×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
北京航空航天大学 [22]
软件研究所 [13]
深圳先进技术研究院 [7]
华南理工大学 [7]
清华大学 [4]
湖南大学 [4]
更多...
内容类型
会议论文 [75]
发表日期
2022 [1]
2019 [1]
2018 [8]
2017 [6]
2016 [6]
2015 [2]
更多...
学科主题
计算机科学技术基础学... [2]
计算机系统结构::计... [2]
计算机软件::操作系... [2]
计算机软件::程序设... [2]
计算机软件::编译系... [2]
accidents ... [1]
更多...
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共75条,第1-10条
帮助
限定条件
内容类型:会议论文
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Service Encapsulation Method Based on Industrial Internet
会议论文
Shanghai, China, March 18-19, 2022
作者:
Li, Kai
;
Pan H(潘昊)
;
Tong X(佟星)
;
Li D(李栋)
;
Wang T(王挺)
收藏
  |  
浏览/下载:17/0
  |  
提交时间:2022/04/13
Service encapsulation
Basic service encapsulation
Functional service encapsulation
OPCUA
An Architectural-Enhanced Secure Design in Embedded System
会议论文
Proceedings of the IEEE International Conference on Software Engineering and Service Sciences, ICSESS, 2018-11-23
作者:
Wang, X.
;
Xu, B.
;
Wang, W.
;
Zhang, Z.
;
Zhang, X.
收藏
  |  
浏览/下载:19/0
  |  
提交时间:2019/12/30
Cryptography
Hardware security
Intrusion detection
Software engineering
Architectural enhancement
Buffer overflows
Cryptographic algorithms
execution behavior
Memory authentication
Performance loss
Security solutions
Software and hardwares
Embedded systems
Hybrid Sorting Method for Successive Cancellation List Decoding of Polar Codes
会议论文
日本东京, 2017.11.24-2017.11.26
作者:
Li H
;
Guo C
;
Wang D
收藏
  |  
浏览/下载:17/0
  |  
提交时间:2018/06/01
Polar Codes
Successive Cancellation List Decoding
Metric Sorting
A novel security validation in embedded system
会议论文
Proceedings of the IEEE International Conference on Software Engineering and Service Sciences, ICSESS
作者:
Wang, X.
;
Xu, B.
;
Wang, W.
;
Li, L.
;
Du, P.
收藏
  |  
浏览/下载:10/0
  |  
提交时间:2019/12/30
Hardware
Hardware security
Intrusion detection
Program compilers
execution behavior
Experimental analysis
Hardware-assisted
Memory access validations
Performance penalties
Response mechanisms
secure tag
Software vulnerabilities
Embedded systems
Implementation of SM4 on FPGA: Trade-Off Analysis between Area and Speed
会议论文
2018 International Conference on Intelligence and Safety for Robotics, ISR 2018
作者:
Guan, Z.
;
Li, Y.
;
Shang, T.
;
Liu, J.
;
Sun, M.
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2019/12/30
Cryptography
Economic and social effects
Field programmable gate arrays (FPGA)
Hardware
Intellectual property core
Internet protocols
Machine design
Robotics
Robots
Speed
Wireless telecommunication systems
Block cipher algorithms
Hardware schemes
Resource utilizations
Security
Trade off
Trade-off analysis
Upper and lower bounds
Wireless communications
Network security
Embedded System Confidentiality Protection by Cryptographic Engine Implemented with Composite Field Arithmetic
会议论文
MATEC Web of Conferences
作者:
Wang, W.
;
Wang, X.
;
Du, P.
;
Tian, Y.
;
Zhang, X.
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/12/30
Computer circuits
Cryptography
Engines
Hardware
Hardware security
Network security
Programmable logic controllers
System-on-chip
Composite field arithmetics
Cryptographic engines
Encryption and decryption
Hardware implementations
Memory encryption
Proposed architectures
Protection methods
Resource consumption
Embedded systems
An Optimized Method of Hardware Implementation for LHash in the Embedded System
会议论文
PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND APPLICATION ENGINEERING (CSAE2018), 2018-01-01
作者:
Wang, Xiang
;
Tian, Yuntong
;
Du, Pei
;
Zhang, Xiaobing
;
Wang, Weike
收藏
  |  
浏览/下载:18/0
  |  
提交时间:2019/12/30
embedded system
lightweight
hash function
hardware implementation
security
H-securebox: A hardened memory data protection framework on ARM devices
会议论文
Proceedings - 2018 IEEE 3rd International Conference on Data Science in Cyberspace, DSC 2018
作者:
Zhang, Z.
;
Li, Z.
;
Xia, C.
;
Cui, J.
;
Ma, J.
收藏
  |  
浏览/下载:8/0
  |  
提交时间:2019/12/30
ARM processors
Computers
Data privacy
Hardening
Data-protection strategy
Hardware virtualization
Hypervisor
Kernel level attack
Low-power consumption
Private information
Security evaluation
Security vulnerabilities
Linux
Hardware-Based Protection for Data Security at Run-Time on Embedded Systems
会议论文
IOP Conference Series: Materials Science and Engineering
作者:
Wang, X.
;
Zhang, X.
;
Wang, W.
;
Du, P.
;
Zhang, Z.
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2019/12/30
Data privacy
Embedded systems
Hash functions
Memory architecture
Network security
Advanced Encryption Standard
Encryption algorithms
Hardware-based protection
Integrity protection
Performance penalties
Security Architecture
Security mechanism
System on a programmable chips
Hardware security
Sensitivity analysis of ring oscillator based hardware Trojan detection
会议论文
International Conference on Communication Technology Proceedings, ICCT
作者:
Qin, Y.
;
Xia, T.
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/12/30
Field programmable gate arrays (FPGA)
Hardware
Integrated circuits
Malware
Oscillators (electronic)
Sensitivity analysis
Switching
Detection accuracy
Detection methods
Detection sensitivity
Hardware Trojan detection
Ring oscillator
Security
Spatial influences
Trojan detections
Hardware security
©版权所有 ©2017 CSpace - Powered by
CSpace