×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
兰州理工大学 [5]
西安交通大学 [3]
厦门大学 [1]
兰州大学 [1]
计算技术研究所 [1]
中国科学院大学 [1]
更多...
内容类型
会议论文 [6]
期刊论文 [6]
学位论文 [2]
发表日期
2020 [1]
2017 [1]
2016 [1]
2012 [4]
2011 [1]
2010 [1]
更多...
学科主题
computer s... [1]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共14条,第1-10条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
An efficient retrieval approach for encrypted speech based on biological hashing and spectral subtraction
期刊论文
Multimedia Tools and Applications, 2020, 卷号: 79, 期号: 39-40, 页码: 29775-29798
作者:
Zhang, Qiu-yu
;
Li, Gai-li
;
Huang, Yi-bo
收藏
  |  
浏览/下载:14/0
  |  
提交时间:2020/11/14
Authentication
Conformal mapping
Cryptography
Discrete wavelet transforms
Efficiency
Fast Fourier transforms
Hamming distance
Photomapping
Signal reconstruction
Speech
Speech communication
Autocorrelation functions
Distance algorithm
Encrypted speech
Integrity authentications
Mapping algorithms
Retrieval efficiency
Spectral subtractions
Strong robustness
Handwaving Authentication: Unlocking Your Smartwatch Through Handwaving Biometrics
会议论文
作者:
Wang, Zhao
;
Shen, Chao
;
Chen, Yufei
收藏
  |  
浏览/下载:1/0
  |  
提交时间:2019/11/26
Authentication mechanisms
Authentication methods
Motion sensors
One-class classification algorithm
Secure authentications
Smartwatch unlocking
User authentication
Wearable devices
Design and research of a new secure authentication protocol in GSM networks
会议论文
International Seminar on Applied Physics, Optoelectronics and Photonics, APOP 2016, Shanghai, China, May 28, 2016 - May 29, 2016
作者:
Qi, Ai-Qin
;
Shen, Yong-Jun
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2017/01/17
Network security
Authentication
Global system for mobile communications
Network protocols
Authentication protocols
Following problem
Secure authentications
Security and performance
Security application
Security protection
Security services
Square roots
Secure access authentication scheme for 4G wireless network based on PCL
期刊论文
Tongxin Xuebao/Journal on Communications, 2012, 卷号: 33, 期号: 4, 页码: 77-84
作者:
Wang, Li-Li
;
Feng, Tao
;
Ma, Jian-Feng
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2020/11/14
4G mobile communication systems
Authentication
Computer circuits
Computer terminals
Cryptography
Mobile telecommunication systems
Network security
Wireless networks
4G wireless networks
Access authentications
Authentication protocols
Comprehensive analysis
Protocol composition logic
Protocol derivation systems
Security attributes
Selfcertified public key
WAPI secure access authentication scheme for heterogeneous networks based on identity-based cryptograph
会议论文
Seoul, Korea, Republic of, April 24, 2012 - April 26, 2012
作者:
Feng, Tao
;
Jiao, Jian
收藏
  |  
浏览/下载:11/0
  |  
提交时间:2020/11/15
Authentication
Computation theory
Computer circuits
Cryptography
Heterogeneous networks
Information management
Mobile security
Wireless local area networks (WLAN)
Access authentications
Authentication protocols
Comprehensive analysis
Identity based cryptographs
Man in the middle attacks
Mutual authentication
Protocol composition logic
WAPI
Anonymous identity authentication scheme in wireless roaming communication
会议论文
Seoul, Korea, Republic of, April 24, 2012 - April 26, 2012
作者:
Feng, Tao
;
Zhou, Wenying
;
Li, Xinghua
收藏
  |  
浏览/下载:19/0
  |  
提交时间:2020/11/15
Information management
Anonymous authentication
Identity authentication
Mobile users
Mutual anonymity
Secure authentications
Security model
Selfcertified public key
Universally composable
Secure re-authentication scheme for 3G-WLAN integrating network based on protocol composition logic
会议论文
Nanjing, China, August 11, 2012 - August 13, 2012
作者:
Feng, Tao
;
Chen, Hui
;
Ma, Jian-Feng
收藏
  |  
浏览/下载:12/0
  |  
提交时间:2020/11/15
Authentication
Internet protocols
Mobile security
Wireless local area networks (WLAN)
3G-WLAN
Authentication algorithm
EAP-AKA
Integrating networks
Parallel composition
Protocol composition logic
Re authentications
Re-authentication protocols
改进的多因素身份认证通用集成框架
学位论文
2011, 2011
杨静
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2016/02/14
集成框架
生物特征
多因素身份认证
Windows登录
Framework
Biometrics
Multifactor Authentication
Windows logon
Multiple hash sub-chains: Authentication for the hierarchical sensor networks
期刊论文
Information Technology Journal, 2010, 卷号: 9, 期号: 4, 页码: 740-748
作者:
Gao, Ang
;
Wei, Wei
;
Xiao, Xiangrong
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/18
Authentication scheme
Communication range
Distributed strategies
Hash chains
Hierarchical sensor network
Internal attacks
Secure authentications
Wireless sensor network (WSNs)
A hierarchical authentication scheme for the different radio ranges sensor networks
会议论文
作者:
Gao, Ang
;
Wei, Wei
;
Wang, Zhixiao
;
Wenyao, Yan
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/18
Authentication scheme
Communication overheads
Communication radius
Distributed strategies
Influence of environments
Key pre-distribution
Man-in-middle attacks
Secure authentications
©版权所有 ©2017 CSpace - Powered by
CSpace