CORC

浏览/检索结果: 共13条,第1-10条 帮助

已选(0)清除 条数/页:   排序方式:
A human flesh search algorithm based on information puzzle 会议论文
Guangzhou, China, October 7, 2018 - October 11, 2018
作者:  Nian, Fuzhong;  Zhang, Yaqiong;  X., Liu
收藏  |  浏览/下载:9/0  |  提交时间:2020/11/15
Message propagation in the network based on node credibility 期刊论文
INTERNATIONAL JOURNAL OF MODERN PHYSICS B, 2018, 卷号: 32, 期号: 9
作者:  Nian, Fuzhong;  Dang, Zhongkai
收藏  |  浏览/下载:9/0  |  提交时间:2019/11/15
A Human Flesh Search Algorithm Based on Information Puzzle 会议论文
作者:  Nian, Fuzhong;  Zhang, Yaqiong;  Liu, Xinmeng
收藏  |  浏览/下载:4/0  |  提交时间:2019/11/15
A new FPGA PUF based on transition probability delay measurement 会议论文
11th Chinese Conference on Trusted Computing and Information Security, CTCIS 2017, Changsha, China, 2017-09-14
作者:  Guan, Zhenyu;  Qin, Yuyao;  Liu, Junming
收藏  |  浏览/下载:5/0  |  提交时间:2019/12/30
A Public Key Cryptoscheme Using Bit-Pairs with Provable Semantical Security 其他
2015-01-01
Su, Shenghui; Lu, Shuwang; Xu, Maozhi
收藏  |  浏览/下载:3/0  |  提交时间:2017/12/03
Making Tagging Systems Resistant to Tricky Spam Attacks 其他
2015-01-01
Li, Zhou; Tang, Cong; Hu, Jianbin; Chen, Zhong
收藏  |  浏览/下载:2/0  |  提交时间:2017/12/03
Primary Exploration of Reliability Evaluation of Computer Live Forensics Model on Physical Memory Analysis 期刊论文
Journal of Harbin Institute of Technology, 2014, 期号: 04, 页码: 121-128
作者:  Lian-Hai Wang;  Qiu-Liang Xu
收藏  |  浏览/下载:2/0  |  提交时间:2019/12/17
Enhanced correlation power analysis attack against trusted systems 期刊论文
SECURITY AND COMMUNICATION NETWORKS, 2011, 卷号: 4, 期号: 1, 页码: 3-10
作者:  Huiyun Li;  Keke Wu;  Fengqi Yu
收藏  |  浏览/下载:13/0  |  提交时间:2015/08/25
collision attack for the hash function extended md4 会议论文
13th International Conference on Information and Communications Security, ICICS 2011, Beijing, China, November 2
Wang Gaoli
收藏  |  浏览/下载:14/0  |  提交时间:2013/10/08
an trace based vehicular mobility model for simulation of vehicular delay tolerant networks 会议论文
Symposia and Workshops Held in Conjunction with the 7th International Conference on Ubiquitous Intelligence and Computing, UIC 2010 and the 7th International Conference on Autonomic and Trusted Computing, ATC 2010, Xi'an, China, 40842
Yang Wei-Dong; Liu Ji-Zhao; Zhou Xin-Yun
收藏  |  浏览/下载:14/0  |  提交时间:2011/03/31


©版权所有 ©2017 CSpace - Powered by CSpace