CORC

浏览/检索结果: 共12条,第1-10条 帮助

已选(0)清除 条数/页:   排序方式:
An efficient and secure 3‐factor user‐authentication protocol for multiserver environment. 期刊论文
International Journal of Communication Systems, 2018, 卷号: Vol.31 No.14, 页码: 1
作者:  Li, Xiaohong;  Sun, Aiying;  He, Debiao;  Luo, Min
收藏  |  浏览/下载:5/0  |  提交时间:2019/04/24
A Compact and Low Power RO PUF with High Resilience to the EM Side-Channel Attack and the SVM Modelling Attack of Wireless Sensor Networks. 期刊论文
SENSORS, 2018, 卷号: Vol.18 No.2
作者:  Cao, Y;  Zhao, XJ;  Ye, WB;  Han, QB;  Pan, XF
收藏  |  浏览/下载:3/0  |  提交时间:2019/12/26
Information Technology in Domain of Electronic Intelligence and Cyberterrorism Combat 期刊论文
Computer Technology and Application, 2015, 卷号: Vol.6
作者:  SergiiKavun;  RobertBrumnik
收藏  |  浏览/下载:2/0  |  提交时间:2019/12/30
Application-layer DoS attack detection based on HMM. 期刊论文
Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, 卷号: Vol.30 No.11, 页码: 3393-3399
作者:  XIE Bai-lin;  JIANG Sheng-yi;  ZHANG Qian-sheng;  HAN De-zhi
收藏  |  浏览/下载:7/0  |  提交时间:2019/03/04
Research on privacy preservation in wireless body area network. 期刊论文
Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, 卷号: Vol.30 No.11, 页码: 3210-3215
作者:  GAOPeng;  WUfang-ming;  YANGYong-jian;  DUZhan-wei
收藏  |  浏览/下载:3/0  |  提交时间:2020/01/04
Cyber Crime Law in India: Has Law Kept Pace with Emerging Trends? An Empirical Study 期刊论文
Journal of International Commercial Law and Technology, 2010, 卷号: Vol.5 No.1, 页码: 22-28
作者:  N.S.Nappinai
收藏  |  浏览/下载:3/0  |  提交时间:2020/01/13
Stealthy and Subtle. 期刊论文
Aviation Week and Space Technology, 2009, 卷号: Vol.171 No.17, 页码: 76-78
作者:  Barrie,Douglas;  Fulghum,DavidA.
收藏  |  浏览/下载:3/0  |  提交时间:2020/01/13
Wide Cyber Attack Is Linked to China. 期刊论文
Wall Street Journal(Eastern Edition), 2009, 卷号: Vol.253 No.73, 页码: A18
作者:  WORTHEN,BEN;  Gorman,Siobhan;  Dean,Jason
收藏  |  浏览/下载:2/0  |  提交时间:2020/01/13
Plugging the Holes. 期刊论文
Government Executive, 2008, 卷号: Vol.40 No.12, 页码: 34-40
作者:  Aitoro,JillR.
收藏  |  浏览/下载:4/0  |  提交时间:2020/01/13
Detecting Word Substitutions in Text. 期刊论文
IEEE Transactions on Knowledge and Data Engineering, 2008, 卷号: Vol.20 No.8, 页码: 1067-1076
作者:  Roussinov,Dmitridmitri.roussinov@asu.edu;  Skillicom,DavidB.skill@cs.queensu.ca;  SzewangFongfong@cs.queensu.ca
收藏  |  浏览/下载:5/0  |  提交时间:2020/01/13


©版权所有 ©2017 CSpace - Powered by CSpace