信息网络安全 ›› 2014, Vol. 14 ›› Issue (10): 86-91.doi: 10.3969/j.issn.1671-1122.2014.10.016
• Orignal Article • Previous Articles
ZHANG Li-chao, ZHU Kun-song, YANG Yu-hang, XU Ji-jun
Received:
2014-06-17
Online:
2014-10-01
CLC Number:
ZHANG Li-chao, ZHU Kun-song, YANG Yu-hang, XU Ji-jun. Design of the Classified Document Reader Based on Face Authentication[J]. 信息网络安全, 2014, 14(10): 86-91.
Add to citation manager EndNote|Ris|BibTeX
URL: http://netinfo-security.org/EN/10.3969/j.issn.1671-1122.2014.10.016
[1] 梅瑞,孟正,霍玮. 典型文档类CVE漏洞检测工具的研究与实现[J]. 信息网络安全,2014,(6):18-22. [2] 孔凡芝,张兴周,谢耀菊. 基于Adaboost的人脸检测技术[J]. 应用科技,2005,32(6):7-9. [3] 邵旭东,薛质. 数字签名中电子文档的可信显示[J]. 信息网络安全,2008,(3):62-64. [4] 吴东超. 基于嵌入式Linux的裁减方法设计与实现[D]. 无锡:江南大学,2008. [5] 张雪峰,黄志炜. 基于编码方式的文档恢复技术[J]. 信息网络安全,2011,(9):156-158. [6] 魏瑾. 嵌入式Linux的USB Gadget驱动实现[J]. 电脑知识与技术,2011,7(32):8053-8054. [7] 黄亚勤. 基于视线跟踪技术的眼控鼠标研究与实现[D]. 成都:西华大学,2011. [8] 闫兆春. 基于强制性安全架构实现文档全生命周期保护[J]. 信息网络安全,2009,(1):17-19. [9] Gary Bradski,Adrian Kaehler著. 学习OpenCV[M]. 于仕琪,刘瑞祯,译. 北京:清华大学出版社. [10] 雷静. 基于OpenCV的人脸跟踪识别系统研究[D]. 西安:西安电子科技大学,2010. [11] 封化民,孙轶茹,孙莹. 基于身份认证加密的匿名私钥共享方案[J]. 信息网络安全,2013,(11):4-7. [12] 刘超. Linux平台下USB大容量存储设备驱动程序的改进与优化[D]. 北京:北京交通大学,2008.。 |
[1] | LIU Jianwei, HAN Yiran, LIU Bin, YU Beiyuan. Research on 5G Network Slicing Security Model [J]. Netinfo Security, 2020, 20(4): 1-11. |
[2] | JIANG Jinfang, HAN Guangjie. Survey of Trust Management Mechanism in Wireless Sensor Network [J]. Netinfo Security, 2020, 20(4): 12-20. |
[3] | CHEN Lu, SUN Yajie, ZHANG Liqiang, CHEN Yun. A Scheme of Measurement for Terminal Equipment Based on DICE in IoT [J]. Netinfo Security, 2020, 20(4): 21-30. |
[4] | GUO Chun, CHEN Changqing, SHEN Guowei, JIANG Chaohui. A Ransomware Classification Method Based on Visualization [J]. Netinfo Security, 2020, 20(4): 31-39. |
[5] | DONG Xiaoli, SHANG Shuai, CHEN Jie. Impossible Differential Attacks on 9-Round Block Cipher Rijndael-192 [J]. Netinfo Security, 2020, 20(4): 40-46. |
[6] | WANG Rong, MA Chunguang, WU Peng. An Intrusion Detection Method Based on Federated Learning and Convolutional Neural Network [J]. Netinfo Security, 2020, 20(4): 47-54. |
[7] | FU Zhizhou, WANG Liming, TANG Ding, ZHANG Shuguang. HBase Secondary Ciphertext Indexing Method Based on Homomorphic Encryption [J]. Netinfo Security, 2020, 20(4): 55-64. |
[8] | DU Yifeng, GUO Yuanbo. A Dynamic Access Control Method for Fog Computing Based on Trust Value [J]. Netinfo Security, 2020, 20(4): 65-72. |
[9] | BIAN Lingyu, ZHANG Linlin, ZHAO Kai, SHI Fei. Ethereum Malicious Account Detection Method Based on LightGBM [J]. Netinfo Security, 2020, 20(4): 73-80. |
[10] | LIU Min, CHEN Shuhui. Research on VoLTE Traffic Based on Association Fusion [J]. Netinfo Security, 2020, 20(4): 81-86. |
[11] | ZHAO Zhiyan, JI Xiaomo. Research on the Intelligent Fusion Model of Network Security Situation Awareness [J]. Netinfo Security, 2020, 20(4): 87-93. |
[12] | MA Li. Research on the Quantitative Calculation Method Resulting from the Conclusions in the Assessment of Classified Protection of Cybersecurity [J]. Netinfo Security, 2020, 20(3): 1-8. |
[13] | SONG Yubo, FAN Ming, YANG Junjie, HU Aiqun. Multipath Solution and Blocking Method of Network Attack Traffic Based on Topology Analysis [J]. Netinfo Security, 2020, 20(3): 9-17. |
[14] | LI Ning, LI Bochao. Token-based UTM Architecture for Mobile Internet [J]. Netinfo Security, 2020, 20(3): 18-28. |
[15] | ZHOU Quan, YANG Ningbin, XU Shumei. Fault - tolerant and Verifiable Public Key Searchable Encryption Scheme Based on FBDH Algorithm [J]. Netinfo Security, 2020, 20(3): 29-35. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||