×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
武汉大学 [100]
北京大学 [73]
软件研究所 [60]
湖南大学 [52]
兰州理工大学 [46]
北京航空航天大学 [41]
更多...
内容类型
期刊论文 [478]
会议论文 [161]
其他 [44]
学位论文 [34]
会议 [1]
发表日期
2021 [8]
2020 [4]
2019 [39]
2018 [53]
2017 [53]
2016 [69]
更多...
学科主题
Computer S... [3]
Engineerin... [2]
Computer S... [1]
Computer S... [1]
Computer S... [1]
Health Car... [1]
更多...
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共718条,第1-10条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
A retrieval method for encrypted speech based on improved power normalized cepstrum coefficients and perceptual hashing
期刊论文
Multimedia Tools and Applications, 2022, 卷号: 81, 期号: 11, 页码: 15127-15151
作者:
Zhang, Qiu-yu
;
Bai, Jian
;
Xu, Fu-jiu
收藏
  |  
浏览/下载:19/0
  |  
提交时间:2022/06/20
Authentication
Chaotic systems
Discrete wavelet transforms
Efficiency
Extraction
Hamming distance
Hash functions
Information retrieval
Principal component analysis
Speech
Cepstrum
Chaotic mapping
Encrypted speech
Encrypted speech retrieval
Features extraction
Henon chaotic mapping
Perceptual hashing
Power
Power normalized cepstrum coefficient
Speech feature extraction
Speech features
Speech retrieval
Blockchain-Enhanced Data Sharing With Traceable and Direct Revocation in IIoT
期刊论文
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2021, 卷号: 17, 期号: 11, 页码: 7669-7678
作者:
Yu, Keping
;
Tan, Liang
;
Aloqaily, Moayad
;
Yang, Hekun
;
Jararweh, Yaser
收藏
  |  
浏览/下载:21/0
  |  
提交时间:2021/12/01
Industrial Internet of Things
Smart manufacturing
Blockchain
Security
Access control
Encryption
Cloud computing
Big data
blockchain
data sharing
industrial Internet-of-Thing (IIoT)
smart factory
traceable and revocation
A blockchain-empowered AAA scheme in the large-scale HetNet
期刊论文
DIGITAL COMMUNICATIONS AND NETWORKS, 2021, 卷号: 7, 期号: 3, 页码: 308-316
作者:
Shi, Na
;
Tan, Liang
;
Li, Wenjuan
;
Qi, Xin
;
Yu, Keping
收藏
  |  
浏览/下载:22/0
  |  
提交时间:2021/12/01
HetNet
AAA
Privacy preserving
Blockchain
Transaction
IoT Data Privacy Protection Scheme based on Blockchain
期刊论文
IOP Conference Series: Earth and Environmental Science, 2021, 卷号: 769
作者:
Wu,Yue
;
Song,Liangtu
;
Liu,Lei
;
Wang,Qijin
收藏
  |  
浏览/下载:12/0
  |  
提交时间:2021/06/21
Security and Efficient Authentication Scheme for Mobile Edge Computing
期刊论文
Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications, 2021, 卷号: 44, 期号: 1, 页码: 110-116
作者:
Xue, Jian-Bin
;
Bai, Zi-Mei
收藏
  |  
浏览/下载:12/0
  |  
提交时间:2021/06/03
Authentication
Computer terminals
Cryptography
Edge computing
Mobile telecommunication systems
Security systems
Authentication scheme
Computing environments
Efficient authentication
Lightweight identity authentication protocol
Man in the middle attacks
Mutual authentication
Physical layer security
Symmetric crypto systems
Blockchain-Based Secured IPFS-Enable Event Storage Technique With Authentication Protocol in VANET
期刊论文
IEEE/CAA Journal of Automatica Sinica, 2021, 卷号: 8, 期号: 12, 页码: 1913-1922
作者:
Sanjeev Kumar Dwivedi
;
Ruhul Amin
;
Satyanarayana Vollala
收藏
  |  
浏览/下载:18/0
  |  
提交时间:2021/09/03
Authentication
blockchain
interplanetary file system (
IPFS
)
secure information sharing
security
Group signature with time-bound keys and unforgeability of expiry time for smart cities
期刊论文
EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2021, 卷号: 2021, 期号: 1
作者:
Fang, Junli
;
Feng, Tao
收藏
  |  
浏览/下载:12/0
  |  
提交时间:2021/06/03
Group signatures
Unforgeability of expiry time
Time-bound keys
Internet of things
Smart cities
Cross-domain single sign-on authentication of information security in network environment
期刊论文
International Journal of Information and Communication Technology, 2021, 卷号: 18, 期号: 1, 页码: 89-104
作者:
Cui, A-Jun
;
Wang, Wei
;
Zhang, Hua-Feng
;
Ma, Yan-Hong
;
Li, Chen
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2021/03/02
Authentication
Authentication methods
Authentication scheme
Data packet loss rate
Efficient interaction
Identity providers
Information integrity
Revocation scheme
Service provider
A Novel Compressive Image Encryption with an Improved 2D Coupled Map Lattice Model
期刊论文
SECURITY AND COMMUNICATION NETWORKS, 2021, 卷号: 2021
作者:
Liu, Zhuo
;
Wang, Yong
;
Zhang, Leo Yu
;
Ma, Jun
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2021/06/03
An efficient retrieval approach for encrypted speech based on biological hashing and spectral subtraction
期刊论文
Multimedia Tools and Applications, 2020, 卷号: 79, 期号: 39-40, 页码: 29775-29798
作者:
Zhang, Qiu-yu
;
Li, Gai-li
;
Huang, Yi-bo
收藏
  |  
浏览/下载:14/0
  |  
提交时间:2020/11/14
Authentication
Conformal mapping
Cryptography
Discrete wavelet transforms
Efficiency
Fast Fourier transforms
Hamming distance
Photomapping
Signal reconstruction
Speech
Speech communication
Autocorrelation functions
Distance algorithm
Encrypted speech
Integrity authentications
Mapping algorithms
Retrieval efficiency
Spectral subtractions
Strong robustness
©版权所有 ©2017 CSpace - Powered by
CSpace