期刊文献+
共找到1,132篇文章
< 1 2 57 >
每页显示 20 50 100
Heterogeneous User Authentication and Key Establishment Protocol for Client-Server Environment
1
作者 Huihui Zhu Fei Tang +1 位作者 Chunhua Jin Ping Wang 《Computers, Materials & Continua》 2026年第4期648-666,共19页
The ubiquitous adoption of mobile devices as essential platforms for sensitive data transmission has heightened the demand for secure client-server communication.Although various authentication and key agreement proto... The ubiquitous adoption of mobile devices as essential platforms for sensitive data transmission has heightened the demand for secure client-server communication.Although various authentication and key agreement protocols have been developed,current approaches are constrained by homogeneous cryptosystem frameworks,namely public key infrastructure(PKI),identity-based cryptography(IBC),or certificateless cryptography(CLC),each presenting limitations in client-server architectures.Specifically,PKI incurs certificate management overhead,IBC introduces key escrow risks,and CLC encounters cross-system interoperability challenges.To overcome these shortcomings,this study introduces a heterogeneous signcryption-based authentication and key agreement protocol that synergistically integrates IBC for client operations(eliminating PKI’s certificate dependency)with CLC for server implementation(mitigating IBC’s key escrow issue while preserving efficiency).Rigorous security analysis under the mBR(modified Bellare-Rogaway)model confirms the protocol’s resistance to adaptive chosen-ciphertext attacks.Quantitative comparisons demonstrate that the proposed protocol achieves 10.08%–71.34%lower communication overhead than existing schemes across multiple security levels(80-,112-,and 128-bit)compared to existing protocols. 展开更多
关键词 User authentication key establishment CLIENT-SERVER HETEROGENEOUS SECURITY
在线阅读 下载PDF
Association between Positive Solitude and Psychological Adaptation of International Students in China:The Intermediary Roles of Authenticity and Loneliness
2
作者 Hong Zou Hanwei Wu +2 位作者 Haidi Wu Ningyao Yu Zhiguang Fan 《International Journal of Mental Health Promotion》 2026年第3期163-182,共20页
Objective:International students frequently face psychological adaptation difficulties while studying and living abroad.As an effective psychological resource,positive solitude has been identified as a potential facto... Objective:International students frequently face psychological adaptation difficulties while studying and living abroad.As an effective psychological resource,positive solitude has been identified as a potential factor for improving psychological well-being,but the underlying mechanism linking the two has not been fully explored.The current study aims to explore the relationship between positive solitude and psychological adaptation of international students,with particular emphasis on the intermediary roles of authenticity and loneliness.Methods:A total of 529 international tertiary students(Mage=23.76,SD=5.08;60.68%male)were surveyed using the Positive Solitude Scale(PSS),Authenticity Scale(AS),6-item UCLA Loneliness Scale(ULS-6),and Brief Psychological Adaptation Scale(BPAS).SPSS27.0 was used for descriptive statistical analysis and Pearson correlation analysis.PROCESS macro(Model 6)was employed to test a serial mediation model,in which authenticity and loneliness function as intermediary variables between positive solitude and psychological adaptation.Results:The correlation analysis indicated significant associations among positive solitude,authenticity,loneliness,and psychological adaptation(r=−0.544~0.511).Positive solitude was directly and positively related to psychological adaptation(β=0.132,t=3.609,p<0.001)and indirectly related to psychological adaptation through two pathways:a single mediation via authenticity(indirect effect=0.089)and a serial mediation through authenticity and loneliness(indirect effect=0.062).Loneliness did not serve as a significant mediator(indirect effect=–0.015,95%CI[–0.049,0.019]).The total indirect effect was 0.136.Conclusions:Interventions targeting international students’capacity for experiencing positive solitude and authenticity can help to reduce loneliness and increase psychological adaptation.The findings derived from this study are conducive to understanding the relationship between positive solitude and psychological adaptation,as well as its underlying mechanisms.In addition,the study offers a new perspective for educational management and psychological counseling services for international students. 展开更多
