×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
软件研究所 [24]
清华大学 [16]
兰州理工大学 [14]
西安交通大学 [8]
华南理工大学 [8]
上海电子信息职业技术... [7]
更多...
内容类型
期刊论文 [54]
会议论文 [50]
其他 [3]
发表日期
2021 [2]
2020 [2]
2019 [1]
2018 [3]
2016 [5]
2015 [4]
更多...
学科主题
Computer S... [2]
Informatio... [2]
computer s... [2]
Engineerin... [1]
electron t... [1]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共107条,第1-10条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Formal modeling and security analysis method of security protocol based on CPN
期刊论文
Tongxin Xuebao/Journal on Communications, 2021, 卷号: 42, 期号: 9, 页码: 240-253
作者:
Gong, Xiang
;
Feng, Tao
;
Du, Jinze
收藏
  |  
浏览/下载:8/0
  |  
提交时间:2022/02/17
Analysis method
Attack path
Colored Petri Nets
Formal analysis
Formal modeling
Formal security
Modeling analyzes
Security analysis
Security protocols
State-space
A Many-Objective Optimization Based Intelligent Intrusion Detection Algorithm for Enhancing Security of Vehicular Networks in 6G
期刊论文
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2021, 卷号: 70, 期号: 6, 页码: 5234-5243
作者:
Zhang, Zhixia
;
Cao, Yang
;
Cui, Zhihua
;
Zhang, Wensheng
;
Chen, Jinjun
收藏
  |  
浏览/下载:31/0
  |  
提交时间:2021/08/15
Intrusion detection
Security
6G mobile communication
Data models
Protocols
Optimization
Encryption
Controller area network (CAN)
intrusion detection
machine learning (ML)
many-objective optimization
vehicular networks security
CloudDLP: Transparent and Scalable Data Sanitization for Browser-Based Cloud Storage
期刊论文
IEEE ACCESS, 2020, 卷号: 8, 页码: 68449-68459
作者:
Han, Peiyi
;
Liu, Chuanyi
;
Cao, Jiahao
;
Duan, Shaoming
;
Pan, Hezhong
收藏
  |  
浏览/下载:8/0
  |  
提交时间:2020/12/10
Cloud computing
Machine learning
Browsers
Protocols
Cryptography
Electronic mail
Data loss prevention
data sanitization
data security
cloud storage
Research and Implementation of Secure Industrial Communication Protocols
会议论文
Dalian, China, March 20-22, 2020
作者:
Wang JR(王靖然)
;
Liu MZ(刘明哲)
;
Xu AD(徐皑冬)
;
Hu B(胡波)
;
Han XJ(韩晓佳)
收藏
  |  
浏览/下载:6/0
  |  
提交时间:2020/12/18
ICS information security
industrial communication protocols
identity authentication
data encryption
Modbus/TCP
PHY-Layer Cover-Free Coding for Wireless Pilot Authentication in IoV Communications: Protocol Design and Ultra-Security Proof
期刊论文
IEEE Internet of Things Journal, 2019, 卷号: 6, 页码: 171-187
作者:
Xu, Dongyang
;
Ren, Pinyi
;
Ritcey, James A.
收藏
  |  
浏览/下载:42/0
  |  
提交时间:2019/11/19
Authentication
channel training
Cloud computing
Communication system security
cover-free coding.
Encoding
OFDM
Physical-layer authentication
pilot-aware attack
Protocols
V2I
A Novel Key Agreement Protocol Based on RET Gadget Chains for Preventing Reused Code Attacks
期刊论文
IEEE ACCESS, 2018, 卷号: 6
作者:
Wu Fusheng
;
Zhang Huanguo
;
Ni Mingtao
;
Wang Jun
;
Ji Zhaoxu
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/12/05
Key agreement protocols
execution
RET gadget chains
security
program vulnerability
Implementation of SM4 on FPGA: Trade-Off Analysis between Area and Speed
会议论文
2018 International Conference on Intelligence and Safety for Robotics, ISR 2018
作者:
Guan, Z.
;
Li, Y.
;
Shang, T.
;
Liu, J.
;
Sun, M.
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2019/12/30
Cryptography
Economic and social effects
Field programmable gate arrays (FPGA)
Hardware
Intellectual property core
Internet protocols
Machine design
Robotics
Robots
Speed
Wireless telecommunication systems
Block cipher algorithms
Hardware schemes
Resource utilizations
Security
Trade off
Trade-off analysis
Upper and lower bounds
Wireless communications
Network security
A Blockchain-Based Collocation Storage Architecture for Data Security Process Platform of WSN
会议论文
Proceedings of the 2018 IEEE 22nd International Conference on Computer Supported Cooperative Work in Design, CSCWD 2018
作者:
Feng, L.
;
Zhang, H.
;
Lou, L.
;
Chen, Y.
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/30
Blockchain
Computer supported cooperative work
Digital storage
Distributed computer systems
Interactive computer systems
Network architecture
Network security
Asymmetric signature
Consensus algorithms
Consensus protocols
Distributed database
Distributed systems
Process platforms
Storage architectures
Terminal devices
Sensor nodes
Design and research of a new secure authentication protocol in GSM networks
会议论文
International Seminar on Applied Physics, Optoelectronics and Photonics, APOP 2016, Shanghai, China, May 28, 2016 - May 29, 2016
作者:
Qi, Ai-Qin
;
Shen, Yong-Jun
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2017/01/17
Network security
Authentication
Global system for mobile communications
Network protocols
Authentication protocols
Following problem
Secure authentications
Security and performance
Security application
Security protection
Security services
Square roots
Model checking quantum key distribution protocols
会议论文
作者:
Huang, Baichuan
;
Huang, Yan
;
Kong, Jiaming
;
Huang, Xin
收藏
  |  
浏览/下载:10/0
  |  
提交时间:2019/11/26
BB84
Discrete time Markov chains
Group QKD
Probabilistic computation tree logic
Quantum information theory
Quantum key distribution protocols
Security properties
Verification techniques
©版权所有 ©2017 CSpace - Powered by
CSpace