CORC

浏览/检索结果: 共7条,第1-7条 帮助

已选(0)清除 条数/页:   排序方式:
Quantization and Event-Triggered Policy Design for Encrypted Networked Control 期刊论文
IEEE/CAA Journal of Automatica Sinica, 2024, 卷号: 11, 期号: 4, 页码: 946-955
作者:  Yongxia Shi;  Ehsan Nekouei
收藏  |  浏览/下载:0/0  |  提交时间:2024/03/18
A Many-Objective Optimization Based Intelligent Intrusion Detection Algorithm for Enhancing Security of Vehicular Networks in 6G 期刊论文
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2021, 卷号: 70, 期号: 6, 页码: 5234-5243
作者:  Zhang, Zhixia;  Cao, Yang;  Cui, Zhihua;  Zhang, Wensheng;  Chen, Jinjun
收藏  |  浏览/下载:30/0  |  提交时间:2021/08/15
Feasibility study on security deduplication of medical cloud privacy data 期刊论文
EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2018, 卷号: 2018, 期号: 1
作者:  Zhao, Huiqi;  Wang, Lexia;  Wang, Yinglong;  Shu, Minglei;  Liu, Jimin
收藏  |  浏览/下载:6/0  |  提交时间:2019/12/11
Information encryption technology based on digital watermarkingand iteration algorithm 期刊论文
guangxue xuebao/acta optica sinica, 2016, 卷号: 36, 期号: 6
作者:  Xie, Qingkun;  Jiang, Yanru;  Zhang, Wenfei;  Wang, Jing;  Qu, Enshi
收藏  |  浏览/下载:23/0  |  提交时间:2016/10/14
A fast stream cipher algorithm from one-way function of neural network 期刊论文
http://dx.doi.org/10.4156/ijact.vol4.issue20.75, 2012
Li, Guogang; Guo, Donghui; Huang, Ruimin; 郭东辉
收藏  |  浏览/下载:1/0  |  提交时间:2015/07/22
clpke against a variation of key replacement attack without bilinear pairing 期刊论文
Journal of Convergence Information Technology, 2012, 卷号: 7, 期号: 3, 页码: 137-145
Liang Junqing; Lin Xijun; Liu Feng
收藏  |  浏览/下载:12/0  |  提交时间:2012/11/12
A novel verifiable attribute-based encryption scheme 期刊论文
Journal of Convergence Information Technology, 2011, 卷号: 6, 页码: 298-307
作者:  Guo Z.;  Li M.;  Fan X.;  Wang Y.
收藏  |  浏览/下载:1/0  |  提交时间:2019/12/18


©版权所有 ©2017 CSpace - Powered by CSpace