工学 >>> 力学 农业工程 林业工程 工程与技术科学基础学科 测绘科学技术 材料科学 矿山工程技术 石油与天然气工程 冶金工程技术 机械工程 光学工程 仪器科学与技术 动力与电气工程 能源科学技术 核科学技术 电子科学与技术 信息与通信工程 控制科学与技术 计算机科学技术 化学工程 纺织科学技术 印刷工业 服装工业、制鞋工业 轻工技术与工程 食品科学技术 土木建筑工程 水利工程 交通运输工程 船舶与海洋工程 航空、航天科学技术 兵器科学与技术 环境科学技术 安全科学技术 工业设计
搜索结果: 1-15 共查到工学 authentication相关记录24条 . 查询时间(0.078 秒)
2018年,题为"Privacy Protection for E-health Systems Using Dynamic Authentication and Three-factor Key Agreement" 论文刊发在国际权威期刊《IEEE Transactions on Industrial Electronics》上。该文第一作者为中国地质大学计算机学院章丽平副教授。该文对电子医疗...
GIS vector data is closely linked with the development of social economy and national defense, which is of high production cost and high precision, so the copyright protection of GIS vector data means...
In this paper we introduce an efficient authentication mechanism especially designed for navigation systems that is based upon the Timed Efficient Stream Loss-Tolerant Authentication (TESLA) algorithm...
The use of location based services has increased signicantly over the last few years. However, location information is only sparsely used as a security mechanism. One of the reasons for this i...
Eighteen non-flavonoid phenolic compounds comprising hydroxybenzoic acids, hydroxycinnamates, and stilbenes were analysed in 43 monovarietal wines originated from five wine-growing regions in the Czec...
Image authentication is usually approached by checking the preservation of some invariant features, which are expected to be both robust and discriminative so that contentpreserving operations are acc...
Abstract—By allowing routers to randomly mix the information content in packets before forwarding them, network coding can maximize network throughput in a distributed manner with low complexity. Howe...
Vehicular ad-hoc networks (VANETs) are composed mainly by vehicles.These communication networks allow data interchanging. In this way,more and better information is provided to drivers, thus achieving...
The primary focus in design science research is the development of innovative and useful system artifacts. Apart from IT-centric artifacts such as software and hardware, design research outputs can al...
Technology advancements are allowing more and more new media applications and services to be delivered over the Internet. Many of these applications and services require flexibility in media dis...
Image authentication has applications in security systems, photo forensics, and photo journalism. This paper presents an image authentication scheme using added signal-dependent noise. Imperceptible n...
In this paper, we study the broadcast authentication problem for both erasure and adversarial networks. Two important concerns for authentication protocols are the authentication delay and the packet ...
Authentication of Gold Products by Nuclear Methods.
Percolated and centrifuged virgin olive oils obtained from different olive varieties by the continuous combined enzyme-aided percolation-centrifugation extraction system have been characterized. The ...
Excerpt .0.0.tar.gz # tar zxfv freeradius-1.0.0.tar.gz # cd freeradius-1.0.0 2. Configure, make and install: # ./configure # make # make install You can pass options to configure. Use ./configure --...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...