×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
山东大学 [8]
内容类型
会议论文 [5]
期刊论文 [3]
发表日期
2019 [1]
2011 [1]
2009 [4]
2007 [2]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共8条,第1-8条
帮助
限定条件
专题:山东大学
第一署名单位
第一作者单位
通讯作者单位
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Face recognition by feature extraction and classification
会议论文
12th IEEE International Conference on Anti-Counterfeiting, Security, and Identification, ASID 2018, November 9, 2018 - November 11, 2018
作者:
Chen, Xinzheng
;
Song, Lihong
;
Qiu, Chaochao
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/12/31
An identity-based group-oriented threshold encryption scheme
期刊论文
ASID 2011 - Proceedings: 2011 IEEE International Conference on Anti-Counterfeiting, Security and Identification, 2011, 页码: 30-33
作者:
Xing, Jinghao
;
Xu, Qiuliang
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/12/23
broadcast encryption
group-oriented
identity-based
threshold
A Secure Two-Party Key Agreement Protocol with Key Escrow and Perfect Forward Secrecy
会议论文
3rd International Conference on Anti-Counterfeiting, Security, and Identification in Communication, AUG 20-22, 2009
作者:
Hou, Mengbo
;
Xu, Qiuliang
收藏
  |  
浏览/下载:1/0
  |  
提交时间:2019/12/31
key agreement
key escrow
perfect forward secrecy
identity-based
encryption
A RFID Algorithm Based on Cyclic Redundancy Check
会议论文
3rd International Conference on Anti-counterfeiting, Security, and Identification in Communication, AUG 20-22, 2009
作者:
Li, Yan-Fei
;
Wang, Hong-Jun
;
Li, Hua
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/12/31
RFID
anti-collision
RN16
CRC16
ISO18000-6C
slot time
A RFID algorithm based on cyclic redundancy check
期刊论文
2009 3rd International Conference on Anti-counterfeiting, Security, and Identification in Communication, ASID 2009, 2009
作者:
Li, Yan-Fei
;
Wang, Hong-Jun
;
Li, Hua
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2019/12/26
Anti-collision
CRC16
ISO18000-6C
RFID
RN16
Slot time
A secure two-party key agreement protocol with key escrow and perfect forward secrecy
期刊论文
2009 3rd International Conference on Anti-counterfeiting, Security, and Identification in Communication, ASID 2009, 2009
作者:
Hou, Mengbo
;
Xu, Qiuliang
收藏
  |  
浏览/下载:1/0
  |  
提交时间:2019/12/26
Identity-based encryption
Key agreement
Key escrow
Perfect forward secrecy
Application of wavelet energy feature in facial expression recognition
会议论文
International Workshop on Anti-counterfeiting, Security, and Identification, APR 16-18, 2007
作者:
Qi Xiao-xu
;
Jiang Wei
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/12/31
facial expression recognition
feature extraction
wavelet energy
feature
FLD
Application of wavelet energy feature in facial expression recognition
会议论文
2007 IEEE International Workshop on Anti-counterfeiting, Security, Identification, ASID, 16 April 2007 through 18 April 2007
作者:
Qi, Xiao-Xu
;
Jiang, Wei
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/31
Facial expression recognition
Feature extraction
FLD
Wavelet energy feature
©版权所有 ©2017 CSpace - Powered by
CSpace