关键词 International students positive solitude AUTHENTICITY psychological adaptation LONELINESS
在线阅读 下载PDF
A certificateless identity authentication scheme for UAVs via blockchain sharding
3
作者 Zhi-Peng Zhong Xiao Chen +3 位作者 Mu-Hong Huang Hao-Zhe Wang Sheng Cao Xiao-Song Zhang 《Journal of Electronic Science and Technology》 2026年第1期1-13,共13页
With the growing deployment of unmanned aerial vehicles(UAVs)swarms in national defense,military operations,and emergency response,secure and reliable intra-swarm identity authentication has become critical for ensuri... With the growing deployment of unmanned aerial vehicles(UAVs)swarms in national defense,military operations,and emergency response,secure and reliable intra-swarm identity authentication has become critical for ensuring coordinated action and mission reliability.To address the drawbacks of public key infrastructure(PKI)based authentication in UAV swarms,namely,complex certificate management,strong dependence on centralized authorities,and authentication latency.We propose a certificateless identity authentication scheme for UAV swarms built on blockchain sharding.The scheme leverages sharding to execute authentication in parallel across multiple shards,significantly improving efficiency.Each UAV locally generates its public/private key pair and then adopts a registration-based encryption(RBE)mechanism:A registration algorithm binds the device identity to its key on the blockchain,ensuring public verifiability and immutability of identity mapping.On this basis,an authentication algorithm runs in which the initiator produces an authentication signature using a common reference string(CRS),on-chain public-key registration information,and its local private key,and the verifier rapidly validates the authentication message using the on-chain registration data and the identity of the initiator.The experimental results demonstrate that the proposed scheme achieves low-latency and high-throughput identity authentication in large-scale UAV swarm environments,providing a solid technical foundation and broad application prospects for trustworthy UAV swarm identity authentication. 展开更多
关键词 Blockchain CERTIFICATELESS Identity authentication Registration-based encryption UAV swarms
在线阅读 下载PDF
Design of Navigation Message Authentication for BDSBAS System
4
作者 Chen Xiao Tian Xiang +2 位作者 Luo Ruidan Liu Ting Wu Haitao 《China Communications》 2026年第1期189-203,共15页
The satellite-based augmentation system(SBAS)provides differential and integrity augmentation services for life safety fields of aviation and navigation.However,the signal structure of SBAS is public,which incurs a ri... The satellite-based augmentation system(SBAS)provides differential and integrity augmentation services for life safety fields of aviation and navigation.However,the signal structure of SBAS is public,which incurs a risk of spoofing attacks.To improve the anti-spoofing capability of the SBAS,European Union and the United States conduct research on navigation message authentication,and promote the standardization of SBAS message authentication.For the development of Beidou satellite-based augmentation system(BDSBAS),this paper proposes navigation message authentication based on the Chinese commercial cryptographic standards.Firstly,this paper expounds the architecture and principles of the SBAS message authentication,and then carries out the design of timed efficient streaming losstolerant authentication scheme(TESLA)and elliptic curve digital signature algorithm(ECDSA)authentication schemes based on Chinese commercial cryptographic standards,message arrangement and the design of over-the-air rekeying(OTAR)message.Finally,this paper conducts a theoretical analysis of the time between authentications(TBA)and maximum authentication latency(MAL)for L5 TESLA-I and L5 ECDSA-Q,and further simulates the reception time of OTAR message,TBA and MAL from the aspects of OTAR message weight and demodulation error rate.The simulation results can provide theoretical supports for the standardization of BDSBAS message authentication. 展开更多
关键词 Beidou satellite-based augmentation system ECDSA message authentication satellite navigation TESLA
在线阅读 下载PDF
An Anonymous Authentication and Key Exchange Protocol for UAVs in Flying Ad-Hoc Networks
5
作者 Yanan Liu Suhao Wang +4 位作者 Lei Cao Pengfei Wang Zheng Zhang Shuo Qiu Ruchan Dong 《Computers, Materials & Continua》 2026年第3期1262-1286,共25页
