×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
西安交通大学 [65]
上海电子信息职业技... [49]
武汉大学 [43]
湖南大学 [27]
北京航空航天大学 [26]
北京大学 [25]
更多...
内容类型
期刊论文 [254]
会议论文 [73]
学位论文 [20]
其他 [19]
发表日期
2017 [366]
学科主题
Science & ... [1]
生物科学::普通生物... [1]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共366条,第1-10条
帮助
限定条件
发表日期:2017
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
The prospects for China's food security and imports: Will China starve the world via imports?
期刊论文
JOURNAL OF INTEGRATIVE AGRICULTURE, 2017, 卷号: 16, 期号: 12, 页码: 2933-2944
作者:
Huang Ji-kun
;
Wei Wei
;
Cui Qi
;
Xie Wei
收藏
  |  
浏览/下载:23/0
  |  
提交时间:2019/05/30
food security
food supply
import
China
global
Analysis Framework of China's Grain Production System: A Spatial Resilience Perspective
期刊论文
SUSTAINABILITY, 2017, 卷号: 9, 期号: 12, 页码: 21
作者:
Ge, Dazhuan
;
Long, Hualou
;
Ma, Li
;
Zhang, Yingnan
;
Tu, Shuangshuang
收藏
  |  
浏览/下载:22/0
  |  
提交时间:2019/05/30
agricultural labor transition
land use transition
food security
smallholder livelihood
cross-scale analysis
stakeholders
Rice yield development and the shrinking yield gaps in China, 1981-2008
期刊论文
REGIONAL ENVIRONMENTAL CHANGE, 2017, 卷号: 17, 期号: 8, 页码: 2397-2408
作者:
Chen, Yi
;
Wang, Pin
;
Zhang, Zhao
;
Tao, Fulu
;
Wei, Xing
收藏
  |  
浏览/下载:13/0
  |  
提交时间:2019/09/25
Crop model
Yield gap
Yield trends
Climate change
Food security
An integrity verification scheme of completeness and zero-knowledge for multi-Cloud storage
期刊论文
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2017, 卷号: 30, 期号: 16
作者:
Cao, Laicheng
;
He, Wenwen
;
Liu, Yufei
;
Guo, Xian
;
Feng, Tao
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/11/15
cloud storage security
dynamic operations
integrity verification
provable data possession
zero-knowledge
Ecological security assessment based on ecological footprint approach in Beijing-Tianjin-Hebei region, China
期刊论文
PHYSICS AND CHEMISTRY OF THE EARTH, 2017, 卷号: 101, 页码: 43-51
作者:
Chu, Xi
;
Deng, Xiangzheng
;
Jin, Gui
;
Wang, Zhan
;
Li, Zhaohua
收藏
  |  
浏览/下载:188/0
  |  
提交时间:2019/09/25
Ecological footprint
Ecological security
Ecological tension index
Ecological occupancy index
Ecological economic coordination index
Beijing-Tianjin-Hebei region
Cooperative dynamic data possession scheme across a cloud storage environment
期刊论文
Qinghua Daxue Xuebao/Journal of Tsinghua University, 2017, 卷号: 57, 期号: 10, 页码: 1048-1055
作者:
Cao, Laicheng
;
He, Wenwen
;
Liu, Yufei
;
Guo, Xian
;
Feng, Tao
收藏
  |  
浏览/下载:15/0
  |  
提交时间:2020/11/14
Digital storage
Network security
Cloud service providers
Cloud storage securities
Cloud storage services
Cooperative dynamics
Dynamic data
Dynamic operations
Integrity verifications
Trusted third parties
LBS privacy preserving model and security analysis based on expanded anonymous server
期刊论文
Journal of Computers (Taiwan), 2017, 卷号: 28, 期号: 5, 页码: 155-161
作者:
Xie, Peng-Shou
;
Fu, Tian-Xia
;
Guo, Jia
;
Wang, Qi
收藏
  |  
浏览/下载:14/0
  |  
提交时间:2020/11/14
Data privacy
Location based services
Security systems
Telecommunication services
Anonymous communication
Asymmetric encryption
Data encryption
Fully homomorphic encryption
Location information
Privacy information
Privacy preserving
Security analysis
Perceptual hashing authentication algorithm for multi-format audio based on energy to zero ratio
期刊论文
Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition), 2017, 卷号: 45, 期号: 9, 页码: 33-38
作者:
Zhang, Qiuyu
;
Qiao, Sibin
;
Zhang, Tao
;
Huang, Yibo
收藏
  |  
浏览/下载:10/0
  |  
提交时间:2020/11/14
Motion compensation
Robustness (control systems)
Audio authentication
Energy to zero ratio
Multi-format audio
Perceptual hashing
Security
A brief overview on secure control of networked systems
期刊论文
ADVANCES IN MANUFACTURING, 2017, 卷号: 5, 期号: 3, 页码: 243-250
作者:
Sun, Hong-Tao
;
Peng, Chen
;
Zhou, Peng
;
Wang, Zhi-Wen
收藏
  |  
浏览/下载:0/0
  |  
提交时间:2019/11/15
Networked control system
Security
Attack
Estimation and control
A Sensitive Information Protection Scheme in Named Data Networking Using Attribute-Based Ring-Signcryption
会议论文
Shenzhen, China, June 26, 2017 - June 29, 2017
作者:
Feng, Tao
;
Liu, Ningning
收藏
  |  
浏览/下载:9/0
  |  
提交时间:2020/11/15
Computers
Network security
Adaptive chosen-ciphertext securities
Future internet architecture
Multi authorities
Named data networkings
Random Oracle model
Security mechanism
Sensitive information protections
Sensitive informations
©版权所有 ©2017 CSpace - Powered by
CSpace