×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
软件研究所 [120]
华南理工大学 [116]
山东大学 [52]
北京航空航天大学 [31]
上海电子信息职业技... [26]
兰州理工大学 [14]
更多...
内容类型
会议论文 [445]
发表日期
2020 [2]
2019 [9]
2018 [14]
2017 [4]
2016 [11]
2015 [8]
更多...
学科主题
mathematic... [2]
Atmospheri... [1]
Mathematic... [1]
computer s... [1]
engines; t... [1]
telecommun... [1]
更多...
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共445条,第1-10条
帮助
限定条件
内容类型:会议论文
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Authentication Technology in Industrial Control System Based on Identity Password
会议论文
Shenyang, China, July 27-29, 2020
作者:
Yang LY(杨路瑶)
;
Shang WL(尚文利)
;
Chen CY(陈春雨)
;
Wang TY(王天宇)
;
Liu ZB(刘周斌)
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2020/10/10
Industrial control security
digital signature
identity authentication
SSL/TLS handshake protocol
One-Stop Efficient PKI Authentication Service Model Based on Blockchain
会议论文
Chengdu, China, October 11, 2019 - October 13, 2019
作者:
Feng, Tao
;
Chen, Wuyang
;
Zhang, Di
;
Liu, Chunyan
收藏
  |  
浏览/下载:12/0
  |  
提交时间:2020/11/15
Blockchain
Public key cryptography
Authentication services
Batch update
Dynamic accumulators
Identity authentication
Public key infrastructure technologies
Storage overhead
Third-party service providers
User authentication
Synchronization for three chaotic systems with different structures and its application in secure communication
会议论文
Chongqing, China, October 11, 2019 - October 13, 2019
作者:
Peng, Peng
;
Li, Suoping
;
An, Xinlei
;
Wang, Fan
;
Dou, Zufang
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2020/11/15
Chaotic systems
Cryptography
Information management
Secure communication
Signal receivers
Adaptive synchronization method
Chaos encryption
Chaos synchronization
Different structure
Encrypted informations
Lyapunov stability theory
Numerical results
Synchronized systems
A Fast and Simple Method for Obtaining Microcircuit Card Information
会议论文
Chongqing, China, October 11, 2019 - October 13, 2019
作者:
Yuan, Hui
;
Chang, Sheng
;
Zhao, Jinxiong
;
Zhao, Bo
;
Xie, Xiaodi
收藏
  |  
浏览/下载:1/0
  |  
提交时间:2020/11/15
Cryptography
Information management
Number theory
Shift registers
Encryption algorithms
Experimental methods
Linear feedback shift registers
microcircuit card
Nonlinear functions
PRNG
Pseudo random number generators
Random sequence
Research on secure routing technology based on NDN for VANET
会议论文
Hong Kong, Hong kong, June 1, 2019 - June 3, 2019
作者:
Gai, Xiaowei
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2020/11/15
Cryptography
Distributed computer systems
Dynamics
Floods
Memory architecture
Mobile security
Mobile telecommunication systems
Network architecture
Network routing
Signal processing
Transmission control protocol
Vehicular ad hoc networks
Data network
Forward-secure
Identity based cryptography
Named data networkings
Network environments
Security requirements
Trust values
Wireless mobile networks
Linear space-variant optical cryptosystem via Fourier ptychography
会议论文
San Francisco, CA, United states, 2019-02-02
作者:
Pan, An
;
Wen, Kai
;
Yao, Baoli
收藏
  |  
浏览/下载:43/0
  |  
提交时间:2019/07/08
Fourier optics and signal processing
Computational imaging
Pattern recognition
optical security and encryption
Fourier ptychography
A Privacy-Aware PKI System Based on Permissioned Blockchains
会议论文
Proceedings of the IEEE International Conference on Software Engineering and Service Sciences, ICSESS, 2018-11-23
作者:
Wang, R.
;
He, J.
;
Liu, C.
;
Li, Q.
;
Tsai, W.-T.
收藏
  |  
浏览/下载:12/0
  |  
提交时间:2019/12/30
Blockchain
Distributed computer systems
Efficiency
Public key cryptography
Software engineering
component
Digital certificates
permissioned blockchains
Privacy awareness
Public key infrastructure
security
Network security
An Architectural-Enhanced Secure Design in Embedded System
会议论文
Proceedings of the IEEE International Conference on Software Engineering and Service Sciences, ICSESS, 2018-11-23
作者:
Wang, X.
;
Xu, B.
;
Wang, W.
;
Zhang, Z.
;
Zhang, X.
收藏
  |  
浏览/下载:19/0
  |  
提交时间:2019/12/30
Cryptography
Hardware security
Intrusion detection
Software engineering
Architectural enhancement
Buffer overflows
Cryptographic algorithms
execution behavior
Memory authentication
Performance loss
Security solutions
Software and hardwares
Embedded systems
A spin orbit torque based true random number generator with real-time optimization
会议论文
Proceedings of the IEEE Conference on Nanotechnology, 2018-07-23
作者:
Liu, Y.
;
Wang, Z.
;
Li, Z.
;
Wang, X.
;
Zhao, W.
收藏
  |  
浏览/下载:6/0
  |  
提交时间:2019/12/30
Cryptography
Magnetic devices
Nanotechnology
Number theory
Sampling
Stochastic systems
Tunnel junctions
Magnetic tunnel junction
National Institute of Standards and Technology
Optimization module
Real-time optimization
Spin transfer torque
Statistical sampling
Stochastic switching
Transient simulation
Random number generation
Network Analysis of Chaotic Dynamics in Fixed-precision Digital Domain
会议论文
2019 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2019-01-01
作者:
Li, Chengqing
;
Lu, Jinhu
;
Chen, Guanrong
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/30
arithmetic domain
chaotic cryptography
chaotic dynamics
Logistic map
state-mapping network
©版权所有 ©2017 CSpace - Powered by
CSpace