CSpace

浏览/检索结果: 共45条,第1-10条 帮助

已选(0)清除 条数/页:   排序方式:
Numerical security analysis of the three-state quantum key distribution protocol with realistic devices 期刊论文
JOURNAL OF THE OPTICAL SOCIETY OF AMERICA B-OPTICAL PHYSICS, 2024, 卷号: 41, 期号: 1, 页码: 258-269
作者:  Peng, Sirui;  Sun, Xiaoming;  Zhou, Hongyi
收藏  |  浏览/下载:7/0  |  提交时间:2024/05/20
Random Beam Switching: A Physical Layer Key Generation Approach to Safeguard mmWave Electronic Devices 期刊论文
IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2023, 卷号: 69, 期号: 3, 页码: 594-607
作者:  Ju, Ying;  Zou, Guoxue;  Bai, Haowen;  Liu, Lei;  Pei, Qingqi;  Wu, Celimuge;  Otaibi, Sattam Al
收藏  |  浏览/下载:13/0  |  提交时间:2023/12/04
Electronic device security  physical layer key generation  millimeter wave  static environments  beamforming  
Secured Data Transmission Over Insecure Networks-on-Chip by Modulating Inter-Packet Delays 期刊论文
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2022, 卷号: 41, 期号: 11, 页码: 4313-4324
作者:  Xu, Jiaen;  Wang, Xiaohang;  Jiang, Yingtao;  Singh, Amit Kumar;  Gu, Chongyan;  Huang, Letian;  Yang, Mei;  Li, Shunbin
收藏  |  浏览/下载:17/0  |  提交时间:2023/07/12
Block coding  inter-packet delay  network-on-chip (NoC)  secure channel  
A Blockchain-Based Shamir's Threshold Cryptography Scheme for Data Protection in Industrial Internet of Things Settings 期刊论文
IEEE INTERNET OF THINGS JOURNAL, 2022, 卷号: 9, 期号: 11, 页码: 8154-8167
作者:  Yu, Keping;  Tan, Liang;  Yang, Caixia;  Choo, Kim-Kwang Raymond;  Bashir, Ali Kashif;  Rodrigues, Joel J. P. C.;  Sato, Takuro
收藏  |  浏览/下载:24/0  |  提交时间:2022/12/07
Industrial Internet of Things  Security  Cloud computing  Blockchains  Encryption  Edge computing  Logic gates  Blockchain  data protection  Industrial Internet of Things (IIoT)  Shamir secret sharing (SSS)  
A blockchain-assisted framework for secure and reliable data sharing in distributed systems 期刊论文
EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2021, 卷号: 2021, 期号: 1, 页码: 19
作者:  Guo, Yu;  Wang, Shenling;  Huang, Jianhui
收藏  |  浏览/下载:40/0  |  提交时间:2021/12/01
Dynamic searchable encryption  Distributed data storage  Forward security  Smart contract  Blockchain  
Security risk and response analysis of typical application architecture of information and communication blockchain 期刊论文
NEURAL COMPUTING & APPLICATIONS, 2020, 页码: 11
作者:  Zhao, Hongwei;  Zhang, Moli;  Wang, Shi;  Li, Entang;  Guo, Zhenhua;  Sun, Dianmin
收藏  |  浏览/下载:40/0  |  提交时间:2021/12/01
Information and communication blockchain  Network security risks  Homomorphic verifiable secret sharing  Risk response  
HidingGAN: High Capacity Information Hiding with Generative Adversarial Network 期刊论文
COMPUTER GRAPHICS FORUM, 2019, 卷号: 38, 期号: 7, 页码: 393-401
作者:  Wang, Zihan;  Gao, Neng;  Wang, Xin;  Xiang, Ji;  Zha, Daren;  Li, Linghui
收藏  |  浏览/下载:44/0  |  提交时间:2020/12/10
Scan Chain Based Attacks and Countermeasures: A Survey 期刊论文
IEEE ACCESS, 2019, 卷号: 7, 页码: 85055-85065
作者:  Li, Xiaowei;  Li, Wenjie;  Ye, Jing;  Li, Huawei;  Hu, Yu
收藏  |  浏览/下载:60/0  |  提交时间:2019/12/10
Scan chain based attacks  test mode  mode switch  signature  secure scan chain  secret key  physical unclonable function  
无权访问的条目 学位论文
作者:  龚越
Adobe PDF(2560Kb)  |  收藏  |  浏览/下载:0/0  |  提交时间:2018/06/22
无权访问的条目 学位论文
作者:  李慧
Adobe PDF(3423Kb)  |  收藏  |  浏览/下载:0/0  |  提交时间:2018/07/02