Unmanned Aerial Vehicles(UAVs)in Flying Ad-Hoc Networks(FANETs)are widely used in both civilian and military fields,but they face severe security,trust,and privacy vulnerabilities due to their high mobility,dynamic to... Unmanned Aerial Vehicles(UAVs)in Flying Ad-Hoc Networks(FANETs)are widely used in both civilian and military fields,but they face severe security,trust,and privacy vulnerabilities due to their high mobility,dynamic topology,and open wireless channels.Existing security protocols for Mobile Ad-Hoc Networks(MANETs)cannot be directly applied to FANETs,as FANETs require lightweight,high real-time performance,and strong anonymity.The current FANETs security protocol cannot simultaneously meet the requirements of strong anonymity,high security,and low overhead in high dynamic and resource-constrained scenarios.To address these challenges,this paper proposes an Anonymous Authentication and Key Exchange Protocol(AAKE-OWA)for UAVs in FANETs based on OneWay Accumulators(OWA).During the UAV registration phase,the Key Management Center(KMC)generates an identity ticket for each UAV using OWA and transmits it securely to the UAV’s on-board tamper-proof module.In the key exchange phase,UAVs generate temporary authentication tickets with random numbers and compute the same session key leveraging the quasi-commutativity of OWA.For mutual anonymous authentication,UAVs encrypt random numbers with the session key and verify identities by comparing computed values with authentication values.Formal analysis using the Scyther tool confirms that the protocol resists identity spoofing,man-in-the-middle,and replay attacks.Through Burrows Abadi Needham(BAN)logic proof,it achieves mutual anonymity,prevents simulation and physical capture attacks,and ensures secure connectivity of 1.Experimental comparisons with existing protocols prove that the AAKE-OWA protocol has lower computational overhead,communication overhead,and storage overhead,making it more suitable for resource-constrained FANET scenarios.Performance comparison experiments show that,compared with other schemes,this scheme only requires 8 one-way accumulator operations and 4 symmetric encryption/decryption operations,with a total computational overhead as low as 2.3504 ms,a communication overhead of merely 1216 bits,and a storage overhead of 768 bits.We have achieved a reduction in computational costs from 6.3%to 90.3%,communication costs from 5.0%to 69.1%,and overall storage costs from 33%to 68%compared to existing solutions.It can meet the performance requirements of lightweight,real-time,and anonymity for unmanned aerial vehicles(UAVs)networks. 展开更多
关键词 AUTHENTICATION key exchange one-way accumulator flying ad-hoc networks SECURITY
在线阅读 下载PDF
EARAS:An Efficient,Anonymous,and Robust Authentication Scheme for Smart Homes
6
作者 Muntaham Inaam Hashmi Muhammad Ayaz Khan +3 位作者 Khwaja Mansoor ul Hassan Suliman A.Alsuhibany Ainur Abduvalova Asfandyar Khan 《Computers, Materials & Continua》 2026年第3期780-797,共18页
Cyber-criminals target smart connected devices for spyware distribution and security breaches,but existing Internet of Things(IoT)security standards are insufficient.Major IoT industry players prioritize market share ... Cyber-criminals target smart connected devices for spyware distribution and security breaches,but existing Internet of Things(IoT)security standards are insufficient.Major IoT industry players prioritize market share over security,leading to insecure smart products.Traditional host-based protection solutions are less effective due to limited resources.Overcoming these challenges and enhancing the security of IoT Devices requires a security design at the network level that uses lightweight cryptographic parameters.In order to handle control,administration,and security concerns in traditional networking,the Gateway Node offers a contemporary networking architecture.By managing all network-level computations and complexity,the Gateway Node relieves IoT devices of these responsibilities.In this study,we introduce a novel privacy-preserving security architecture for gateway-node smart homes.Subsequently,we develop Smart Homes,An Efficient,Anonymous,and Robust Authentication Scheme(EARAS)based on the foundational principles of this security architecture.Furthermore,we formally examine the security characteristics of our suggested protocol that makes use of methodology such as ProVerif,supplemented by an informal analysis of security.Lastly,we conduct performance evaluations and comparative analyses to assess the efficacy of our scheme.Performance analysis shows that EARAS achieves up to 30%to 54%more efficient than most protocols and lower computation cost compared to Banerjee et al.’s scheme,and significantly reduces communication overhead compared to other recent protocols,while ensuring comprehensive security.Our objective is to provide robust security measures for smart homes while addressing resource constraints and preserving user privacy. 展开更多
