SECURITY相关论文
...
公安”大情报”系统自试运行以来,取得了很大成效.抓获了一批犯罪嫌疑人,也推动了各地公安机关情报机构的建设和专业情报人员的培......
...
...
...
...
...
...
...
公安机关社会管理创新作为当前一项重点工作,引起了相关学者的广泛关注,并从公安机关社会管理创新的基本内涵、必要性、实现途径以......
目的 分析氟哌啶醇与利培酮治疗痴呆患者精神行为症状(BPSD)的临床疗效以及安全性?方法 选取本院接收的痴呆合并BPSD 患者110例,通......
In this paper, we have proposed a novel encryption scheme with chaotic process based on Enigma. The encryption scheme ta......
为了有效保证矿井下开采工作的安全性、稳定性和经济性,需要充分重视井下各种设备的节能控制工作。本文以矿山开采过程中,极为常用的......
An Efficient Three-Factor Privacy-Preserving Authentication and Key Agreement Protocol for Vehicular
As an indispensable part of the Intelli-gent Transportation System (ITS),the vehicular ad-hoc network (VANET) has attrac......
Blockchain technology is used in edge computing(EC)systems to solve the security problems caused by single point of fail......
In order to meet people\'s demand for various types of network services,researchers have conducted extensive research ......
Secure deduplication techniques have been wildly used in cloud storage to save both disk space and network bandwidth.How......
Today,the development of industry is very rapid in China,and our people enjoy the fruits of economic development,however......
Computer has become part of our life and it plays an important role in our policy, economy,society and also people’s da......
In order to solve the difficult problem of carrying on the long- distance management to the user terminal from the netwo......
Protection of memory is very significant for preventing computer system from vulnerabilities, malware or runtime reverse......
Since 2005, many High-Profile Commercial Buildings in Singapore have implemented Enhanced Security Protection measures.G......
Wireless communication can provide ubiquitous access to the Internet and more convenience thanwired communication. Due t......
Hash chain mechanism has been widely used into a variety of encryption applications and services.The introduction of ren......
Due to the limitations of energy,computation and storage for sensors etc,although the wireless sensor networks (WSNs) ha......
本文研究了一种新型消毒剂聚六亚甲基双胍对凡纳滨对虾受精卵、无节幼体和幼虾的毒性及对大型蚤和饵料藻类的影响.结果表明:聚六亚......
Objective Objective: To investigate the apoptosis,antitumor effect and security of IRE technique for liver cancer xenogr......
Aim: The main aim is to observe the changes in major pharmacological effect and safety of Chinese Meteria Medica injecti......
Randomized effects of five platinum-based chemotherapy regimens in the first treatment of advanced N
OBJECTIVE: To observe efficacy and security of five chemotherapeutic schemes including platinum on advanced nonsmall-cel......
This paper shows an example application regarding the disclosure of our research project on ancient stone coffins in Nor......
提出一个基于四粒子GHZ纠缠态实现未知单粒子态的可控量子双向传态方案.通信双方Alice和Bob以及控制方事先密享两对四粒子GHZ纠缠......
Intelligent Detection and Identification in Fiber-Optical Perimeter Intrusion Monitoring System Base
A real-time intelligent fiber-optic perimeter intrusion detection system (PIDS) based on the fiber Bragg grating (FBG) s......
人们对无线宽带通信技术的需求在近些年稳步增长。无线电波频谱的带宽限制和频带拥堵,通过微波无线网络的发展已经有了明显的改善......
为客观评价超宽谱高功率微波对某型连续波多普勒引信的干扰能力,构建了引信辐照效应试验系统,并开展了辐照效应试验。试验结果表明:受......
In the Internet of Things (IoT),security and privacy issues of physical objects are crucial to the related applica-tions......
In this age when most organizations make use of cloud computing,it is important to not only protect cloud computing reso......
In this age when most organizations make use of cloud computing, it is important to not only protect cloud computing res......
Introduction to Wireless Endogenous Security and Safety:Problems, Attributes, Structures and Functio
The information security and functional safety are fundamental issues of wireless communications sytems.The endogenous s......
Game theory-based attack and defense analysis in virtual wireless networks with jammers and eavesdro
Dynamic spectrum sharing and cognitive radio networks were proposed to enhance the Radio Frequency(RF)spectrum utilizati......
A physical layer security scheme for full-duplex communication systems with residual self-interferen
We discuss the physical layer security scheme in the Full-Duplex(FD)MIMO point-to-point two-way communication system wit......
In the Internet of Things(IoT),security and privacy issues of physical objects are crucial to the related applications.I......
目的探讨促肾上腺皮质激素(adrenocorticotropic hormone,ACTH)治疗糖皮质激素(激素)及钙调神经磷酸酶抑制剂(CNIs)双重耐药的原发性肾病......