咨询与建议

限定检索结果

文献类型

  • 2 篇 会议

馆藏范围

  • 2 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2 篇 工学
    • 2 篇 信息与通信工程
    • 1 篇 电气工程
    • 1 篇 计算机科学与技术...

主题

  • 2 篇 macless
  • 2 篇 one-time message...
  • 2 篇 one-time bio-key
  • 2 篇 cloud computing

机构

  • 1 篇 huazhong univ sc...
  • 1 篇 cluster and grid...
  • 1 篇 univ basrah basr...
  • 1 篇 university of ba...
  • 1 篇 southern tech un...

作者

  • 1 篇 abbdal salah h.
  • 1 篇 mohammed abdulri...
  • 1 篇 yassin ali a.
  • 1 篇 hussain mohammed...
  • 1 篇 zou deqing
  • 1 篇 deqing zou
  • 1 篇 ali a. yassin
  • 1 篇 hai jin
  • 1 篇 zaid ameen abdul...
  • 1 篇 jin hai
  • 1 篇 salah h. abbdal
  • 1 篇 abduljabbar zaid...
  • 1 篇 zaid alaa hussie...
  • 1 篇 hussien zaid ala...

语言

  • 2 篇 英文
检索条件"主题词=One-Time Message/Image Document Authentication Code"
2 条 记 录,以下是1-10 订阅
排序:
Robust Scheme to Protect authentication code of message/image documents in Cloud Computing
Robust Scheme to Protect Authentication Code of Message/Imag...
收藏 引用
International Conference on Computing, Networking and Communications (ICNC)
作者: Abduljabbar, Zaid Ameen Jin, Hai Yassin, Ali A. Hussien, Zaid Alaa Hussain, Mohammed Abdulridha Abbdal, Salah H. Zou, Deqing Huazhong Univ Sci & Technol Sch Comp Sci & Technol Cluster & Grid Comp Lab Serv Comp Technol & Syst Lab Wuhan 430074 Peoples R China Univ Basrah Basrah Iraq Southern Tech Univ Basrah Iraq
A number of image/message document authentication and integrity schemes have been conducted to recognize any modification in the exchange of documents between two entities (sender and receiver) within a cloud environm... 详细信息
来源: 评论
Robust Scheme to Protect authentication code of message/image documents in Cloud Computing
Robust Scheme to Protect Authentication Code of Message/Imag...
收藏 引用
International Conference on Computing, Networking and Communications
作者: Zaid Ameen Abduljabbar Hai Jin Ali A. Yassin Zaid Alaa Hussien Mohammed Abdulridha Hussain Salah H. Abbdal Deqing Zou Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology University of Basrah
A number of image/message document authentication and integrity schemes have been conducted to recognize any modification in the exchange of documents between two entities (sender and receiver) within a cloud environm... 详细信息
来源: 评论