咨询与建议

限定检索结果

文献类型

  • 3 篇 期刊文献
  • 3 篇 会议

馆藏范围

  • 6 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 6 篇 工学
    • 3 篇 电气工程
    • 3 篇 计算机科学与技术...
    • 2 篇 信息与通信工程
    • 1 篇 网络空间安全

主题

  • 6 篇 data source auth...
  • 1 篇 packet-injection
  • 1 篇 application on v...
  • 1 篇 spatial signatur...
  • 1 篇 software defined...
  • 1 篇 (qksvm)</p>
  • 1 篇 pollution attack...
  • 1 篇 security control...
  • 1 篇 non-repudiation
  • 1 篇 group communicat...
  • 1 篇 multicast flows
  • 1 篇 merkle hash tree
  • 1 篇 cipher identific...
  • 1 篇 multicast securi...
  • 1 篇 wide-area measur...
  • 1 篇 packet-lost
  • 1 篇 packet-injection...
  • 1 篇 adaptive hash-ch...
  • 1 篇 erasure code
  • 1 篇 quantum homomorp...

机构

  • 1 篇 shandong univ de...
  • 1 篇 hunan univ coll ...
  • 1 篇 univ queensland ...
  • 1 篇 beihang univ sch...
  • 1 篇 beihang univ sin...
  • 1 篇 beijing inst tec...
  • 1 篇 oak ridge natl l...
  • 1 篇 zhejiang univ de...
  • 1 篇 univ tennessee d...
  • 1 篇 pla strateg supp...
  • 1 篇 univ technol com...

作者

  • 1 篇 liu jian-wei
  • 1 篇 li guangyu
  • 1 篇 bouabdallah a
  • 1 篇 lin zhenzhi
  • 1 篇 yin he
  • 1 篇 cui yi
  • 1 篇 sundaresh lakshm...
  • 1 篇 chang chao-wen
  • 1 篇 pei zhuang
  • 1 篇 yao wenxuan
  • 1 篇 liu zhirun
  • 1 篇 bettahar h
  • 1 篇 you shutang
  • 1 篇 liu shengyuan
  • 1 篇 zhao xiao-jie
  • 1 篇 shang tao
  • 1 篇 challal y
  • 1 篇 liu yilu
  • 1 篇 zhu xian-wei

语言

  • 6 篇 英文
检索条件"主题词=data source authentication"
6 条 记 录,以下是1-10 订阅
排序:
data source authentication for wide-area synchrophasor measurements based on spatial signature extraction and quadratic kernel SVM
收藏 引用
INTERNATIONAL JOURNAL OF ELECTRICAL POWER & ENERGY SYSTEMS 2022年 140卷
作者: Liu, Shengyuan You, Shutang Yin, He Lin, Zhenzhi Liu, Yilu Cui, Yi Yao, Wenxuan Sundaresh, Lakshmi Zhejiang Univ Dept Elect Engn Hangzhou 310027 Peoples R China Univ Tennessee Dept Elect Engn & Comp Sci Knoxville TN 37996 USA Shandong Univ Dept Elect Engn Jinan 250061 Peoples R China Oak Ridge Natl Lab Oak Ridge TN 37830 USA Univ Queensland Sch Informat Technol & Elect Engn Brisbane Qld 4072 Australia Hunan Univ Coll Elect & Informat Engn Changsha 410082 Peoples R China
As essential components of the wide-area measurement system (WAMS), phasor measurement units (PMUs), frequency disturbance recorders (FDRs) and universal grid analyzers (UGAs) collect valuable data continuously to rev... 详细信息
来源: 评论
Real time Packet-injection-loss Resistant data source authentication Protocol for Group Communication
Real time Packet-injection-loss Resistant Data source Authen...
收藏 引用
World Congress on Information and Communication Technologies (WICT)
作者: Liu Zhirun Li Guangyu Beijing Inst Technol Sch Comp Sci & Technol Beijing 100081 Peoples R China
There are three problems at present that SAIDA and eSAIDA can resist packet-loss but cannot resist packet-injection, and PRABS can resist packet-injection but the communication cost is too large. We propose a new real... 详细信息
来源: 评论
The Application of data source authentication Protocol to Video Multicast
The Application of Data Source Authentication Protocol to Vi...
收藏 引用
2012 National Conference on Information Technology and Computer Science
作者: Shijie Zhao School of Computer Science and Technology Beijing Institute of Technology Beijing,China 100081 Zhirun Liu School of Computer Science and Technology Beijing Institute of Technology Beijing,China 100081 Liehuang Zhu School of Computer Science and Technology Beijing Institute of Technology Beijing,China 100081 Rufeng An School of Computer Science and Technology Beijing Institute of Technology Beijing,China 100081
An efficient packet-injection resistant data source authentication protocol for group communication(EPJRSA) was proposed to authenticate data *** can recognize which packets are injected by attacker and delete *** it ... 详细信息
来源: 评论
Packet Access Control Mechanism Based on Cipher Identification in Software-defined Network  19
Packet Access Control Mechanism Based on Cipher Identificati...
收藏 引用
2nd International Conference on Information Management and Management Science (IMMS)
作者: Zhu, Xian-wei Chang, Chao-wen PLA Strateg Support Force Informat Engn Univ Zhengzhou Peoples R China
Software defined networking (SDN) decouples the controller plane from the data plane, offering flexible network configure and management. Because of this architecture, the SDN network is vulnerable to threats caused b... 详细信息
来源: 评论
Quantum Network Coding Against Pollution Attacks
收藏 引用
IEEE COMMUNICATIONS LETTERS 2016年 第7期20卷 1369-1372页
作者: Shang, Tao Pei, Zhuang Zhao, Xiao-Jie Liu, Jian-Wei Beihang Univ Sch Elect & Informat Engn Beijing 100191 Peoples R China Beihang Univ Sino French Engn Sch Beijing 100191 Peoples R China
Quantum network coding is vulnerable to pollution attacks, especially when using classical channel as auxiliary resource. On this basis, this letter proposes a secure quantum network coding scheme against pollution at... 详细信息
来源: 评论
H2A:: Hybrid Hash-chaining scheme for adaptive multicast source authentication of media-streaming
收藏 引用
COMPUTERS & SECURITY 2005年 第1期24卷 57-68页
作者: Challal, Y Bouabdallah, A Bettahar, H Univ Technol Compiegne Dept Comp Sci Heudiasyc Lab Royallieu Res Ctr F-60205 Compiegne France
Many applications, such as broadcasting stock quotes and video-conferencing require data source authentication of the received multicast traffic. Multicast data source authentication must take into consideration the s... 详细信息
来源: 评论