[PDF][PDF] 2006 年ACM 資訊, 電腦與通訊安全國際會議

謝續平 - 2005 - ir.lib.nycu.edu.tw
… My research activities focus on information and system security, with emphasis on access
control models and systems, distributed systems, electronic commerce and the Internet. I am …

節省檢修時間之前瞻性整合管理系統研究

邱顯錦, 陳瑞茂 - 2010 - 140.128.95.1
… 2.1 Management system architecture review … to exchange or change information with
management system. But what way is used on access control each other. SNMP is defined in RFC …

人工智能在军事对抗中的应用进展

张智敏, 石飞飞, 万月亮, 徐阳, 张帆, 宁焕生 - 工程科学学报, 2020 - cje.ustb.edu.cn
… This paper reviewed the application of AI in military confrontation as … Access control of
wireless sensor networks with strong anonymity Integrating Hash function, message verification

[PDF][PDF] 面向物联网设备安全的多层次内核访问控制方法

詹东阳, 俞兆丰, 叶麟, 张宏莉 - 信息安全学报, 2022 - jcs.iie.ac.cn
… and security of IoT devices. The experimental results show that, compared with the existing
kernel access control … Key words IoT system security; attack surface reduction; static program …

DICOM 醫療資訊應用Partial DRM 於雲端科技環境

鄭志帆 - 2011 - ir.lib.nycu.edu.tw
web application system solution that offers end-user to access DICOM information online
with partial DRM securityUser can use their personal mobile device to connect to the …

衬底式安全工业物联网中的协作MIMO 优化研究

X WANG, X BAO, Y HUANG, Z ZHENG, Z FEI… - Frontiers, 2023 - jzus.zju.edu.cn
: 本文研究协作多输入多输出(cooperative multi-input multi-output, C-MIMO) 系统中的物理层
安全技术, 该技术可以被用于主次用户共存的衬底式认知无线电网络, 并通过提高次级C-MIMO …

面向5G mMTC 的网络切片安全研究

徐子钧, 刘建伟, 李耕 - 网络与信息安全学报, 2022 - infocomm-journal.com
… An efficient device authentication protocol without certification authority for Internet of Things[J]…
5G-SSAAC: slice-specific authentication and access control in 5G[C]//Proceedings of 2019 …

基于区块链和物联网的农产品质量安全追溯系统.

陈玥婧, 周爱莲, 谢能付, 梁晓贺… - … of Agricultural Big …, 2020 - search.ebscohost.com
… Research on the agricultural product quality and safety traceability system based on
blockchain and the Internet of Things provides ideas and methods to solve the problems of low …

协同环境中共有资源的细粒度协作访问控制策略

雷浩, 黄建, 冯登国 - 软件学报, 2005 - jos.org.cn
… the access control matrix to a quantification access control matrix … In this section we review
the closely related work and problems … A system ∑(R,D,Z,z0) is a secure system only if every …

[PDF][PDF] A Literature Review about Zhihu (知乎)

US Senarath - 2021 - researchgate.net
… To prevent impersonation and ensure accurate information sharing, Zhihu introduced a
rather complicated identity verification system for its users. This process requires that users …