咨询与建议

限定检索结果

文献类型

  • 23 篇 期刊文献

馆藏范围

  • 23 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 23 篇 工学
    • 19 篇 计算机科学与技术...
    • 16 篇 信息与通信工程
    • 13 篇 电气工程
    • 12 篇 网络空间安全
    • 11 篇 软件工程
    • 7 篇 电子科学与技术(可...
    • 5 篇 仪器科学与技术
    • 4 篇 控制科学与工程
  • 8 篇 管理学
    • 6 篇 管理科学与工程(可...
    • 2 篇 图书情报与档案管...
  • 7 篇 理学
    • 5 篇 数学
    • 1 篇 生物学
    • 1 篇 系统科学
  • 3 篇 艺术学
    • 3 篇 设计学(可授艺术学...
  • 2 篇 医学
    • 1 篇 公共卫生与预防医...
  • 1 篇 经济学
    • 1 篇 应用经济学

主题

  • 7 篇 blockchain
  • 3 篇 internet of thin...
  • 3 篇 security
  • 2 篇 simulation
  • 2 篇 smart contract
  • 2 篇 signature
  • 2 篇 privacy
  • 2 篇 covid-19
  • 2 篇 big data
  • 2 篇 bitcoin
  • 2 篇 strategic intell...
  • 2 篇 provable securit...
  • 2 篇 scimat
  • 1 篇 wireless environ...
  • 1 篇 smart contracts
  • 1 篇 industry 4.0
  • 1 篇 distributed ledg...
  • 1 篇 deep learning
  • 1 篇 hadoop
  • 1 篇 数字产品

机构

  • 7 篇 department of in...
  • 5 篇 department of in...
  • 2 篇 york university ...
  • 2 篇 university of sa...
  • 2 篇 business school ...
  • 2 篇 school of comput...
  • 1 篇 department of co...
  • 1 篇 school of comput...
  • 1 篇 shenzhen institu...
  • 1 篇 college of techn...
  • 1 篇 department of el...
  • 1 篇 department of in...
  • 1 篇 school of comput...
  • 1 篇 school of photov...
  • 1 篇 australian insti...
  • 1 篇 national enginee...
  • 1 篇 department of in...
  • 1 篇 school of comput...
  • 1 篇 china univ geosc...
  • 1 篇 college of artif...

作者

  • 21 篇 kim-kwang raymon...
  • 2 篇 mohammad mehedi ...
  • 2 篇 choo kim-kwang r...
  • 2 篇 mohamed amine fe...
  • 2 篇 fei-yue wang
  • 2 篇 hai jiang
  • 2 篇 reza m.parizi
  • 2 篇 wei ren
  • 2 篇 saed alrabaee
  • 2 篇 lei shu
  • 2 篇 jun jason zhang
  • 2 篇 michele kremer s...
  • 2 篇 pedro leivas
  • 2 篇 manuel j.cobo
  • 2 篇 michael s.dohan
  • 2 篇 nicola luigi bra...
  • 2 篇 debiao he
  • 2 篇 laurence t.yang
  • 2 篇 giancarlo fortin...
  • 1 篇 nisha madathil

