>>>
搜索结果: 1-15 共查到Authentication相关记录16条 . 查询时间(0.129 秒)
2018年,题为"Privacy Protection for E-health Systems Using Dynamic Authentication and Three-factor Key Agreement" 论文刊发在国际权威期刊《IEEE Transactions on Industrial Electronics》上。该文第一作者为中国地质大学计算机学院章丽平副教授。该文对电子医疗...
In this paper we introduce an efficient authentication mechanism especially designed for navigation systems that is based upon the Timed Efficient Stream Loss-Tolerant Authentication (TESLA) algorithm...
Image authentication is usually approached by checking the preservation of some invariant features, which are expected to be both robust and discriminative so that contentpreserving operations are acc...
Abstract—By allowing routers to randomly mix the information content in packets before forwarding them, network coding can maximize network throughput in a distributed manner with low complexity. Howe...
Vehicular ad-hoc networks (VANETs) are composed mainly by vehicles.These communication networks allow data interchanging. In this way,more and better information is provided to drivers, thus achieving...
The primary focus in design science research is the development of innovative and useful system artifacts. Apart from IT-centric artifacts such as software and hardware, design research outputs can al...
Technology advancements are allowing more and more new media applications and services to be delivered over the Internet. Many of these applications and services require flexibility in media dis...
Image authentication has applications in security systems, photo forensics, and photo journalism. This paper presents an image authentication scheme using added signal-dependent noise. Imperceptible n...
In this paper, we study the broadcast authentication problem for both erasure and adversarial networks. Two important concerns for authentication protocols are the authentication delay and the packet ...
Excerpt .0.0.tar.gz # tar zxfv freeradius-1.0.0.tar.gz # cd freeradius-1.0.0 2. Configure, make and install: # ./configure # make # make install You can pass options to configure. Use ./configure --...
Technologyadvancementsareallowingmoreandmorenewmediaapplicationsand servicestobedeliveredovertheInternet.Manyoftheseapplicationsandservices requireflexibilityinmediadistributionaswellassecurityinpro...
We study the multicast stream authentication problem when an opponent can drop, reorder and introduce data packets into the communication channel. In such a model, packet overhead and computing effic...
基于Authentication Test方法,围绕高效安全Internet密钥交换(ESIKE)协议的安全目标,提出一种具体地构建唯一满足两个通信实体变换边的形式化协议设计方法,设计出了高效安全的IKE协议;并且基于Strand Space模型和Authentication Test方法,形式化分析ESIKE协议,证明了其所具有的安全特性.该ESIKE协议克服了原有Internet密钥交换(IK...
Internationally, the need for federated Identity & Access Management continues to grow, as it allows users to get Single Sign-On access to external resources (a.k.a. Service Providers) using their hom...
This paper investigates the score normalization technique for enhancing the performance of face authentication. We firstly discuss the thresholding approach for face authentication and put forward the...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...