×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
清华大学 [13]
兰州理工大学 [12]
北京大学 [11]
软件研究所 [10]
重庆大学 [5]
山东大学 [5]
更多...
内容类型
期刊论文 [64]
会议论文 [14]
学位论文 [6]
其他 [2]
发表日期
2022 [1]
2021 [1]
2020 [4]
2019 [5]
2017 [3]
2016 [11]
更多...
学科主题
Computer S... [2]
计算机应用 [1]
计算机科学技术基础学... [1]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共86条,第1-10条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Verifiable speech retrieval algorithm based on KNN secure hashing
期刊论文
Multimedia Tools and Applications, 2022
作者:
An, Li
;
Huang, Yi-bo
;
Zhang, Qiu-yu
收藏
  |  
浏览/下载:18/0
  |  
提交时间:2022/09/22
Biometrics
Cryptography
Efficiency
Learning algorithms
Speech communication
Speech transmission
Biometric template
Compressed-Sensing
Encryption algorithms
Hyperchaotic
Hyperchaotic lorenz compressed sensing encryption algorithm
KNN secure hash
Secure hash
Security
Speech retrieval
Verifiable speech retrieval
Quantum Algorithm for Boolean Equation Solving and Quantum Algebraic Attack on Cryptosystems
期刊论文
JOURNAL OF SYSTEMS SCIENCE & COMPLEXITY, 2021, 页码: 40
作者:
Chen Yu-Ao
;
Gao Xiao-Shan
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2021/04/26
Block cipher AES
Boolean equation solving
condition number
hash function SHA-3
Keccak
HHL algorithm
MPKC
polynomial system solving
quantum algorithm
stream cipher Trivum
A Guaranteed Secure Scan Design Based on Test Data Obfuscation by Cryptographic Hash
期刊论文
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2020, 卷号: 39, 期号: 12, 页码: 4524-4536
作者:
Cui, Aijiao
;
Li, Mengyang
;
Qu, Gang
;
Li, Huawei
收藏
  |  
浏览/下载:14/0
  |  
提交时间:2021/12/01
Ciphers
Encryption
Integrated circuits
Side-channel attacks
Testing
Cryptographic hash function
obfuscation logic
scan design
scan-based side-channel attack
Virtual Block Group: A Scalable Blockchain Model with Partial Node Storage and Distributed Hash Table
期刊论文
COMPUTER JOURNAL, 2020, 卷号: 63
作者:
Yu, Bin
;
Li, Xiaofeng
;
Zhao, He
收藏
  |  
浏览/下载:70/0
  |  
提交时间:2021/03/15
blockchain
virtual block group
storage scalability
DHT protocol
An efficient retrieval approach for encrypted speech based on biological hashing and spectral subtraction
期刊论文
Multimedia Tools and Applications, 2020, 卷号: 79, 期号: 39-40, 页码: 29775-29798
作者:
Zhang, Qiu-yu
;
Li, Gai-li
;
Huang, Yi-bo
收藏
  |  
浏览/下载:14/0
  |  
提交时间:2020/11/14
Authentication
Conformal mapping
Cryptography
Discrete wavelet transforms
Efficiency
Fast Fourier transforms
Hamming distance
Photomapping
Signal reconstruction
Speech
Speech communication
Autocorrelation functions
Distance algorithm
Encrypted speech
Integrity authentications
Mapping algorithms
Retrieval efficiency
Spectral subtractions
Strong robustness
A Subject-Sensitive Perceptual Hash Based on MUM-Net for the Integrity Authentication of High Resolution Remote Sensing Images
期刊论文
ISPRS INTERNATIONAL JOURNAL OF GEO-INFORMATION, 2020, 卷号: 9, 期号: 8, 页码: 28
作者:
Ding, Kaimeng
;
Liu, Yueming
;
Xu, Qin
;
Lu, Fuqiang
收藏
  |  
浏览/下载:13/0
  |  
提交时间:2021/03/18
perceptual hash
integrity authentication
subject-sensitive
HRRS image
deep learning
LAMANCO: A Lightweight Anonymous Mutual Authentication Scheme for N-Times Computing Offloading in IoT
期刊论文
IEEE INTERNET OF THINGS JOURNAL, 2019, 卷号: 6, 期号: 3, 页码: 4462-4471
作者:
Guizani, Mohsen
;
Du, Xiaojiang
;
Zhu, Liehuang
;
Xu, Yongjun
;
Wang, Fei
收藏
  |  
浏览/下载:49/0
  |  
提交时间:2019/08/16
Authentication
computing offloading (CO)
Internet of Things (IoT)
privacy preserving
A secure hash function based on feedback iterative structure
期刊论文
Enterprise Information Systems, 2019, 卷号: Vol.13 No.3, 页码: 281-302
作者:
Yijun Yang
;
Fei Chen
;
Jianyong Chen
;
Yong Zhang
;
Kai Leung Yung
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2019/12/17
Hash
function
feedback
iterative
structure
compression
function
collision
resistance
avalanche
An efficient retrieval algorithm of encrypted speech based on inverse fast Fourier transform and measurement matrix
期刊论文
TURKISH JOURNAL OF ELECTRICAL ENGINEERING AND COMPUTER SCIENCES, 2019, 卷号: 27, 期号: 3, 页码: 1719-1736
作者:
Zhang, Qiuyu
;
Ge, Zixian
;
Zhou, Liang
;
Zhang, Yongbing
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2019/11/15
Encrypted speech retrieval
perceptual hashing
inverse fast Fourier transform
measurement matrix
Henon chaotic scrambling
speech feature extraction
MPR Based Secure Content Routing Scheme for NDN-MANET
期刊论文
JOURNAL OF INTERNET TECHNOLOGY, 2019, 卷号: 20, 期号: 5, 页码: 1625-1636
作者:
Guo, Xian
;
Zhang, Ma-Jiang
;
Ngaboyindekwe, Aristide
;
Fang, Jun-Li
;
Wang, Jing
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2020/02/24
Named data networking
MANET
Merkle tree
Secure content routing
©版权所有 ©2017 CSpace - Powered by
CSpace