关键词 Smart home user authentication gateway node security IoT security privacy and security
在线阅读 下载PDF
IOTA-Based Authentication for IoT Devices in Satellite Networks
7
作者 D.Bernal O.Ledesma +1 位作者 P.Lamo J.Bermejo 《Computers, Materials & Continua》 2026年第1期1885-1923,共39页
This work evaluates an architecture for decentralized authentication of Internet of Things(IoT)devices in Low Earth Orbit(LEO)satellite networks using IOTA Identity technology.To the best of our knowledge,it is the fi... This work evaluates an architecture for decentralized authentication of Internet of Things(IoT)devices in Low Earth Orbit(LEO)satellite networks using IOTA Identity technology.To the best of our knowledge,it is the first proposal to integrate IOTA’s Directed Acyclic Graph(DAG)-based identity framework into satellite IoT environments,enabling lightweight and distributed authentication under intermittent connectivity.The system leverages Decentralized Identifiers(DIDs)and Verifiable Credentials(VCs)over the Tangle,eliminating the need for mining and sequential blocks.An identity management workflow is implemented that supports the creation,validation,deactivation,and reactivation of IoT devices,and is experimentally validated on the Shimmer Testnet.Three metrics are defined and measured:resolution time,deactivation time,and reactivation time.To improve robustness,an algorithmic optimization is introduced that minimizes communication overhead and reduces latency during deactivation.The experimental results are compared with orbital simulations of satellite revisit times to assess operational feasibility.Unlike blockchain-based approaches,which typically suffer from high confirmation delays and scalability constraints,the proposed DAG architecture provides fast,cost-free operations suitable for resource-constrained IoT devices.The results show that authentication can be efficiently performed within satellite connectivity windows,positioning IOTA Identity as a viable solution for secure and scalable IoT authentication in LEO satellite networks. 展开更多
关键词 Satellite IoT decentralized authentication directed acyclic graph IOTA identity verifiable credentials
在线阅读 下载PDF
Efficient and Secure Data Storage in 5G Industrial Internet Collaborative Systems
8
作者 Wang Jigang Liu Dong +1 位作者 Wan Changsheng Lu Ping 《ZTE Communications》 2026年第1期45-55,共11页
Security and access control for data storage in 5G industrial Internet collaborative systems are facing significant challenges.The characteristics of 5 G networks,such as low latency and high speed,facilitate data tra... Security and access control for data storage in 5G industrial Internet collaborative systems are facing significant challenges.The characteristics of 5 G networks,such as low latency and high speed,facilitate data transmission in the industrial Internet but also increase vulnerability to attacks like theft and tampering.Moreover,in 5G industrial Internet collaborative system environments,data flows across multiple entities and links,which necessitates a flexible access control model to meet specific data access requirements.Traditional role-based and attribute-based access control mechanisms are difficult to apply in such dynamic application scenarios.To address these challenges,we propose a novel data storage solution for 5G industrial Internet collaborative systems.Similar to existing approaches,it provides integrity and confidentiality protection for transmitted data.In terms of security,only authenticated data owners and users can obtain file decryption keys,preventing malicious attackers from data forgery.Regarding access control,decryption is permitted only to authorized data users,safeguarding against unauthorized file access.Furthermore,by introducing an attribute-based encryption mechanism,only data users with specific attributes can decrypt files.In terms of efficiency,our approach utilizes bilinear and modular exponentiation operations solely during the authentication process.For handling substantial data loads,lightweight cryptographic algorithms are employed.Consequently,our solution achieves higher efficiency compared with other known methods.Experimental results demonstrate the feasibility of our approach in real-world applications. 展开更多
