CORC

浏览/检索结果: 共122条,第1-10条 帮助

限定条件    
已选(0)清除 条数/页:   排序方式:
基于DCR假设的KDM-CCA安全性 其他
2017-01-01
郭伟; 常金勇; 高磊
收藏  |  浏览/下载:10/0  |  提交时间:2017/12/03
Protect Non-volatile Memory from Wear-out Attack based on Timing Difference of Row Buffer Hit/Miss 其他
2017-01-01
Mao, Haiyu; Zhang, Xian; Sun, Guangyu; Shu, Jiwu
收藏  |  浏览/下载:6/0  |  提交时间:2017/12/03
SEYARN: Enhancing Security of YARN Clusters Based on Health Check Service 其他
2017-01-01
Li, Wenting; Shen, Qingni; Dong, Chuntao; Yang, Yahui; Wu, Zhonghai
收藏  |  浏览/下载:4/0  |  提交时间:2017/12/03
DDoS  Hadoop  YARN  Security  
Three elliptic curve cryptography-based RFID authentication protocols for Internet of Things 其他
2017-01-01
作者:  An, Rui;  Feng, Hui;  Liu, Qin;  Li, Li
收藏  |  浏览/下载:10/0  |  提交时间:2019/12/05
Three elliptic curve cryptography-based RFID authentication protocols for Internet of Things 其他
2017-01-01
作者:  An, Rui;  Feng, Hui;  Liu, Qin;  Li, Li
收藏  |  浏览/下载:5/0  |  提交时间:2019/12/05
Three elliptic curve cryptography-based RFID authentication protocols for Internet of Things 其他
2017-01-01
作者:  An, Rui;  Feng, Hui;  Liu, Qin;  Li, Li
收藏  |  浏览/下载:11/0  |  提交时间:2019/12/05
Group-based Argumentation 其他
2016-01-01
Xie, Fangfang; Lin, Zuoquan
收藏  |  浏览/下载:4/0  |  提交时间:2017/12/03
Security analysis of a TESLA-based homomorphic MAC scheme for authentication in P2P live streaming system 其他
2016-01-01
Chang, Jinyong; Dai, Honglong; Xu, Maozhi; Xue, Rui
收藏  |  浏览/下载:6/0  |  提交时间:2017/12/03
EFFICIENT METHOD FOR RANDOM FAULT ATTACK AGAINST AES HARDWARE IMPLEMENTATION 其他
2016-01-01
Liao, Nan; Cui, Xiaoxin; Wang, Tian; Liao, Kai; Yu, Dunshan; Cui, Xiaole
收藏  |  浏览/下载:2/0  |  提交时间:2017/12/03
The Request for Better Measurement: A Comparative Evaluation of Two-Factor Authentication Schemes 其他
2016-01-01
Wang, Ding; Gu, Qianchen; Cheng, Haibo; Wang, Ping
收藏  |  浏览/下载:4/0  |  提交时间:2017/12/03


©版权所有 ©2017 CSpace - Powered by CSpace