搜索结果: 1-11 共查到“计算机科学技术 Authentication”相关记录11条 . 查询时间(0.109 秒)
中国地质大学科学技术发展院章丽平,张艺馨,唐善玉等计算机学院,IEEE Transactions on Industrial Electronics, 2018, Privacy Protection for E-health Systems by Means of Dynamic Authentication and Three-factor Key Agreement
电子医疗;健康系统;通信安全;认证协议
2021/10/21
2018年,题为"Privacy Protection for E-health Systems Using Dynamic Authentication and Three-factor Key Agreement" 论文刊发在国际权威期刊《IEEE Transactions on Industrial Electronics》上。该文第一作者为中国地质大学计算机学院章丽平副教授。该文对电子医疗...
Robust and Discriminative Image Authentication Based on Sparse Coding
authentication sparse coding robustness discrimination similarity
2013/7/24
Image authentication is usually approached by checking the preservation of some invariant features, which are expected to be both robust and discriminative so that contentpreserving operations are acc...
Authentication and Privacy in Vehicular Networks
Authentication Privacy Vehicular Networks
2010/9/25
Vehicular ad-hoc networks (VANETs) are composed mainly by vehicles.These communication networks allow data interchanging. In this way,more and better information is provided to drivers, thus achieving...
The Development of a B2G Online Authentication Standard: a design perspective of the policy consultation process
design science method artifact standards development
2009/12/7
The primary focus in design science research is the development of innovative and useful system artifacts. Apart from IT-centric artifacts such as software and hardware, design research outputs can al...
A secure media streaming mechanism combining encryption, authentication, and transcoding
Intelligent mid-network proxy Secure transcoding Sender authentication Media-aware encryption Media streaming
2013/7/16
Technology advancements are allowing more and more new media applications and services to be delivered over the Internet. Many of these applications and services require flexibility in media dis...
Ensuring Authentication of Digital Information using Cryptographic Accumulators
Stream Authentication Polynomial Reconstruction Erasure Channel Adversarial Channel Cryptographic Accumulator
2012/12/3
In this paper, we study the broadcast authentication problem for both erasure and adversarial networks. Two important concerns for authentication protocols are the authentication delay and the packet ...
Excerpt
.0.0.tar.gz # tar zxfv freeradius-1.0.0.tar.gz # cd freeradius-1.0.0 2. Configure, make and install: # ./configure # make # make install You can pass options to configure. Use ./configure --...
A coding approach to the multicast stream authentication problem
Stream authentication Polynomial reconstruction Rateless codes Erasure codes
2012/12/3
We study the multicast stream authentication problem when an opponent can drop, reorder and introduce data packets into the communication channel. In such a
model, packet overhead and computing effic...
基于Authentication Test方法的高效安全IKE形式化设计研究
协议设计 形式化方法 Authentication tests 密钥交换 Strand space模型
2007/12/27
基于Authentication Test方法,围绕高效安全Internet密钥交换(ESIKE)协议的安全目标,提出一种具体地构建唯一满足两个通信实体变换边的形式化协议设计方法,设计出了高效安全的IKE协议;并且基于Strand Space模型和Authentication Test方法,形式化分析ESIKE协议,证明了其所具有的安全特性.该ESIKE协议克服了原有Internet密钥交换(IK...
Secure Federated Authentication and Authorisation to GRID Portal Applications using SAML and XACML
Federated Identity & Access Management Virtual Organizations Shibboleth SAML XACML eResearch Toolkits Virtual Research Environment (VRE) Grid
2014/3/12
Internationally, the need for federated Identity & Access Management continues to grow, as it allows users to get Single Sign-On access to external resources (a.k.a. Service Providers) using their hom...
Using Score Normalization to Solve the Score Variation Problem in Face Authentication
Score Normalization Solve the Score Variation Problem Face Authentication
2013/7/23
This paper investigates the score normalization technique for en-hancing the performance of face authentication. We firstly discuss the thresh-olding approach for face authentication and put forward t...