中国科学院机构知识库网格
Chinese Academy of Sciences Institutional Repositories Grid
首页
机构
成果
学者
登录
注册
登陆
×
验证码:
换一张
忘记密码?
记住我
×
校外用户登录
CAS IR Grid
机构
软件研究所 [10]
长春光学精密机械与物... [1]
采集方式
OAI收割 [11]
内容类型
期刊论文 [6]
会议论文 [5]
发表日期
2018 [1]
2013 [1]
2010 [2]
2009 [2]
2008 [1]
2007 [1]
更多
学科主题
Engineerin... [3]
筛选
浏览/检索结果:
共11条,第1-10条
帮助
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
题名升序
题名降序
提交时间升序
提交时间降序
作者升序
作者降序
发表日期升序
发表日期降序
Jamming Strategies for Physical Layer Security
期刊论文
OAI收割
IEEE Wireless Communications, 2018, 卷号: 25, 期号: 1, 页码: 148-153
作者:
Huo, Yan
;
Tian, Yuqi
;
Ma, Liran
;
Cheng, Xiuzhen
;
Jing, Tao
  |  
收藏
  |  
浏览/下载:26/0
  |  
提交时间:2019/09/17
Jamming
Network layers
Network security
Receivers (containers)
Transmitters
Wireless telecommunication systems
efficient and distributed authentication scheme for secure communication in manet
期刊论文
OAI收割
Journal of Computational Information Systems, 2013, 卷号: 9, 期号: 1, 页码: 57-64
Wang Daxing
;
Teng Jikai
  |  
收藏
  |  
浏览/下载:20/0
  |  
提交时间:2013/09/17
Authentication
Cryptography
Global system for mobile communications
Military applications
Network security
Telecommunication networks
adaptive voice stream multicast over low-power wireless networks
会议论文
OAI收割
31st IEEE Real-Time Systems Symposium, RTSS 2010, San Diego, CA, 40850
Liqun Li
;
Guoliang Xing
;
Qi Han
;
Limin Sun
收藏
  |  
浏览/下载:23/0
  |  
提交时间:2011/03/31
ad hoc voice communication
adaptive voice stream multicast
coding redundancy ratio
coordination rules
disaster response
distributed admission control algorithm
forward error correction
forwarder selection
low-power wireless networks
security surveillance
tree-based opportunistic routing protocol
voice quality
ad hoc networks
audio streaming
forward error correction
multicast communication
routing protocols
telecommunication congestion control
voice communication
towards a flexible spatially aware access control model
会议论文
OAI收割
2nd International Symposium on Data, Privacy and E-Commerce, ISDPE 2010, Buffalo, NY, United states, September
Zhang Desheng
;
Zhang Min
;
Chen Chi
  |  
收藏
  |  
浏览/下载:28/0
  |  
提交时间:2011/03/31
Data privacy
Electronic commerce
Error analysis
Mobile devices
Security systems
Telecommunication services
security analysis of two remote user authentication schemes using bilinear pairings
会议论文
OAI收割
2009 International Conference on Management of e-Commerce and e-Government, ICMeCG 2009, Nanchang, China, September
Tan Zuowen
  |  
收藏
  |  
浏览/下载:17/0
  |  
提交时间:2011/03/20
Electronic commerce
Government data processing
Mobile telecommunication systems
Security of data
a rate adaptive multicast mac protocol based on network coding
期刊论文
OAI收割
Hunan Daxue Xuebao/Journal of Hunan University Natural Sciences, 2009, 卷号: 36, 期号: 11, 页码: 78-82
Yang Lin
;
Zheng Gang
  |  
收藏
  |  
浏览/下载:19/0
  |  
提交时间:2011/03/18
Access control
Fluorine containing polymers
Local area networks
Multicasting
Network protocols
Security systems
Standards
Wireless telecommunication systems
analysis of an authenticated identity-based multicast scheme
期刊论文
OAI收割
IET COMMUNICATIONS, 2008, 卷号: 2, 期号: 7, 页码: 935-937
Lin X. -J.
;
Wu C. -K
;
Liu F.
  |  
收藏
  |  
浏览/下载:15/0
  |  
提交时间:2011/06/10
authenticated identity-based multicast scheme
bilinear pairing
ciphertext
message authentication
multicast communication
telecommunication security
extracting bulk configuration data from a relational umts management database
会议论文
OAI收割
10th IFIP/IEEE International Symposium on Integrated Network Management 2007, IM 07, Munich, Germany, 43972
Zhu Xiaosong
;
Jacob Paul
;
Fallon Enda
;
Donagh Fintan
;
Meara Eoin O.
;
Hayes Gregory
;
Qiao Yuansong
  |  
收藏
  |  
浏览/下载:21/0
  |  
提交时间:2011/06/29
Code division multiple access
Mobile telecommunication systems
Network security
Radio communication
Relational database systems
XML
efficient identity-based multicast scheme from bilinear pairing
期刊论文
OAI收割
IEE PROCEEDINGS-COMMUNICATIONS, 2005, 卷号: 152, 期号: 6, 页码: 877-882
Wang L
;
Wu CK
  |  
收藏
  |  
浏览/下载:23/0
  |  
提交时间:2011/07/28
backward secrecy
bilinear pairing
data integrity service
dynamic group key management
efficient identity-based multicast scheme
forward secrecy
multicast communication system
source authentication
cryptography
data integrity
message authentication
multicast protocols
telecommunication security
server-aided digital signature protocol based on password
会议论文
OAI收割
39th Annual International Carnahan Conference on Security Technology, Las Palmas, SPAIN, OCT 11-14,
He YZ
;
Wu CK
;
Feng DG
  |  
收藏
  |  
浏览/下载:17/0
  |  
提交时间:2011/07/28
cryptographic mechanism
secure communication
server-aided digital signature protocol
signature private key
client-server systems
digital signatures
private key cryptography
telecommunication security