×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
兰州理工大学 [3]
北京大学 [2]
软件研究所 [2]
厦门大学 [1]
北京航空航天大学 [1]
深圳先进技术研究院 [1]
更多...
内容类型
会议论文 [6]
其他 [3]
期刊论文 [3]
学位论文 [1]
发表日期
2018 [3]
2017 [1]
2015 [2]
2014 [1]
2011 [2]
2010 [1]
更多...
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共13条,第1-10条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
A human flesh search algorithm based on information puzzle
会议论文
Guangzhou, China, October 7, 2018 - October 11, 2018
作者:
Nian, Fuzhong
;
Zhang, Yaqiong
;
X., Liu
收藏
  |  
浏览/下载:9/0
  |  
提交时间:2020/11/15
Big data
Complex networks
Information dissemination
Smart city
Trusted computing
Human flesh
Infectious disease
Information diffusion
Information propagation
Information puzzle
Propagation modeling
Theoretical derivations
Transmission mechanisms
Message propagation in the network based on node credibility
期刊论文
INTERNATIONAL JOURNAL OF MODERN PHYSICS B, 2018, 卷号: 32, 期号: 9
作者:
Nian, Fuzhong
;
Dang, Zhongkai
收藏
  |  
浏览/下载:9/0
  |  
提交时间:2019/11/15
Believable probability
credibility
message
complex network
A Human Flesh Search Algorithm Based on Information Puzzle
会议论文
作者:
Nian, Fuzhong
;
Zhang, Yaqiong
;
Liu, Xinmeng
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/11/15
Human flesh search
Complex network
Information puzzle
Propagation model
Information diffusion
A new FPGA PUF based on transition probability delay measurement
会议论文
11th Chinese Conference on Trusted Computing and Information Security, CTCIS 2017, Changsha, China, 2017-09-14
作者:
Guan, Zhenyu
;
Qin, Yuyao
;
Liu, Junming
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2019/12/30
A Public Key Cryptoscheme Using Bit-Pairs with Provable Semantical Security
其他
2015-01-01
Su, Shenghui
;
Lu, Shuwang
;
Xu, Maozhi
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2017/12/03
Public key cryptoscheme
Semantical security
Bit-pair shadow
Random padding
Anomalous subset sum problem
Compact sequence
ENCRYPTION STANDARD
CRYPTOSYSTEM
SIGNATURES
KNAPSACKS
TRAPDOOR
Making Tagging Systems Resistant to Tricky Spam Attacks
其他
2015-01-01
Li, Zhou
;
Tang, Cong
;
Hu, Jianbin
;
Chen, Zhong
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2017/12/03
Primary Exploration of Reliability Evaluation of Computer Live Forensics Model on Physical Memory Analysis
期刊论文
Journal of Harbin Institute of Technology, 2014, 期号: 04, 页码: 121-128
作者:
Lian-Hai Wang
;
Qiu-Liang Xu
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/12/17
digital investigation
live forensics
volatile memory acquisition
trusted probability
Enhanced correlation power analysis attack against trusted systems
期刊论文
SECURITY AND COMMUNICATION NETWORKS, 2011, 卷号: 4, 期号: 1, 页码: 3-10
作者:
Huiyun Li
;
Keke Wu
;
Fengqi Yu
收藏
  |  
浏览/下载:13/0
  |  
提交时间:2015/08/25
collision attack for the hash function extended md4
会议论文
13th International Conference on Information and Communications Security, ICICS 2011, Beijing, China, November 2
Wang Gaoli
收藏
  |  
浏览/下载:14/0
  |  
提交时间:2013/10/08
Hash functions
an trace based vehicular mobility model for simulation of vehicular delay tolerant networks
会议论文
Symposia and Workshops Held in Conjunction with the 7th International Conference on Ubiquitous Intelligence and Computing, UIC 2010 and the 7th International Conference on Autonomic and Trusted Computing, ATC 2010, Xi'an, China, 40842
Yang Wei-Dong
;
Liu Ji-Zhao
;
Zhou Xin-Yun
收藏
  |  
浏览/下载:14/0
  |  
提交时间:2011/03/31
Ad hoc networks
Models
Routers
Topology
Ubiquitous computing
Vehicles
©版权所有 ©2017 CSpace - Powered by
CSpace