
收藏
  |  
浏览/下载:10/0
  |  
提交时间:2020/11/14
Access control
Algorithms
Computation theory
Decision making
Decision theory
Granular computing
Street traffic control
Traffic congestion
Attribute-based encryptions
Identity Based Encryption
Multiple authorities
Permission
Pseudorandom functions
©版权所有 ©2017 CSpace - Powered by
CSpace