关键词 5G industrial Internet collaborative systems data storage identity-based authentication access control
在线阅读 下载PDF
Optimizing CNN Architectures for Face Liveness Detection:Performance,Efficiency,and Generalization across Datasets 被引量:1
9
作者 Smita Khairnar Shilpa Gite +2 位作者 Biswajeet Pradhan Sudeep D.Thepade Abdullah Alamri 《Computer Modeling in Engineering & Sciences》 2025年第6期3677-3707,共31页
Face liveness detection is essential for securing biometric authentication systems against spoofing attacks,including printed photos,replay videos,and 3D masks.This study systematically evaluates pre-trained CNN model... Face liveness detection is essential for securing biometric authentication systems against spoofing attacks,including printed photos,replay videos,and 3D masks.This study systematically evaluates pre-trained CNN models—DenseNet201,VGG16,InceptionV3,ResNet50,VGG19,MobileNetV2,Xception,and InceptionResNetV2—leveraging transfer learning and fine-tuning to enhance liveness detection performance.The models were trained and tested on NUAA and Replay-Attack datasets,with cross-dataset generalization validated on SiW-MV2 to assess real-world adaptability.Performance was evaluated using accuracy,precision,recall,FAR,FRR,HTER,and specialized spoof detection metrics(APCER,NPCER,ACER).Fine-tuning significantly improved detection accuracy,with DenseNet201 achieving the highest performance(98.5%on NUAA,97.71%on Replay-Attack),while MobileNetV2 proved the most efficient model for real-time applications(latency:15 ms,memory usage:45 MB,energy consumption:30 mJ).A statistical significance analysis(paired t-tests,confidence intervals)validated these improvements.Cross-dataset experiments identified DenseNet201 and MobileNetV2 as the most generalizable architectures,with DenseNet201 achieving 86.4%accuracy on Replay-Attack when trained on NUAA,demonstrating robust feature extraction and adaptability.In contrast,ResNet50 showed lower generalization capabilities,struggling with dataset variability and complex spoofing attacks.These findings suggest that MobileNetV2 is well-suited for low-power applications,while DenseNet201 is ideal for high-security environments requiring superior accuracy.This research provides a framework for improving real-time face liveness detection,enhancing biometric security,and guiding future advancements in AI-driven anti-spoofing techniques. 展开更多
关键词 Face liveness detection cross-dataset generalization real-time face authentication transfer learning DenseNet201 VGG16 InceptionV3 deep learning
在线阅读 下载PDF
Factors Influencing the Efficacy of Chinese Medicinals 被引量:1
10
作者 Qichao Liang Yun Jiang +1 位作者 Liguo Liang Hualong Liang 《Chinese Medicine and Natural Products》 2025年第2期73-85,共13页
This paper thoroughly explores the multifaceted factors influencing the efficacy of Chinese medicinals and categorizes them into three main groups:medicinal related factors,patient related factors,and practitioner rel... This paper thoroughly explores the multifaceted factors influencing the efficacy of Chinese medicinals and categorizes them into three main groups:medicinal related factors,patient related factors,and practitioner related factors.Regarding medicinal related factors,the place of origin,growing environment,harvesting time,storage conditions,quality control,dosage form selection,compatibility of medicinals,precise dosing,decoction methods,and administration routes all significantly impact efficacy.The place of origin determines the authenticity of medicinals,the growing environment affects their composition,harvesting time influences potency,improper storage leads to deterioration,quality control forms the foundation of efficacy,dosage forms and compatibility of medicinals affect absorption,dosing and decoction methods require precision,and administration routes should be tailored to individuals.Patient related factors include psychological state,individual differences,background,and disease condition.Psychological state affects treatment compliance,individual differences determine medicine responses,background influences patients’understanding of Chinese medicinals,and disease condition directly reflects efficacy.Practitioner related factors encompass theoretical knowledge,clinical experience,inherited practices,psychological state,and professional ethics.Theoretical knowledge guides medication use,clinical experience enhances efficacy,inherited practices influence prescribing styles,psychological state affects doctor–patient communication,and professional ethics ensure medical quality.These interrelated factors collectively influence the efficacy of Chinese medicinals,emphasizing the need for comprehensive consideration in clinical applications to achieve optimal therapeutic outcomes. 展开更多
