搜索筛选:
搜索耗时0.0854秒,为你在为你在102,285,761篇论文里面共找到 10 篇相符的论文内容
类      型:
[期刊论文] 作者:YANG Yi-xian,NIU Xin-xin,LIN X, 来源:中国邮电高校学报(英文版) 年份:2004
It has claimed that any practical way to achieve perfect reparability for key distribution protocol (KDP) could only be futile. Fortunately, this paper presents...
[期刊论文] 作者:YE Tian-yu,NIU Xin-xin,MA Zhao, 来源:中国邮电高校学报(英文版) 年份:2004
Quantized projection technology (QP) is the version of quantization index modulation (QIM) working in the projection domain. It essentially belongs to a double-...
[期刊论文] 作者:Xu Shu-Jiang,Chen Xiu-Bo,Niu Xin-Xin,Yang Yi-Xian, 来源:中国物理B(英文版) 年份:2013
[期刊论文] 作者:ZHANG De-dong,MA Zhao-feng,NIU Xin-xin,Peng Yong,, 来源:The Journal of China Universities of Posts and Telecommunica 年份:2013
In order to solve the contradictions between user privacy protection and identity authentication, an anonymous authentication scheme under mobile Internet is pr...
[期刊论文] 作者:ZHANG De-dong,MA Zhao-feng,NIU Xin-xin,LI Guo-you,, 来源:The Journal of China Universities of Posts and Telecommunica 年份:2013
Anonymous proxy signature scheme can provide the privacy protection for the proxy signer.Recently, Yu et al.proposed an anonymous proxy signature, which can be...
[期刊论文] 作者:Xu Shu-Jiang,Chen Xiu-Bo,Wang Lian-Hai,Niu Xin-Xin,Yang Yi-Xian, 来源:中国物理B(英文版) 年份:2015
[期刊论文] 作者:HUANG Qin-long,FU Jing-yi,MA Zhao-feng,YANG Yi-xian,NIU Xin-xin,, 来源:The Journal of China Universities of Posts and Telecommunica 年份:2014
The online social networks(OSNs) offer attractive means for social interactions and data sharing, as well as raise a number of security and privacy issues. Alth...
[期刊论文] 作者:XIAO Feng,ZHOU Ya-jian,ZHOU Jing-xian,ZHU Hong-liang,NIU Xin-xin,, 来源:The Journal of China Universities of Posts and Telecommunica 年份:2013
As an important component of internet of things, electronic product code (EPC) system is widely used in many areas. However, the mass deployment of EPC system i...
[期刊论文] 作者:LI Yan,ZHOU Ya-jian,YUAN Kai-guo,GUO Yu-cui,NIU Xin-xin,, 来源:The Journal of China Universities of Posts and Telecommunica 年份:2014
Manipulated digital image is got interesting in recent years. Digital images can be manipulated more easily with the aid of powerful image editing software. Forensic techniques for authenticating the...
[期刊论文] 作者:HUANG Qin-long,MA Zhao-feng,YANG Yi-xian,FU Jing-yi,NIU Xin-xin, 来源:中国邮电高校学报(英文版) 年份:2013
相关搜索: