CSpace

浏览/检索结果: 共142条,第1-10条 帮助

已选(0)清除 条数/页:   排序方式:
A New Reconfigurable True Random Number Generator and Physical Unclonable Function Unified Chip With On-Chip Auto-Calibration 期刊论文
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS, 2023, 页码: 14
作者:  Cao, Yuan;  Liu, Wanyi;  Zheng, Yue;  Chen, Shuai;  Ye, Jing;  Qian, Lei;  Chang, Chip-Hong
收藏  |  浏览/下载:8/0  |  提交时间:2023/12/04
Entropy  Authentication  System-on-chip  Protocols  Jitter  Computer architecture  Rail to rail outputs  True random number generator  physical unclonable function  current-starved ring oscillator  
Secure and Efficient Blockchain-Assisted Authentication for Edge-Integrated Internet-of-Vehicles 期刊论文
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2022, 卷号: 71, 期号: 11, 页码: 12250-12263
作者:  Shen, Meng;  Lu, Hao;  Wang, Fei;  Liu, Huisen;  Zhu, Liehuang
收藏  |  浏览/下载:13/0  |  提交时间:2023/07/12
Blockchain  identity authentication  Internet-of-Vehicles  
LIAS: A Lightweight Incentive Authentication Scheme for Forensic Services in IoV 期刊论文
IEEE TRANSACTIONS ON AUTOMATION SCIENCE AND ENGINEERING, 2022, 页码: 16
作者:  Zhang, Mingyue;  Zhou, Junlong;  Cong, Peijin;  Zhang, Gongxuan;  Zhuo, Cheng;  Hu, Shiyan
收藏  |  浏览/下载:19/0  |  提交时间:2022/12/07
Forensics  Authentication  Security  Privacy  Computer architecture  Cameras  Message authentication  Anonymous authentication  forensic service  lightweight  incentive  Internet of Vehicles  security  
Towards Secure and Privacy-Preserving Data Sharing for COVID-19 Medical Records: A Blockchain-Empowered Approach 期刊论文
IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2022, 卷号: 9, 期号: 1, 页码: 271-281
作者:  Tan, Liang;  Yu, Keping;  Shi, Na;  Yang, Caixia;  Wei, Wei;  Lu, Huimin
收藏  |  浏览/下载:18/0  |  提交时间:2022/12/07
COVID-19  Blockchains  Encryption  Privacy  Hospitals  Outsourcing  Authorization  Blockchain  security and privacy protection  traceable and revocation  COVID-19  electronic medical records  
Blockchain-Enhanced Data Sharing With Traceable and Direct Revocation in IIoT 期刊论文
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2021, 卷号: 17, 期号: 11, 页码: 7669-7678
作者:  Yu, Keping;  Tan, Liang;  Aloqaily, Moayad;  Yang, Hekun;  Jararweh, Yaser
收藏  |  浏览/下载:34/0  |  提交时间:2021/12/01
Industrial Internet of Things  Smart manufacturing  Blockchain  Security  Access control  Encryption  Cloud computing  Big data  blockchain  data sharing  industrial Internet-of-Thing (IIoT)  smart factory  traceable and revocation  
An Efficient Full Hardware Implementation of Extended Merkle Signature Scheme 期刊论文
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS, 2021, 页码: 12
作者:  Cao, Yuan;  Wu, Yanze;  Wang, Wen;  Lu, Xu;  Chen, Shuai;  Ye, Jing;  Chang, Chip-Hong
收藏  |  浏览/下载:24/0  |  提交时间:2022/06/21
Hardware  Random access memory  Software algorithms  Quantum computing  Field programmable gate arrays  Computers  NIST  Post-quantum cryptography  eXtended Merkle signature scheme  hardware accelerator  
A blockchain-empowered AAA scheme in the large-scale HetNet 期刊论文
DIGITAL COMMUNICATIONS AND NETWORKS, 2021, 卷号: 7, 期号: 3, 页码: 308-316
作者:  Shi, Na;  Tan, Liang;  Li, Wenjuan;  Qi, Xin;  Yu, Keping
收藏  |  浏览/下载:36/0  |  提交时间:2021/12/01
HetNet  AAA  Privacy preserving  Blockchain  Transaction  
Enhancing the security of memory in cloud infrastructure through in-phase change memory data randomisation 期刊论文
IET COMPUTERS AND DIGITAL TECHNIQUES, 2021, 页码: 14
作者:  Zhou, Xianzhong;  Wang, Ying
收藏  |  浏览/下载:27/0  |  提交时间:2021/12/01
Secure V2X Communication Network based on Intelligent PKI and Edge Computing 期刊论文
IEEE NETWORK, 2020, 卷号: 34, 期号: 2, 页码: 172-178
作者:  Qiu, Han;  Qiu, Meikang;  Lu, Ruqian
收藏  |  浏览/下载:44/0  |  提交时间:2020/12/10
Vehicle-to-everything  Servers  Security  Edge computing  Prediction algorithms  Autonomous vehicles  
A Novel Image Tamper Detection and Self-Recovery Algorithm Based on Watermarking and Chaotic System 期刊论文
MATHEMATICS, 2019, 卷号: 7, 期号: 10, 页码: 17
作者:  Li, Yewen;  Song, Wei;  Zhao, Xiaobing;  Wang, Juan;  Zhao, Lizhi
收藏  |  浏览/下载:48/0  |  提交时间:2020/12/10
image authentication  image recovery  smooth function  chaotic system  hierarchical tamper detection