咨询与建议

限定检索结果

文献类型

  • 12 篇 会议
  • 6 篇 期刊文献

馆藏范围

  • 18 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 16 篇 工学
    • 10 篇 计算机科学与技术...
    • 7 篇 电气工程
    • 6 篇 信息与通信工程
    • 2 篇 电子科学与技术(可...
    • 1 篇 机械工程
    • 1 篇 交通运输工程
    • 1 篇 网络空间安全
  • 2 篇 理学
    • 2 篇 物理学
  • 2 篇 管理学
    • 1 篇 管理科学与工程(可...
    • 1 篇 图书情报与档案管...

主题

  • 18 篇 signature algori...
  • 4 篇 digital signatur...
  • 3 篇 scheme
  • 2 篇 signatures
  • 2 篇 algorithms
  • 2 篇 internets
  • 2 篇 cryptography
  • 2 篇 secure
  • 1 篇 dedicated physic...
  • 1 篇 internet of thin...
  • 1 篇 aggregates
  • 1 篇 gain
  • 1 篇 peers
  • 1 篇 rank metric
  • 1 篇 public key crypt...
  • 1 篇 tracking managem...
  • 1 篇 echo
  • 1 篇 statistical test...
  • 1 篇 topic signature
  • 1 篇 mobile agents

机构

  • 2 篇 univ waterloo de...
  • 1 篇 nanyang technol ...
  • 1 篇 beijing univ tec...
  • 1 篇 key laboratory o...
  • 1 篇 univ bordeaux in...
  • 1 篇 acad sinica inst...
  • 1 篇 beijing jiaotong...
  • 1 篇 tongji univ sch ...
  • 1 篇 tongji univ sch ...
  • 1 篇 peking univ sch ...
  • 1 篇 beihang univ sta...
  • 1 篇 acad sinica grad...
  • 1 篇 chinese acad sci...
  • 1 篇 inrs-emt univers...
  • 1 篇 univ waterloo da...
  • 1 篇 univ limoges xli...
  • 1 篇 chonbuk natl uni...
  • 1 篇 institute of inf...
  • 1 篇 military technic...
  • 1 篇 guangdong power ...

作者

  • 1 篇 yaosong lu
  • 1 篇 su shenghui
  • 1 篇 wuqiang shen
  • 1 篇 donghe ni
  • 1 篇 wu guohua
  • 1 篇 gaborit philippe
  • 1 篇 liu tianhao
  • 1 篇 ye df
  • 1 篇 ruigang liang
  • 1 篇 chang xiaolin
  • 1 篇 ho pin-han
  • 1 篇 xiaoquan chen an...
  • 1 篇 ruatta olivier
  • 1 篇 li lun
  • 1 篇 chen chen
  • 1 篇 liu ming
  • 1 篇 xiang li
  • 1 篇 he guangqiang
  • 1 篇 guo ying
  • 1 篇 eweda e

