CORC

浏览/检索结果: 共33条,第1-10条 帮助

限定条件                
已选(0)清除 条数/页:   排序方式:
Genetic polymorphisms of 27 Y-STR loci in the Dezhou Han population from Shandong province, Eastern China. 期刊论文
Forensic science international. Genetics, 2018
作者:  Zhang Jiashuo;  Tao Ruiyang;  Zhong Jianjun;  Sun Dapeng;  Qiao Lu
收藏  |  浏览/下载:9/0  |  提交时间:2019/02/25
Genetic polymorphisms of 27 Y-STR loci in the Dezhou Han population from Shandong province, Eastern China. 期刊论文
Forensic science international. Genetics, 2018
作者:  Zhang Jiashuo;  Tao Ruiyang;  Zhong Jianjun;  Sun Dapeng;  Qiao Lu
收藏  |  浏览/下载:12/0  |  提交时间:2019/02/25
Genetic polymorphisms of 27 Y-STR loci in the Dezhou Han population from Shandong province, Eastern China 期刊论文
Forensic Science International: Genetics, 2018
作者:  Jiashuo Zhang;  Ruiyang Tao;  Jianjun Zhong;  Dapeng Sun;  Lu Qiao
收藏  |  浏览/下载:4/0  |  提交时间:2019/02/25
A novel security scheme for Body Area Networks compatible with smart vehicles 期刊论文
COMPUTER NETWORKS, 2018, 卷号: Vol.143, 页码: 74-81
作者:  Wang, Junchao;  Han, Kaining;  Alexandridis, Anastasios;  Zilic, Zeljko;  Pang, Yu
收藏  |  浏览/下载:2/0  |  提交时间:2019/02/25
Resetting Your Password Is Vulnerable: A Security Study of Common SMS-Based Authentication in IoT Device 期刊论文
Wireless Communications and Mobile Computing, 2018, 卷号: Vol.2018
作者:  Dong Wang;  Xiaosong Zhang;  Jiang Ming;  Ting Chen;  Chao Wang
收藏  |  浏览/下载:7/0  |  提交时间:2019/02/28
Designing Three-Dimensional Cellular Automata Based Video Authentication with an Optical Integral Imaging Generated Memory-Distributed Watermark 期刊论文
IEEE Journal on Selected Topics in Signal Processing, 2017, 卷号: Vol.11 No.7, 页码: 1200-1212
作者:  Li, X.-W.;  Kim, S.-T.;  Wang, Q.-H.
收藏  |  浏览/下载:3/0  |  提交时间:2019/02/25
An online identity authentication method for blood smear 期刊论文
Journal of Innovative Optical Health Sciences, 2016, 卷号: 第9卷
作者:  Xiaozhen Feng;  Yiping Cao;  Kuang Peng;  Cheng Chen
收藏  |  浏览/下载:1/0  |  提交时间:2019/02/25
A Color Image Authentication System in Spatial-Domain 期刊论文
INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND SOFTWARE ENGINEERING (AISE 2014), 2014, 页码: 49-53
作者:  Zhan, X;  Lei, YR;  Du, LY;  Zeng, HM;  Chen, JL
收藏  |  浏览/下载:1/0  |  提交时间:2019/02/25
Security analyses of click-based graphical passwords via image point memorability 期刊论文
Proceedings of the ACM Conference on Computer and Communications Security, 2014, 页码: 1217-1231
作者:  Zhu, B.B.;  Yan, J.;  Yang, M.;  Wei, D.
收藏  |  浏览/下载:5/0  |  提交时间:2019/02/25
Optical authentication technique based on interference image hiding system and phase-only correlation 期刊论文
Optics Communications, 2013, 卷号: Vol.304, 页码: 129-135
作者:  Sheng Yuan;  Tong Zhang;  Xin Zhou;  Xuemei Liu;  Mingtang Liu
收藏  |  浏览/下载:2/0  |  提交时间:2019/02/25


©版权所有 ©2017 CSpace - Powered by CSpace