CORC

浏览/检索结果: 共10条,第1-10条 帮助

限定条件                
已选(0)清除 条数/页:   排序方式:
One-Stop Efficient PKI Authentication Service Model Based on Blockchain 会议论文
Chengdu, China, October 11, 2019 - October 13, 2019
作者:  Feng, Tao;  Chen, Wuyang;  Zhang, Di;  Liu, Chunyan
收藏  |  浏览/下载:12/0  |  提交时间:2020/11/15
Research on secure routing technology based on NDN for VANET 会议论文
Hong Kong, Hong kong, June 1, 2019 - June 3, 2019
作者:  Gai, Xiaowei
收藏  |  浏览/下载:4/0  |  提交时间:2020/11/15
Security analysis of speech perceptual hashing authentication algorithm 期刊论文
International Journal of Security and its Applications, 2016, 卷号: 10, 期号: 1, 页码: 103-118
作者:  Zhang, Qiu-Yu;  Ren, Zhan-Wei;  Xing, Peng-Fei;  Huang, Yi-Bo;  Shuang, Yu
收藏  |  浏览/下载:6/0  |  提交时间:2020/11/14
Data packets bidirectional anonymous identity privacy protection scheme for named data networking 期刊论文
Journal of Computational Information Systems, 2015, 卷号: 11, 期号: 11, 页码: 3987-3998
作者:  Feng, Tao;  Zhou, Tao;  Guo, Xian;  Liu, Chunyan
收藏  |  浏览/下载:6/0  |  提交时间:2020/11/14
Secure access authentication scheme for 4G wireless network based on PCL 期刊论文
Tongxin Xuebao/Journal on Communications, 2012, 卷号: 33, 期号: 4, 页码: 77-84
作者:  Wang, Li-Li;  Feng, Tao;  Ma, Jian-Feng
收藏  |  浏览/下载:7/0  |  提交时间:2020/11/14
WAPI secure access authentication scheme for heterogeneous networks based on identity-based cryptograph 会议论文
Seoul, Korea, Republic of, April 24, 2012 - April 26, 2012
作者:  Feng, Tao;  Jiao, Jian
收藏  |  浏览/下载:11/0  |  提交时间:2020/11/15
UC secure network coding against pollution attacks 期刊论文
Information Technology Journal, 2012, 卷号: 11, 期号: 9, 页码: 1175-1183
作者:  Feng, Tao;  Wang, Shuang;  Yuan, Zhan-Ting
收藏  |  浏览/下载:35/0  |  提交时间:2020/11/14
Provably secure anonymous authentication key agreement protocol for multicast group 期刊论文
Dianzi Keji Daxue Xuebao/Journal of the University of Electronic Science and Technology of China, 2011, 卷号: 40, 期号: 2, 页码: 273-277
作者:  Feng, Tao;  Liu, Yuan-Yuan;  Ma, Jian-Feng
收藏  |  浏览/下载:7/0  |  提交时间:2020/11/14
Secure authenticated key agreement protocol for WMEN based on protocol composition logic 会议论文
作者:  Feng, Tao;  Yi, Yangfan;  Ma, Jianfeng
收藏  |  浏览/下载:2/0  |  提交时间:2020/11/15
Identity-base group key management scheme in ad-hoc 期刊论文
Tongxin Xuebao/Journal on Communications, 2009, 卷号: 30, 期号: 10 A, 页码: 85-92
作者:  Zhang, Qiu-Yu;  Miao, Feng-Man;  Yuan, Zhan-Ting;  Wang, Rui-Fang;  Zhang, Qi-Kun
收藏  |  浏览/下载:8/0  |  提交时间:2020/11/14


©版权所有 ©2017 CSpace - Powered by CSpace