咨询与建议

限定检索结果

文献类型

  • 6 篇 期刊文献
  • 1 篇 会议

馆藏范围

  • 7 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 7 篇 工学
    • 4 篇 电子科学与技术(可...
    • 2 篇 电气工程
    • 2 篇 计算机科学与技术...
    • 1 篇 力学(可授工学、理...
    • 1 篇 光学工程
    • 1 篇 仪器科学与技术
    • 1 篇 材料科学与工程(可...
    • 1 篇 控制科学与工程
    • 1 篇 地质资源与地质工...
    • 1 篇 生物医学工程(可授...
    • 1 篇 网络空间安全
  • 3 篇 理学
    • 2 篇 数学
    • 1 篇 物理学
    • 1 篇 天文学
  • 1 篇 军事学
    • 1 篇 军队指挥学

主题

  • 7 篇 security attacks
  • 1 篇 tripartite schem...
  • 1 篇 in-network data ...
  • 1 篇 iot
  • 1 篇 handover delay
  • 1 篇 cloud security i...
  • 1 篇 chaotic map
  • 1 篇 cloud security
  • 1 篇 deception signal...
  • 1 篇 authentication d...
  • 1 篇 vernam cipher cr...
  • 1 篇 anonymity
  • 1 篇 cyber security
  • 1 篇 mobile ad hoc ne...
  • 1 篇 authenticated ke...
  • 1 篇 three-party
  • 1 篇 huffman source c...
  • 1 篇 global positioni...
  • 1 篇 teleportation
  • 1 篇 signaling cost

机构

  • 1 篇 department of co...
  • 1 篇 department of in...
  • 1 篇 school of comput...
  • 1 篇 shaanxi key labo...
  • 1 篇 department of co...
  • 1 篇 laboratorio de i...
  • 1 篇 college of compu...
  • 1 篇 department of cs...
  • 1 篇 department of ec...
  • 1 篇 school of electr...
  • 1 篇 college of compu...
  • 1 篇 catedrdtica cona...
  • 1 篇 applied theoreti...
  • 1 篇 esime-culhuaean ...
  • 1 篇 departamento de ...

作者

  • 1 篇 rameez u. rehman
  • 1 篇 nasreen anjum
  • 1 篇 kanwal imran
  • 1 篇 shi-hai dong
  • 1 篇 mohammed hamdi
  • 1 篇 muhammad kashif ...
  • 1 篇 babatunde james ...
  • 1 篇 b. paramasivan
  • 1 篇 qiao hui
  • 1 篇 yang lingxiao
  • 1 篇 guo-hua sun
  • 1 篇 liu haozhe
  • 1 篇 abdullah alghamd...
  • 1 篇 atif nazir
  • 1 篇 a. saravanaselva...
  • 1 篇 mamdouh alenezi
  • 1 篇 shen yulong
  • 1 篇 saeed mahfooz
  • 1 篇 m. cruz-irisson
  • 1 篇 yuanfeng huang

语言

  • 7 篇 英文
检索条件"主题词=security attacks"
7 条 记 录,以下是1-10 订阅
排序:
TAKAP: A Lightweight Three-Party Authenticated Key Agreement Protocol with User Anonymity
收藏 引用
Chinese Journal of Electronics 2021年 第4期30卷 686-696页
作者: QIAO Hui DONG Xuewen SHEN Yulong LIU Haozhe YANG Lingxiao School of Computer Science and Technology Xidian University Shaanxi Key Laboratory of Network and System security Xidian University
The three-party authenticated key agreement protocol is a significant cryptographic mechanism for secure communication, which encourages two entities to authenticate each other and generate a shared session key with t... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
A Secure and Efficient Cluster-Based Authentication Scheme for Internet of Things(IoTs)
收藏 引用
Computers, Materials & Continua 2022年 第1期70卷 1033-1052页
作者: Kanwal Imran Nasreen Anjum Abdullah Alghamdi Asadullah Shaikh Mohammed Hamdi Saeed Mahfooz Department of Computer Science University of PeshawarPeshawar25121Pakistan Department of Informatics King’s College LondonLondonSE59RJUK College of Computer Science and Information Systems Najran UniversityNajran61441Saudi Arabia
IPv6 over Low PowerWireless Personal Area Network(6LoWPAN)provides IP connectivity to the highly constrained nodes in the Internet of Things(IoTs).6LoWPANallows nodeswith limited battery power and storage capacity to ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Safeguarding Cloud Computing Infrastructure:A security Analysis
收藏 引用
Computer Systems Science & Engineering 2021年 第5期37卷 159-167页
作者: Mamdouh Alenezi College of Computer and Information Sciences Prince Sultan UniversityRiyadhKingdom of Saudi Arabia
Cloud computing is the provision of hosted resources,comprising software,hardware and processing over the World Wide *** advantages of rapid deployment,versatility,low expenses and scalability have led to the widespre... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Quantum teleportation and information splitting via four-qubit cluster state and a Bell state
收藏 引用
Frontiers of physics 2017年 第5期12卷 171-179页
作者: Marlon David González Ramirez Babatunde James Falaye Guo-Hua Sun M. Cruz-Irisson Shi-Hai Dong ESIME-Culhuaean Instituto Politécnico Nacional Av. Santa Ana 1000 Mexico CDMX 04430 Mexico Departamento de Fisica Escuela Superior de Fisica y Matemdticas Instituto Politécnico Nacional Edificio 9 UPALM CDMX 07738 Mexico Applied Theoretical Physics Division Department of Physics Federal University Lafia P. M. B. 146 LafiaNigeria Catedrdtica CONACyT CIC Instituto Politéenico Nacional UPALM CDMX 07700 Mexico Laboratorio de Información Cudntica CIDETEC Instituto Politécnico Nacional UPALM CDMX 07700Mexico
Quantum teleportation provides a "bodiless" way of transmitting the quantum state from one object to another, at a distant location, using a classical communication channel and a previously shared entangled state. I... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
A Novel Review on security and Routing Protocols in MANET
收藏 引用
Communications and Network 2016年 第4期8卷 205-218页
作者: Muhammad Kashif Nazir Rameez U. Rehman Atif Nazir Department of Computer Science National Textile University Faisalabad Pakistan
The origin of Mobile ad hoc network (MANET) was started in 1970 as packet radio network (PRNET), later on different researches were made on it in different ages. MANET works under no fixed infrastructure in which ever... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Implementation of an Efficient Light Weight security Algorithm for Energy-Constrained Wireless Sensor Nodes
收藏 引用
Circuits and Systems 2016年 第9期7卷 2234-2241页
作者: A. Saravanaselvan B. Paramasivan Department of ECE National Engineering College Kovilpatti India Department of CSE National Engineering College Kovilpatti India
In-network data aggregation is severely affected due to information in transmits attack. This is an important problem since wireless sensor networks (WSN) are highly vulnerable to node compromises due to this attack. ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
A Composite Detection Method for Direct GPS Deception Attack
A Composite Detection Method for Direct GPS Deception Attack
收藏 引用
作者: Kunjun Hu Yuanfeng Huang School of Electronic and Information Engineering Wuhan Institute of Technology
On account of the GPS initial technology limitations,it is vulnerable to interference,deception and other security attacks;GPS is widely *** it is attacked,it will bring very serious *** to the problem of cost,civil G... 详细信息
来源: cnki会议 评论