语言

  • 22 篇 英文
  • 1 篇 中文
检索条件"作者=Choo, kim-Kwang raymond"
23 条 记 录,以下是1-10 订阅
排序:
TMAS: A transaction misbehavior analysis scheme for blockchain
收藏 引用
BLOCKCHAIN-RESEARCH AND APPLICATIONS 2024年 第3期5卷 42-52页
作者: Huang, Shiyong Hao, Xiaohan Sun, Yani Wu, Chenhuang Li, Huimin Ren, Wei choo, kim-kwang raymond China Univ Geosci Sch Comp Sci Wuhan 430074 Peoples R China Beihang Univ Yunnan Innovat Inst Yunnan Key Lab Blockchain Applicat Technol Kunming 650233 Peoples R China Putian Univ Fujian Key Lab Financial Informat Proc Putian 351100 Peoples R China Hong Kong Univ Sci & Technol Artificial Intelligence Thrust Informat Hub Guangzhou 511400 Peoples R China Univ Texas San Antonio Dept Informat Syst & Cyber Secur San Antonio TX 78249 USA
Blockchain-based cryptocurrencies, such as Bitcoins, are increasingly popular. However, the decentralized and anonymous nature of these currencies can also be (ab)used for nefarious activities such as money laundering... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Perfect forward secure identity-based authenticated key agreement protocol in the escrow mode
收藏 引用
Science in China(Series F) 2009年 第8期52卷 1358-1370页
作者: WANG ShengBao CAO ZhenFu CHENG ZhaoHui choo kim-kwang raymond Department of Computer Science and Engineering Shanghai Jiao Tong University Shanghai 200240 China Computing Center Artillery Academy of PLA Hefei 230031 China Independent Consultant Room 1415 International Chamber of Commerce Building A Shenzhen 518048 China Australian Institute of Criminology GPO Box 2944 Canberra ACT 2601 Australia ARC Centre of Excellence in Policing and Security Regulatory Institutions Network Australian National University Australia
The majority of existing escrowable identity-based key agreement protocols only provide partial forward secrecy. Such protocols are, arguably, not suitable for many real-word applications, as the latter tends to requi... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Network traffic classification:Techniques,datasets,and challenges
收藏 引用
Digital Communications and Networks 2024年 第3期10卷 676-692页
作者: Ahmad Azab Mahmoud Khasawneh Saed Alrabaee kim-kwang raymond choo Maysa Sarsour College of Information Technology and Systems Victorian Institute of TechnologyAustralia College of Engineering Al Ain UniversityAbu DhabiUnited Arab Emirates Information Systems and Security College of ITUnited Arab Emirates UniversityAl Ain15551United Arab Emirates Department of Information Systems and Cyber Security University of Texas at San AntonioSan AntonioTX78260USA School of Photovoltaic and Renewable Energy Engineering University of New South WalesSydneyNSW2052Australia
In network traffic classification,it is important to understand the correlation between network traffic and its causal application,protocol,or service group,for example,in facilitating lawful interception,ensuring the... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Artificial intelligence in physiological characteristics recognition for internet of things authentication
收藏 引用
Digital Communications and Networks 2024年 第3期10卷 740-755页
作者: Zhimin Zhang Huansheng Ning Fadi Farha Jianguo Ding kim-kwang raymond choo School of Computer and Communication Engineering University of Science and Technology BeijingBeijing100083China Beijing Engineering Research Center for Cyberspace Data Analysis and Applications Beijing100083China Faculty of Informatics Engineering Aleppo UniversityAleppoSyria Department of Computer Science Blekinge Institute of Technology37179KarlskronaSweden Department of Information Systems and Cyber Security University of Texas at San AntonioSan AntonioTX78249-0631USA
Effective user authentication is key to ensuring equipment security,data privacy,and personalized services in Internet of Things(IoT)***,conventional mode-based authentication methods(e.g.,passwords and smart cards)ma... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Survey on digital twins for Internet of Vehicles:Fundamentals,challenges,and opportunities
收藏 引用
Digital Communications and Networks 2024年 第2期10卷 237-247页
作者: Jiajie Guo Muhammad Bilal Yuying Qiu Cheng Qian Xiaolong Xu kim-kwang raymond choo School of Computer and Software Nanjing University of Information Science and TechnologyNanjing210044China Department of Computer Engineering Hankuk University of Foreign StudiesGyeonggi-do17035South Korea Jiangsu Hydraulic Research Institute Nanjing210044China Department of Information Systems and Cyber Security University of Texas at San AntonioSan AntonioTX78249-0631USA
