×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
兰州理工大学 [5]
内容类型
会议论文 [3]
期刊论文 [2]
发表日期
2021 [1]
2017 [1]
2012 [2]
2010 [1]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共5条,第1-5条
帮助
限定条件
专题:兰州理工大学
第一署名单位
第一作者单位
通讯作者单位
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Cross-domain single sign-on authentication of information security in network environment
期刊论文
International Journal of Information and Communication Technology, 2021, 卷号: 18, 期号: 1, 页码: 89-104
作者:
Cui, A-Jun
;
Wang, Wei
;
Zhang, Hua-Feng
;
Ma, Yan-Hong
;
Li, Chen
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2021/03/02
Authentication
Authentication methods
Authentication scheme
Data packet loss rate
Efficient interaction
Identity providers
Information integrity
Revocation scheme
Service provider
Robust hashing for color image authentication using non-subsampled contourlet transform features and salient features
期刊论文
Journal of Information Hiding and Multimedia Signal Processing, 2017, 卷号: 8, 期号: 5, 页码: 1029-1042
作者:
Zhang, Qiu-Yu
;
Yang, Zi
;
Dou, Qi-Yan
;
Yan, Yan
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2020/11/14
Authentication
Feature extraction
Image enhancement
Image authentication
Image hashing
Non subsampled contourlet transform (NSCT)
Saliency detection
Tamper localization
WAPI secure access authentication scheme for heterogeneous networks based on identity-based cryptograph
会议论文
Seoul, Korea, Republic of, April 24, 2012 - April 26, 2012
作者:
Feng, Tao
;
Jiao, Jian
收藏
  |  
浏览/下载:11/0
  |  
提交时间:2020/11/15
Authentication
Computation theory
Computer circuits
Cryptography
Heterogeneous networks
Information management
Mobile security
Wireless local area networks (WLAN)
Access authentications
Authentication protocols
Comprehensive analysis
Identity based cryptographs
Man in the middle attacks
Mutual authentication
Protocol composition logic
WAPI
Secure re-authentication scheme for 3G-WLAN integrating network based on protocol composition logic
会议论文
Nanjing, China, August 11, 2012 - August 13, 2012
作者:
Feng, Tao
;
Chen, Hui
;
Ma, Jian-Feng
收藏
  |  
浏览/下载:12/0
  |  
提交时间:2020/11/15
Authentication
Internet protocols
Mobile security
Wireless local area networks (WLAN)
3G-WLAN
Authentication algorithm
EAP-AKA
Integrating networks
Parallel composition
Protocol composition logic
Re authentications
Re-authentication protocols
Enhancing distributed web security based on Kerberos authentication service
会议论文
作者:
Lai-Cheng, Cao
收藏
  |  
浏览/下载:0/0
  |  
提交时间:2020/11/15
Authentication
Data privacy
Internet protocols
Advanced Encryption Standard
Authentication mechanisms
Encryption function
Kerberos authentication
Kerberos protocol
Mutual authentication
Rijndael encryption algorithm
WEB security
distributed web security
authentication
©版权所有 ©2017 CSpace - Powered by
CSpace