[HTML][HTML] 人类行为解释与转换系统的多通道进化框架研究[J]

拉维, 莱美, 阿卡里氏, 阿帕德, 尼噶 - 广东工业大学学报, 2016 - xml-data.org
Analysis have been done in work places equipped with sensors termed as Ambient intelligence
and it … Goaf safety evaluation which is a typical multi-factor and non-compatible problem. …

ZigBee 节点多因子身份认证方案研究

周伟伟, 岳云天, 郁滨 - 系统仿真学报, 2015 - china-simulation.com
multi-factor identity authentication for ZigBee network nodes was proposed. The scheme
bound the fresh factor updated in a particular cycle with hardware informationsecurity analysis

基于分层哈希编号的智能制造产线数据同步方法.

燕雪峰, 丁叶 - Journal of Data Acquisition & Processing/Shu …, 2020 - search.ebscohost.com
… Big data driven intelligent workshop operation analysis and decision method system [J].
Computer … Application analysis of remote file synchronization technology[J]. China New …

基于身份认证的BACnet/IP 分析与改进

谢鹏寿, 朱家锋, 康永平, 冯涛, 李威, 冉玉翔 - 通信学报, 2024 - infocomm-journal.com
… , a security-enhanced BACnet/IP-SA protocol authentication scheme was proposed. By
analyzing the authentication message flow model of the protocol and modeling it using colored …

基于属性的多授权中心身份认证方案

唐飞, 包佳立, 黄永洪, 黄东, 王惠莅 - 通信学报, 2021 - infocomm-journal.com
analyzed, and it was compared with the same type of schemes. Finally, taking multi-factor
in the application scenario of electronic credentials was analyzed.The result shows that the …

[PDF][PDF] 生物特征与密码技术的融合——一种新的安全身份认证方案

张宁, 臧亚丽, 田捷 - 密码学报, 2015 - jcr.cacrnet.org.cn
… to scenarios where identity authentication is needed, especially the identity authentication
in the network environment. As a new approach for identity authentication, biometrics is …

[PDF][PDF] 6G 无线内生安全理念与构想

金梁, 楼洋明, 孙小丽, 钟州, 许晓明… - … safety and security, 2023 - scis.scichina.com
Multi-factor user authentication scheme for multi-gateway wireless sensor networks. Chinese
J … , and intelligent interconnection of 6G networks will cause unknown and complex security

基于无证书签名的抗DNS 中间人攻击方案

胡杨, 韩增杰, 叶帼华, 姚志强 - 网络与信息安全学报, 2021 - infocomm-journal.com
… The scheme introduced certificate less signature algorithm, removed the difficult-to-deploy
trust chain to improve the efficiency and security of authentication. By using symmetric …

[HTML][HTML] 多媒体智能: 当多媒体遇到人工智能

朱文武, 王鑫, 田永鸿, 高文 - 2022 - cjig.cn
analysis, including search, recommendation, streaming, and content delivery. Since artificial
intelligence … To answer this question, we introduce the concept of multimedia intelligence by …

[PDF][PDF] 人脸深度伪造主动防御技术综述

瞿左珉, 殷琪林, 盛紫琦, 吴俊彦, 张博林, 余尚戎… - 中国图象图形学报, 2024 - cjig.cn
… Our overview is focused on the three perspectives as following: 1) A brief introduction to
Deepfake forgery technologies and their impact; 2) A systematic summary of current proactive …