搜索结果: 1-15 共查到“工学 authentication”相关记录24条 . 查询时间(0.078 秒)
中国地质大学科学技术发展院章丽平,张艺馨,唐善玉等计算机学院,IEEE Transactions on Industrial Electronics, 2018, Privacy Protection for E-health Systems by Means of Dynamic Authentication and Three-factor Key Agreement
电子医疗;健康系统;通信安全;认证协议
2021/10/21
2018年,题为"Privacy Protection for E-health Systems Using Dynamic Authentication and Three-factor Key Agreement" 论文刊发在国际权威期刊《IEEE Transactions on Industrial Electronics》上。该文第一作者为中国地质大学计算机学院章丽平副教授。该文对电子医疗...
Study on Copyright Authentication of GIS Vector Data Based on Zero-Watermarking
GIS Copyright Authentication Digital Product Vector Data Zero-watermarking Hash
2015/12/18
GIS vector data is closely linked with the development of social economy and national defense, which is of high production cost and high precision, so the copyright protection of GIS vector data means...
Efficient authentication mechanisms for navigation systems–a radio-navigation case study
authentication mechanisms navigation systems radio-navigation
2015/6/25
In this paper we introduce an efficient authentication mechanism especially designed for navigation systems that is based upon the Timed Efficient Stream Loss-Tolerant Authentication (TESLA) algorithm...
Secure Location Verification A Security Analysis of GPS Signal Authentication
Location Verifi cation GPS Signal Authentication Geosecurity
2015/6/25
The use of location based services has increased significantly over the last few years. However, location information is only sparsely used as a security mechanism. One of the reasons for this i...
Authentication of Riesling wines from the Czech Republic on the basis of the non-flavonoid phenolic compounds
high-performance liquid chromatography multivariate analysis wine terroir chemotaxonomy
2014/2/24
Eighteen non-flavonoid phenolic compounds comprising hydroxybenzoic acids, hydroxycinnamates, and stilbenes were analysed in 43 monovarietal wines originated from five wine-growing regions in the Czec...
Robust and Discriminative Image Authentication Based on Sparse Coding
authentication sparse coding robustness discrimination similarity
2013/7/24
Image authentication is usually approached by checking the preservation of some invariant features, which are expected to be both robust and discriminative so that contentpreserving operations are acc...
Abstract—By allowing routers to randomly mix the information content in packets before forwarding them, network coding can maximize network throughput in a distributed manner with low complexity. Howe...
Authentication and Privacy in Vehicular Networks
Authentication Privacy Vehicular Networks
2010/9/25
Vehicular ad-hoc networks (VANETs) are composed mainly by vehicles.These communication networks allow data interchanging. In this way,more and better information is provided to drivers, thus achieving...
The Development of a B2G Online Authentication Standard: a design perspective of the policy consultation process
design science method artifact standards development
2009/12/7
The primary focus in design science research is the development of innovative and useful system artifacts. Apart from IT-centric artifacts such as software and hardware, design research outputs can al...
A secure media streaming mechanism combining encryption, authentication, and transcoding
Intelligent mid-network proxy Secure transcoding Sender authentication Media-aware encryption Media streaming
2013/7/16
Technology advancements are allowing more and more new media applications and services to be delivered over the Internet. Many of these applications and services require flexibility in media dis...
Image Authentication Using Added Signal-Dependent Noise
Image Authentication Added Signal-Dependent Noise
2009/9/4
Image authentication has applications in security systems, photo forensics, and photo journalism. This paper presents an image authentication scheme using added signal-dependent noise. Imperceptible n...
Ensuring Authentication of Digital Information using Cryptographic Accumulators
Stream Authentication Polynomial Reconstruction Erasure Channel Adversarial Channel Cryptographic Accumulator
2012/12/3
In this paper, we study the broadcast authentication problem for both erasure and adversarial networks. Two important concerns for authentication protocols are the authentication delay and the packet ...
Authentication of Gold Products by Nuclear Methods.
Quality Authentication of Percolated and Centrifuged Enzyme-Treated Virgin Oils Produced Processing Olives
biological continuous olive processing percolation-centrifugation system quality-typicality-genuineness of products
2009/7/7
Percolated and centrifuged virgin olive oils obtained from different olive varieties by the continuous combined enzyme-aided percolation-centrifugation extraction system have been characterized. The ...
Excerpt
.0.0.tar.gz # tar zxfv freeradius-1.0.0.tar.gz # cd freeradius-1.0.0 2. Configure, make and install: # ./configure # make # make install You can pass options to configure. Use ./configure --...