As autonomous vehicles and the other supporting infrastructures(e.g.,smart cities and intelligent transportation systems)become more commonplace,the Internet of Vehicles(IoV)is getting increasingly *** have been attem... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Fighting COVID-19 and Future Pandemics With the Internet of Things:Security and Privacy Perspectives
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2021年 第9期8卷 1477-1499页
作者: Mohamed Amine Ferrag Lei Shu kim-kwang raymond choo Department of Computer Science Guelma UniversityB.P.40124000Algeria College of Artificial Intelligence Nanjing Agricultural UniversityNanjing 210095Chinaand also with the School of EngineeringUniversity of LincolnLincoln LN67TSUK Department of Information Systems and Cyber Security University of Texas at San AntonioSan AntonioTX 78249-0631 USA
The speed and pace of the transmission of severe acute respiratory syndrome coronavirus 2(SARS-CoV-2;also referred to as novel Coronavirus 2019 and COVID-19)have resulted in a global pandemic,with significant health,f... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
A provable-secure and practical two-party distributed signing protocol for SM2 signature algorithm
收藏 引用
Frontiers of Computer Science 2020年 第3期14卷 203-215页
作者: Yudi ZHANG Debiao HE Mingwu ZHANG kim-kwang raymond choo Key Laboratory of Aerospace Information Security and Trusted Computing of Ministry of Education School of Cyber Science and EngineeringWuhan UniversityWuhan 430072China School of Computer Sciences Hubei University of TechnologyWuhan 430068China Department of Information Systems and Cyber Security and Department of Electrical and Computer Engineering University of Texas at San AntonioSan AntonioTX 78249USA
Mobile devices are widely used for data access,communications and ***,storing a private key for signature and other cryptographic usage on a single mobile device can be challenging,due to its computational ***,a numbe... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
BSKCN and BSAML: blind signatures from the module lattice and the asymmetric module lattice
收藏 引用
Frontiers of Computer Science 2023年 第6期17卷 175-177页
作者: Xiaofan LIU Wei REN kim-kwang raymond choo School of Computer Science China University of GeosciencesWuhan 430074China Department of Information Systems and Cyber Security University of Texas at San AntonioSan AntonioTX 78249-0631USA
1 Introduction Blind signature allows a user to obtain the signature of a message from a signer without revealing the information of the message,as well as defending against *** recent years,there have been increased ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Ethereum smart contract security research:survey and future research opportunities
收藏 引用
Frontiers of Computer Science 2021年 第2期15卷 143-160页
作者: Zeli WANG Hai JIN Weiqi DAI kim-kwang raymond choo Deqing ZOU National Engineering Research Center for Big Data Technology and System Services Computing Technology and System LabClusters and Grid Computing LabHubei Engineering Research Center on Big Data SecurityWuhan430074China School of Computer Science and Technology Huazhong University of Science and TechnologyWuhan430074China School of Cyber Science and Engineering Huazhong University of Science and TechnologyWuhan430074China Shenzhen Huazhong University of Science and Technology Research Institute Shenzhen518057China Department of Information Systems and Cyber Security University of Texas at San AntonioSan AntonioTX78249-0631USA
Blockchain has recently emerged as a research trend,with potential applications in a broad range of industries and *** particular successful Blockchain technology is smart contract,which is widely used in commercial s... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
SecBCS: a secure and privacy-preserving blockchain-based crowdsourcing system
收藏 引用
Science China(Information Sciences) 2020年 第3期63卷 20-33页
作者: Chao LIN Debiao HE Sherali ZEADALLY Neeraj KUMAR kim-kwang raymond choo Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of EducationSchool of Cyber Science and Engineering Wuhan University State Key Laboratory of Cryptology College of Communication and Information University of Kentucky Department of Computer Science and Engineering Thapar University Department of Information Systems and Cyber Security and Department of Electrical and Computer Engineering University of Texas at San Antonio
A robust and scalable crowd management infrastructure is crucial in addressing operational challenges when deploying high-density sensors and actuators in a smart city. While crowdsourcing is widely used in crowd mana... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论