SECURE

作品数:980被引量:1109H指数:14
导出分析报告
相关领域:自动化与计算机技术更多>>
相关作者:徐洁磐吴国栋马成林肖美华朱科更多>>
相关机构:湖南大学电子科技大学上海交通大学东南大学更多>>
相关期刊:更多>>
相关基金:国家自然科学基金国家重点基础研究发展计划国家高技术研究发展计划国家教育部博士点基金更多>>
-

检索结果分析

结果分析中...
条 记 录,以下是1-10
视图:
排序:
The 10 Golden Rules of Investing How to secure your financial future through successful investing
《空中英语教室(高级版.彭蒙惠英语)》2025年第5期10-11,40,41,共4页James Royal 
Investing can often be broken down into a few simple rules that investors can follow to be successful.But success can be as much about what to do as it is what not to do.On top of that,our emotions throw a wrench into...
关键词:emotions financial future golden rules successful investing INVESTING 
Blockchain-Based Framework for Secure Sharing of Cross-Border Trade Data
《Computers, Materials & Continua》2025年第5期2351-2373,共23页Shenjian Xiao Xiaoli Qin Yanzhao Tian Zhongkai Dang 
supported by Hainan Provincial Natural Science Foundation of China Nos.622RC617,624RC485;Open Foundation of State Key Laboratory of Networking and Switching Technology(Beijing University of Posts and Telecommunications)(SKLNST-2023-1-07).
The advent of the digital age has consistently provided impetus for facilitating global trade,as evidenced by the numerous customs clearance documents and participants involved in the international trade process,inclu...
关键词:Multi-authority attribute based encryption blockchain data sharing access control 
An Efficient and Secure Data Audit Scheme for Cloud-Based EHRs with Recoverable and Batch Auditing
《Computers, Materials & Continua》2025年第4期1533-1553,共21页Yuanhang Zhang Xu An Wang Weiwei Jiang Mingyu Zhou Xiaoxuan Xu Hao Liu 
supported by National Natural Science Foundation of China(No.62172436);Additionally,it is supported by Natural Science Foundation of Shaanxi Province(No.2023-JC-YB-584);Engineering University of PAP’s Funding for Scientific Research Innovation Team and Key Researcher(No.KYGG202011).
Cloud storage,a core component of cloud computing,plays a vital role in the storage and management of data.Electronic Health Records(EHRs),which document users’health information,are typically stored on cloud servers...
关键词:SECURITY cloud computing cloud storage recoverable batch auditing 
LMSA:A Lightweight Multi-Key Secure Aggregation Framework for Privacy-Preserving Healthcare AIoT
《Computer Modeling in Engineering & Sciences》2025年第4期827-847,共21页Hyunwoo Park Jaedong Lee 
supported by the National Research Foundation of Korea(NRF)grant funded by the Korea government(MSIT)(No.NRF-2022R1C1C2012463).
Integrating Artificial Intelligence of Things(AIoT)in healthcare offers transformative potential for real-time diagnostics and collaborative learning but presents critical challenges,including privacy preservation,com...
关键词:Secure aggregation LIGHTWEIGHT federated learning 
Cooperative Relaying and Jamming Design for Secure LPWAN Wireless Communication
《China Communications》2025年第4期100-116,共17页Chen Dianxia Ma Xiaoshan Yang Lin Yu Kan Feng Zhiyong 
supported by the National Natural Science Foundation of China with Grants 62301076 and 62321001。
Physical layer security methods based on joint relay and jammer selection(JRJS)have been widely investigated in the study of secure wireless communications.Different from current works on JRJS schemes,which assumed th...
关键词:joint relay and jammer selection physical layer security secrecy outage probability 
Joint communication and computation design for secure integrated sensing and semantic communication system
《Science China(Information Sciences)》2025年第3期350-366,共17页Jianxin DAI Hui FAN Zhouxiang ZHAO Yongjun XU Zhaohui YANG Xu GAN Zhaoyang ZHANG 
supported in part by National Mobile Communications Research Laboratory,Southeast University(Grant No.2023D03);National Key R&D Program of China(Grant No.2023YFB2904804);National Natural Science Foundation of China(Grant Nos.62394292,62394290)。
As a new communication paradigm,semantic communication(SC)differs from conventional communication based on bit transmission by transmitting semantic information,which demonstrates enormous potential in improving commu...
关键词:integrated sensing and semantic communication(ISsC) resource allocation beamforming design security robust optimization 
F3l:an automated and secure function-level low-overhead labeled encrypted traffic dataset construction method for IM in Android
《Cybersecurity》2025年第1期45-60,共16页Keya Xu Guang Cheng 
supported by the General Program of the National Natural Science Foundation of China under Grant No.62172093.
Fine-grained function-level encrypted traffic classification is an essential approach to maintaining network security.Machine learning and deep learning have become mainstream methods to analyze traffic,and labeled da...
关键词:Encrypted traffic Deep learning ANDROID Labeled dataset 
Architecture to Secure Electrical Control System in Cyber-Physical System
《Journal of Information Security》2025年第1期149-157,共9页Depeng Li 
It’s possible for malicious operators to seize hold of electrical control systems, for instance, the engine control unit of driverless vehicles, from various vectors, e.g. autonomic control system, remote vehicle acc...
关键词:ARCHITECTURE Control System FRAMEWORK 
Mathematical Analysis and Simulation of Secure Information Transmission and Processing Model
《China Communications》2025年第3期181-201,共21页Ren Quan Wu Jiangxing He Lei 
supported by National Key R&D Program of China for Young Scientists:Cyberspace Endogenous Security Mechanisms and Evaluation Methods(No.2022YFB3102800).
The security of information transmission and processing due to unknown vulnerabilities and backdoors in cyberspace is becoming increasingly problematic.However,there is a lack of effective theory to mathematically dem...
关键词:coding theory information systems mod-eling non-random noise security proof 
Energy Consumption Minimization for NOMA-Based Secure UAV-MEC Network
《China Communications》2025年第3期202-216,共15页Zhang Hao Huang Yuzhen Zhang Zhi Lu Xingbo 
supported in part by the National Natural Science Foundation of China under Grant 61971474;in part by the National Natural Science Foundation of China under Grant 62301594;in part by the Special Funds of the National Natural Science Foundation of China under Grant 62341112;in part by the Beijing Nova Program under Grant Z201100006820121;in part by the Beijing Municipal Science and Technology Project under Grant Z181100003218015.
Applying non-orthogonal multiple access(NOMA)to the mobile edge computing(MEC)network supported by unmanned aerial vehicles(UAVs)can improve spectral efficiency and achieve massive user access on the basis of solving ...
关键词:MEC NOMA resource optimization secure transmission trajectory optimization UAV 
检索报告 对象比较 聚类工具 使用帮助 返回顶部