语言

  • 17 篇 英文
  • 1 篇 其他
检索条件"主题词=Signature algorithm"
18 条 记 录,以下是11-20 订阅
排序:
Facial Biometrics for 2D Barcodes
Facial Biometrics for 2D Barcodes
收藏 引用
Federated Conference on Computer Science and Information Systems (FedCSIS)
作者: Querini, Marco Italiano, Giuseppe F. Univ Roma Tor Vergata I-00133 Rome Italy
This paper proposes a novel use of 2D barcodes to store biometric data, in particular for facial recognition, which represents one of the least invasive biometric techniques. To accomplish this, we deploy 2D color bar... 详细信息
来源: 评论
Continuous variable quantum signature algorithm
收藏 引用
INTERNATIONAL JOURNAL OF QUANTUM INFORMATION 2007年 第4期5卷 553-573页
作者: Zeng, Guihua Lee, Moonho Guo, Ying He, Guangqiang Shanghai Jiao Tong Univ Lab Coding & Commun Secur Shanghai 200030 Peoples R China Chonbuk Natl Univ Inst Informat & Commun Dept Informat & Commun Engn Chonju 561756 South Korea
A true quantum signature algorithm based on continuous-variable entanglement state is proposed. In the suggested algorithm, a key-pair, i.e. private signature key and public verification key, is generated based on a o... 详细信息
来源: 评论
Secure and Efficient Trust Opinion Aggregation for Vehicular Ad-hoc Networks
Secure and Efficient Trust Opinion Aggregation for Vehicular...
收藏 引用
IEEE 72nd Vehicular Technology Conference Fall 2010
作者: Chen, Chen Zhang, Jie Cohen, Robin Ho, Pin-Han Univ Waterloo David R Cheriton Sch Comp Sci Waterloo ON N2L 3G1 Canada Nanyang Technol Univ Sch Comp Engn Singapore Singapore Univ Waterloo Dept Elect & Comp Engn Waterloo ON N2L 3G1 Canada
In this paper, we propose a trust opinion aggregation scheme in vehicular ad-hoc networks, to support trust models used to evaluate the quality of information shared among peers in the environment. Our scheme extends ... 详细信息
来源: 评论
Mobile Agent Security Strategy based on the proxy signature scheme
Mobile Agent Security Strategy based on the proxy signature ...
收藏 引用
2010 2nd International Conference on Multimedia and Computational Intelligence (ICMCI 2010)
作者: Xiaoquan Chen and Jihong Zhang Department of Computer Science Transport Management Institute Ministry of Transport of the People's Republic of China Beijing,China
Mobile Agent can simulate human behavior and relationships,and have some intelligence and be able to operate independently and provide the appropriate *** the network run-time,Mobile Agent is easy to be attacked by ma... 详细信息
来源: 评论
A VARIABLE STEP-SIZE NORMALIZED SIGN algorithm FOR ACOUSTIC ECHO CANCELATION
A VARIABLE STEP-SIZE NORMALIZED SIGN ALGORITHM FOR ACOUSTIC ...
收藏 引用
IEEE International Conference on Acoustics, Speech, and Signal Processing
作者: Tiange Shao Yahong Rosa Zheng Jacob Benesty Department of Electrical & Computer Engineering Missouri University of Science and Technology Rolla MO USA INRS-EMT University of Quebec Montreal QC H5A 1K6 Canada
A variable step size normalized sign algorithm (VSS-NSA) is proposed, for acoustic echo cancelation, which adjusts its step size automatically by matching the L_(1) norm of the a posteriori error to that of the backgr... 详细信息
来源: 评论
Study of security base on wireless sensor network routing protocol
Study of security base on wireless sensor network routing pr...
收藏 引用
5th International Conference on Wireless Communications, Networking and Mobile Computing
作者: Qin Xianglin Wang Shuda Harbin Univ Commerce Sch Comp & Informat Engn Harbin Peoples R China
In the course of data transfer extremely vulnerable to be eavesdropped, defrauds, tampered or replayed (Relay) routing by information security. Thus, the SLDMRP (Security Lightweight Distribution Multicast Routing Pro... 详细信息
来源: 评论
Cryptanalysis of Wang's original and revised digital signature scheme
收藏 引用
ELECTRONICS LETTERS 2001年 第4期37卷 220-220页
作者: Dai, ZD Yang, JH Ye, DF Gong, G Acad Sinica Grad Sch State Key Lab Informat Secur Beijing 100039 Peoples R China Univ Waterloo Dept Elect & Comp Engn Waterloo ON N2L 3G1 Canada Acad Sinica Inst Software Beijing 100080 Peoples R China
Wang's basic digital signature scheme and its new variation is cracked. The proposed signature forging algorithm makes no assumptions on operations of the schemes and is as efficient as the signing algorithm.
来源: 评论
ALMOST SURE CONVERGENCE OF A DECREASING GAIN SIGN algorithm FOR ADAPTIVE FILTERING
收藏 引用
IEEE TRANSACTIONS ON ACOUSTICS SPEECH AND SIGNAL PROCESSING 1988年 第10期36卷 1669-1671页
作者: EWEDA, E Military Technical College Kobry El Kobba Cairo Egypt
The convergence analysis of a sign algorithm with decreasing gain, when governing the weights of an adaptive filter, is presented. The analysis is done in a noiseless case. A rigorous proof of almost-sure convergence ... 详细信息
来源: 评论