关键词 Chinese medicinals efficacy of Chinese medicinals influencing factors medicinal related factors patient related factors practitioner related factors authentic medicinal materials
原文传递
Call for Papers from Food Science of Animal Products
11
《食品科学》 EI CAS 北大核心 2025年第1期I0016-I0016,共1页
Food Science of Animal Products(ISSN:2958-4124,e-ISSN:2958-3780)is a peer-reviewed,open access international journal that publishes the latest research fi ndings in the fi eld of animal-origin foods,involving food mat... Food Science of Animal Products(ISSN:2958-4124,e-ISSN:2958-3780)is a peer-reviewed,open access international journal that publishes the latest research fi ndings in the fi eld of animal-origin foods,involving food materials such as meat,aquatic products,milk,eggs,animal offals and edible insects.The research scope includes the quality and processing characteristics of food raw materials,the relationships of nutritional components and bioactive substances with human health,product fl avor and sensory characteristics,the control of harmful substances during processing or cooking,product preservation,storage and packaging;microorganisms and fermentation,illegal drug residues and food safety detection;authenticity identifi cation;cell-cultured meat,regulations and standards. 展开更多
关键词 COOKING JOURNAL authentic
在线阅读 下载PDF
Call for Papers from Food Science of Animal Products
12
《食品科学》 EI CAS 北大核心 2025年第2期I0016-I0016,共1页
Food Science of Animal Products(ISSN:2958-4124,e-ISSN:2958-3780)is a peer-reviewed,open access international journal that publishes the latest research findings in the field of animal-origin foods,involving food mater... Food Science of Animal Products(ISSN:2958-4124,e-ISSN:2958-3780)is a peer-reviewed,open access international journal that publishes the latest research findings in the field of animal-origin foods,involving food materials such as meat,aquatic products,milk,eggs,animal offals and edible insects.The research scope includes the quality and processing characteristics of food raw materials,the relationships of nutritional components and bioactive substances with human health,product flavor and sensory characteristics,the control of harmful substances during processing or cooking,product preservation,storage and packaging;microorganisms and fermentation,illegal drug residues and food safety detection;authenticity identifi cation;cell-cultured meat,regulations and standards. 展开更多
关键词 COOKING JOURNAL authentic
在线阅读 下载PDF
Multi-Stage-Based Siamese Neural Network for Seal Image Recognition
13
作者 Jianfeng Lu Xiangye Huang +3 位作者 Caijin Li Renlin Xin Shanqing Zhang Mahmoud Emam 《Computer Modeling in Engineering & Sciences》 SCIE EI 2025年第1期405-423,共19页
Seal authentication is an important task for verifying the authenticity of stamped seals used in various domains to protect legal documents from tampering and counterfeiting.Stamped seal inspection is commonly audited... Seal authentication is an important task for verifying the authenticity of stamped seals used in various domains to protect legal documents from tampering and counterfeiting.Stamped seal inspection is commonly audited manually to ensure document authenticity.However,manual assessment of seal images is tedious and laborintensive due to human errors,inconsistent placement,and completeness of the seal.Traditional image recognition systems are inadequate enough to identify seal types accurately,necessitating a neural network-based method for seal image recognition.However,neural network-based classification algorithms,such as Residual Networks(ResNet)andVisualGeometryGroup with 16 layers(VGG16)yield suboptimal recognition rates on stamp datasets.Additionally,the fixed training data categories make handling new categories to be a challenging task.This paper proposes amulti-stage seal recognition algorithmbased on Siamese network to overcome these limitations.Firstly,the seal image is pre-processed by applying an image rotation correction module based on Histogram of Oriented Gradients(HOG).Secondly,the similarity between input seal image pairs is measured by utilizing a similarity comparison module based on the Siamese network.Finally,we