×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
北京大学 [4]
武汉大学 [4]
北京航空航天大学 [2]
四川大学 [2]
厦门大学 [1]
兰州理工大学 [1]
更多...
内容类型
期刊论文 [19]
会议论文 [4]
学位论文 [3]
EI期刊论文 [1]
发表日期
2022 [1]
2019 [2]
2018 [1]
2017 [1]
2015 [2]
2014 [1]
更多...
学科主题
Mathematic... [1]
Plant Scie... [1]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共27条,第1-10条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Period-timing bifurcation evolution in a nonlinear polarization rotation fiber laser
期刊论文
OPTIK, 2022, 卷号: 268
作者:
Ban, Xiaoqiang
;
Li, Xiaohui
;
Dong, Bo
;
Huang, Wobin
;
Zhong, Ming
收藏
  |  
浏览/下载:19/0
  |  
提交时间:2022/10/25
Period -timing bifurcation
Passive fiber resonator
Soliton molecule
Small signal gain
Phase delay
SUAA: A Secure User Authentication Scheme with Anonymity for the Single & Multi-server Environments
期刊论文
INFORMATION SCIENCES, 2019, 卷号: 477, 页码: 369-385
作者:
Lwamo, Nassoro M. R.
;
Zhu, Liehuang
;
Xu, Chang
;
Sharif, Kashif
;
Liu, Ximeng
收藏
  |  
浏览/下载:23/0
  |  
提交时间:2019/11/21
Single server
Authentication
BAN logic
Multi-server
Smart card
An Efficient and Secure Smart Card Based Authentication Scheme
期刊论文
JOURNAL OF INTERNET TECHNOLOGY, 2019, 卷号: 20, 期号: 4, 页码: 1113-1123
作者:
Chen, Chien-Ming
;
Xiang, Bin
;
Wang, King-Hang
;
Zhang, Yong
;
Wu, Tsu-Yang
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/11
Authentication key agreement
Biometric
Elliptic-curve cryptosystem
Smart card
BAN logic
A light weight authentication protocol for IoT-enabled devices in distributed Cloud Computing environment
期刊论文
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 卷号: 78, 页码: 1005-1019
作者:
Amin, Ruhul
;
Kumar, Neeraj
;
Biswas, G. P.
;
Iqbal, R.
;
Chang, Victor
收藏
  |  
浏览/下载:10/0
  |  
提交时间:2019/11/26
Distributed Cloud environment
Authentication
BAN logic
AVISPA tool
Security attacks
On the Design of Fine Grained Access Control With User Authentication Scheme for Telecare Medicine Information Systems
期刊论文
IEEE Access, 2017, 卷号: Vol.5, 页码: 7012-7030
作者:
SandipRoy
;
KisungPark
;
AshokKumarDas
;
AlavalapatiGouthamReddy
;
SamiranChattopadhyay
收藏
  |  
浏览/下载:8/0
  |  
提交时间:2019/12/24
Authentication
Access
control
Servers
Medical
services
Electronic
mail
Smart
cards
Fine-grained
access
control
biometric
authentication
bilinear
maps
telecare
medicine
information
systems
fuzzy
extractor
security
BAN
logic
ROR
model
An Enhancement of a Smart Card Authentication Scheme for Multi-server Architecture
期刊论文
WIRELESS PERSONAL COMMUNICATIONS, 2015, 卷号: 80, 页码: 175-192
作者:
Li, Xiong
;
Niu, Jianwei
;
Kumari, Saru
;
Liao, Junguo
;
Liang, Wei
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2019/12/30
Cryptanalysis
Authentication
Password
Smart card
Multi-server architecture
BAN logic
Characterization of the cis elements in the proximal promoter regions of the anthocyanin pathway genes reveals a common regulatory logic that governs pathway regulation
期刊论文
JOURNAL OF EXPERIMENTAL BOTANY, 2015, 卷号: 66, 期号: 13, 页码: 3775-3789
作者:
Zhu, Zhixin
;
Wang, Hailong
;
Wang, Yiting
;
Guan, Shan
;
Wang, Fang
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2022/09/13
Anthocyanin pathway
Arabidopsis
bHLH
cis element
Ipomoea
MBW complex
MYB
promoter activity
promoter architecture
regulatory module
trans factor
transcription initiation
WDR
Dynamic Measurement Protocol in Infrastructure as a Service
期刊论文
TSINGHUA SCIENCE AND TECHNOLOGY, 2014, 卷号: 19, 期号: 5
作者:
Xiang, Shuang
;
Zhao, Bo
;
Yang, An
;
Wei, Tao
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/12/05
Burrow-Abadi-Needham (BAN) logic
real-time security
trusted dynamic measurement
WFS feature semantic retrieval based on ontology
EI期刊论文
2012
Zhang Jianbo
;
Liu Jiping
;
Liu Hengfei
;
Wang Bei
收藏
  |  
浏览/下载:26/0
  |  
提交时间:2012/11/23
Inference engines
Semantics
Formal modeling and analysis in a logic for mobile Ad Hoc networks
期刊论文
Dongnan Daxue Xuebao (Ziran Kexue Ban)/Journal of Southeast University (Natural Science Edition), 2011, 卷号: 41, 期号: 2, 页码: 258-265
作者:
Guo, Xian
;
Feng, Tao
;
Yuan, Zhanting
;
Ma, Jianfeng
收藏
  |  
浏览/下载:57/0
  |  
提交时间:2020/11/14
Ad hoc networks
Computation theory
Computer circuits
Mobile ad hoc networks
Mobile security
Network security
Semantics
Correctness properties
Formal modeling and analysis
Logic
Logic of secure systems
Mobile iP
Network evolution
Physical locations
Wireless broadcast
©版权所有 ©2017 CSpace - Powered by
CSpace