咨询与建议

限定检索结果

文献类型

  • 4 篇 期刊文献
  • 1 篇 会议

馆藏范围

  • 5 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5 篇 工学
    • 4 篇 计算机科学与技术...
    • 2 篇 控制科学与工程
    • 2 篇 软件工程
  • 2 篇 管理学
    • 2 篇 管理科学与工程(可...

主题

  • 5 篇 negative databas...
  • 2 篇 np-complete
  • 2 篇 artificial immun...
  • 2 篇 two-factor authe...
  • 1 篇 privacy informat...
  • 1 篇 clustering
  • 1 篇 uncertain repres...
  • 1 篇 hamming distance
  • 1 篇 data representat...
  • 1 篇 negative authent...
  • 1 篇 k nearest neighb...
  • 1 篇 security
  • 1 篇 classification
  • 1 篇 protection
  • 1 篇 immune-inspired ...
  • 1 篇 k-means

机构

  • 3 篇 china univ geosc...
  • 2 篇 griffith univ sc...
  • 1 篇 anhui province k...
  • 1 篇 school of comput...
  • 1 篇 univ sci & techn...
  • 1 篇 univ new mexico ...
  • 1 篇 china univ geosc...
  • 1 篇 santa fe inst sa...

作者

  • 3 篇 liu ran
  • 2 篇 wang can
  • 2 篇 wang xiang
  • 1 篇 helman paul
  • 1 篇 ran liu
  • 1 篇 yue lihua
  • 1 篇 lihua yue
  • 1 篇 esponda fernando
  • 1 篇 forrest stephani...
  • 1 篇 wenjian luo
  • 1 篇 luo wenjian

语言

  • 5 篇 英文
检索条件"主题词=negative databases"
5 条 记 录,以下是1-10 订阅
排序:
Classifying and clustering in negative databases
收藏 引用
Frontiers of Computer Science 2013年 第6期7卷 864-874页
作者: Ran LIU Wenjian LUO Lihua YUE School of Computer Science and Technology University of Science and Technology of China Hefei 230027 China Anhui Province Key Laboratory of Software Engineering in Computing and Communication University of Science and Technology of China Hefei 230027 China
Recently, negative databases (NDBs) are proposed for privacy protection. Similar to the traditional databases, some basic operations could be conducted over the NDBs, such as select, intersection, update, delete and... 详细信息
来源: 评论
A Two-Factor Authentication Scheme based on negative databases  8
A Two-Factor Authentication Scheme based on Negative Databas...
收藏 引用
8th IEEE Symposium Series on Computational Intelligence (IEEE SSCI)
作者: Liu, Ran Wang, Xiang Wang, Can China Univ Geosci Sch Comp Sci Wuhan 430074 Hubei Peoples R China Griffith Univ Sch Informat & Commun Technol Gold Coast Australia
In some scenes such as smart mobile terminal, low energy consumption and high efficiency are highly important in information security. So two-factor authentication scheme based on classical encryption algorithms are n... 详细信息
来源: 评论
An efficient two-factor authentication scheme based on negative databases: Experiments and extensions
收藏 引用
APPLIED SOFT COMPUTING 2022年 第0期119卷 108558-108558页
作者: Liu, Ran Wang, Xiang Wang, Can China Univ Geosci Sch Comp Sci Wuhan 430078 Peoples R China China Univ Geosci Hubei Key Lab Intelligent Geoinformat Proc Wuhan 430078 Peoples R China Griffith Univ Sch Informat & Commun Technol Gold Coast Australia
With the rapid development of network communication technology, identity authentication based on smart cards is one of the most common two-factor authentication schemes. In some real-world applications, timeliness is ... 详细信息
来源: 评论
negative representations of information
收藏 引用
INTERNATIONAL JOURNAL OF INFORMATION SECURITY 2009年 第5期8卷 331-345页
作者: Esponda, Fernando Forrest, Stephanie Helman, Paul Univ New Mexico Dept Comp Sci Albuquerque NM 87131 USA Santa Fe Inst Santa Fe NM 87501 USA
In a negative representation, a set of elements (the positive representation) is depicted by its complement set. That is, the elements in the positive representation are not explicitly stored, and those in the negativ... 详细信息
来源: 评论
Hiding multiple solutions in a hard 3-SAT formula
收藏 引用
DATA & KNOWLEDGE ENGINEERING 2015年 第PartA期100卷 1-18页
作者: Liu, Ran Luo, Wenjian Yue, Lihua Univ Sci & Technol China Sch Comp Sci & Technol Anhui Prov Key Lab Software Engn Comp & Commun Hefei 230026 Anhui Peoples R China China Univ Geosci Sch Comp Sci Wuhan Hubei Peoples R China
Hiding solutions in 3-SAT formulas can be used in privacy protection and data security. Although the typical q-hidden algorithm could cancel the attraction to the unique predefined solution, and generate deceptive 3-S... 详细信息
来源: 评论