compare the results with the pre-stored standard seal template images in the database to obtain the seal type.To evaluate the performance of the proposed method,we further create a new seal image dataset that contains two subsets with 210,000 valid labeled pairs in total.The proposed work has a practical significance in industries where automatic seal authentication is essential as in legal,financial,and governmental sectors,where automatic seal recognition can enhance document security and streamline validation processes.Furthermore,the experimental results show that the proposed multi-stage method for seal image recognition outperforms state-of-the-art methods on the two established datasets. 展开更多
关键词 Seal recognition seal authentication document tampering siamese network spatial transformer network similarity comparison network
在线阅读 下载PDF
Call for Papers from Food Science of Animal Products
14
《肉类研究》 北大核心 2025年第1期I0014-I0014,共1页
Food Science of Animal Products(ISSN:2958-4124,e-ISSN:2958-3780)is a peer-reviewed,open access international journal that publishes the 1atest research findings in the field of anima1-origin foobis,involving food mate... Food Science of Animal Products(ISSN:2958-4124,e-ISSN:2958-3780)is a peer-reviewed,open access international journal that publishes the 1atest research findings in the field of anima1-origin foobis,involving food matenials such as meat,aquatic products,milk,eggs,animal offals and edible insects.The research scope includes the quality and processing characteristics of food raw materials,the relationships of nutritional components and bioactive substances with human health,product flavor and sensory characteristics,the control of harmful substances during processing or cooking,product preservation,storage and packaging;microorganisms and fermentation,illegal drug residues and food safety detection;authenticity identification;cell-culured meat,regulations and standards. 展开更多
关键词 COOKING JOURNAL authentic
在线阅读 下载PDF
Call for Papers from Food Science of Animal Products
15
《食品科学》 北大核心 2025年第6期I0016-I0016,共1页
Food Science of Animal Products(ISSN:2958-4124,e-ISSN:2958-3780)is a peer-reviewed,open access international journal that publishes the latest research fi ndings in the fi eld of animal-origin foods,involving food mat... Food Science of Animal Products(ISSN:2958-4124,e-ISSN:2958-3780)is a peer-reviewed,open access international journal that publishes the latest research fi ndings in the fi eld of animal-origin foods,involving food materials such as meat,aquatic products,milk,eggs,animal offals and edible insects.The research scope includes the quality and processing characteristics of food raw materials,the relationships of nutritional components and bioactive substances with human health,product fl avor and sensory characteristics,the control of harmful substances during processing or cooking,product preservation,storage and packaging;microorganisms and fermentation,illegal drug residues and food safety detection;authenticity identifi cation;cell-cultured meat,regulations and standards. 展开更多
关键词 COOKING JOURNAL authentic
在线阅读 下载PDF
Call for Papers from Food Science of Animal Products
16
《食品科学》 北大核心 2025年第5期I0021-I0021,共1页
Food Science of Animal Products(ISSN:2958-4124,e-ISSN:2958-3780)is a peer-reviewed,open access international journal that publishes the latest research findings in the field of animal-origin foods,involving food mater... Food Science of Animal Products(ISSN:2958-4124,e-ISSN:2958-3780)is a peer-reviewed,open access international journal that publishes the latest research findings in the field of animal-origin foods,involving food materials such as meat,aquatic products,milk,eggs,animal offals and edible insects.The research scope includes the quality and processing characteristics of food raw materials,the relationships of nutritional components and bioactive substances with human health,product flavor and sensory characteristics,the control of harmful substances during processing or cooking,product preservation,storage and packaging;microorganisms and fermentation,illegal drug residues and food safety detection;authenticity identifi cation;cell-cultured meat,regulations and standards. 展开更多
关键词 COOKING JOURNAL authentic
在线阅读 下载PDF
Call for Papers from Food Science of Animal Products
17
《肉类研究》 北大核心 2025年第3期I0018-I0018,共1页
