Zobrazeno 1 - 7
of 7
pro vyhledávání: '"Shou-Shan Lu"'
Publikováno v:
Case Studies in Construction Materials, Vol 21, Iss , Pp e03772- (2024)
Structural health monitoring (SHM) system provides valuable information for the fatigue assessment of existing rail-cum-road bridges. This paper aims to develop an effective fatigue assessment approach for the rail-cum-road bridge, Jiujiang Yangtze R
Externí odkaz:
https://doaj.org/article/5bd4883faff146da930cd21ce37c398e
Publikováno v:
Tongxin xuebao, Vol 38, Pp 19-27 (2017)
For the bad computation overhead of bi1inear pairings in e11iptic curve and the prob1ems of certificate management in the PKI,an efficient and secure authentication key agreement protoco1 was proposed based on the identity-based cryptosystem and GD
Externí odkaz:
https://doaj.org/article/4650918f16ed4f428f620b8262e04b97
Publikováno v:
Tongxin xuebao, Vol 37, Pp 87-95 (2016)
A privacy-preserving point-in-polygon protocol was proposed under semi-honest model, to deal with the prob-lem of high complexity and limitation of the existing protocols. First, an blivious point-line protocol was designed by extending the tradition
Externí odkaz:
https://doaj.org/article/cade8a2d86fd4ddbb0755aae9e318dbd
Publikováno v:
Tongxin xuebao, Vol 34, Pp 166-176 (2013)
According to the problems of intrusion detection,an integrated intrusion detection model based on rough set and artificial immune (RSAI-IID) was proposed by using rough set and integrating misuse detection and anomaly detection.The rough set method w
Externí odkaz:
https://doaj.org/article/0a94366a722b468abf88833ef9ed0ab4
Publikováno v:
Tongxin xuebao, Vol 34, Pp 191-200 (2013)
By studying the related issues of the router node trust,a dynamic adjacent credibility-trust model which inte-grates factors of state and behavior of the router node was proposed.On the basis of dynamic adjacent credibility-trust model,a security rou
Externí odkaz:
https://doaj.org/article/e3cfdf6e519c401cac00efa4d80b87ca
Publikováno v:
Tongxin xuebao, Vol 34, Pp 30-42 (2013)
The model and framework of secure multi-party computational geometry were presented based on the existing protocols.The new framework has three dimensions,the math model,the security model and the communication model.Using the new model and framework
Externí odkaz:
https://doaj.org/article/cd7fb27a47694403926794e25785e60c
Publikováno v:
International Journal of Computational Intelligence Systems, Vol 5, Iss 5 (2012)
To provide security for data gathering based on network coding in wireless sensor networks (WSNs), a secure network coding-based data gathering model is proposed, and a data-privacy preserving and pollution preventing (DPP&PP) protocol using network
Externí odkaz:
https://doaj.org/article/152f3a1fa3e940f2bf59542da8e74391