Food Science of Animal Products(ISSN:2958-4124,e-ISSN:2958-3780)is a peer-reviewed,open access international journal that publishes the latest research findings in the field of animal-origin foods,involving food mater... Food Science of Animal Products(ISSN:2958-4124,e-ISSN:2958-3780)is a peer-reviewed,open access international journal that publishes the latest research findings in the field of animal-origin foods,involving food materials such as meat,aquatic products,milk,eggs,animal offals and edible insects.The research scope includes the quality and processing characteristics of food raw materials,the relationships of nutritional components and bioactive substances with human health,product flavor and sensory characteristics,the control of harmful substances during processing or cooking,product preservation,storage and packaging;microorganisms and fermentation,illegal drug residues and food safety detection;authenticity identifi cation;cell-cultured meat,regulations and standards. 展开更多
关键词 COOKING JOURNAL authentic
在线阅读 下载PDF
Call for Papers from Food Science of Animal Products
18
《肉类研究》 北大核心 2025年第2期I0017-I0017,共1页
Food Science of Animal Products(ISSN:2958-4124,e-ISSN:2958-3780)is a peer-reviewed,open access international journal that publishes the latest research fi ndings in the fi eld of animal-origin foods,involving food mat... Food Science of Animal Products(ISSN:2958-4124,e-ISSN:2958-3780)is a peer-reviewed,open access international journal that publishes the latest research fi ndings in the fi eld of animal-origin foods,involving food materials such as meat,aquatic products,milk,eggs,animal offals and edible insects.The research scope includes the quality and processing characteristics of food raw materials,the relationships of nutritional components and bioactive substances with human health,product fl avor and sensory characteristics,the control of harmful substances during processing or cooking,product preservation,storage and packaging;microorganisms and fermentation,illegal drug residues and food safety detection;authenticity identifi cation;cell-cultured meat,regulations and standards. 展开更多
关键词 COOKING JOURNAL authentic
在线阅读 下载PDF
Call for Papers from Food Science of Animal Products
19
《食品科学》 北大核心 2025年第7期I0031-I0031,共1页
Food Science of Animal Products(ISSN:2958-4124,e-ISSN:2958-3780)is a peer-reviewed,open access international journal that publishes the latest research fi ndings in the fi eld of animal-origin foods,involving food mat... Food Science of Animal Products(ISSN:2958-4124,e-ISSN:2958-3780)is a peer-reviewed,open access international journal that publishes the latest research fi ndings in the fi eld of animal-origin foods,involving food materials such as meat,aquatic products,milk,eggs,animal offals and edible insects.The research scope includes the quality and processing characteristics of food raw materials,the relationships of nutritional components and bioactive substances with human health,product flavor and sensory characteristics,the control of harmful substances during processing or cooking,product preservation,storage and packaging;microorganisms and fermentation,illegal drug residues and food safety detection;authenticity identifi cation;cell-cultured meat,regulations and standards. 展开更多
关键词 COOKING JOURNAL authentic
在线阅读 下载PDF
Endogenous Security Through AI-Driven Physical-Layer Authentication for Future 6G Networks
20
作者 MENG Rui FAN Dayu +2 位作者 XU Xiaodong LYU Suyu TAO Xiaofeng 《ZTE Communications》 2025年第1期18-29,共12页
To ensure the access security of 6G,physical-layer authentication(PLA)leverages the randomness and space-time-frequency uniqueness of the channel to provide unique identity signatures for transmitters.Furthermore,the ... To ensure the access security of 6G,physical-layer authentication(PLA)leverages the randomness and space-time-frequency uniqueness of the channel to provide unique identity signatures for transmitters.Furthermore,the introduction of artificial intelligence(AI)facilitates the learning of the distribution characteristics of channel fingerprints,effectively addressing the uncertainties and unknown dynamic challenges in wireless link modeling.This paper reviews representative AI-enabled PLA schemes and proposes a graph neural network(GNN)-based PLA approach in response to the challenges existing methods face in identifying mobile users.Simulation results demonstrate that the proposed method outperforms six baseline schemes in terms of authentication accuracy.Furthermore,this paper outlines the future development directions of PLA. 展开更多
关键词 physical-layer authentication artificial intelligence wireless security intelligent authentication
在线阅读 下载PDF
上一页 1 2 57 下一页 到第
使用帮助 返回顶部