CORC

浏览/检索结果: 共8条,第1-8条 帮助

限定条件                
已选(0)清除 条数/页:   排序方式:
Verifiable attribute-based proxy re-encryption for secure public cloud data sharing 期刊论文
Security and communication networks, 2016, 卷号: 9, 期号: 12, 页码: 1748-1758
作者:  Lin, Suqing;  Zhang, Rui;  Wang, Mingsheng
收藏  |  浏览/下载:25/0  |  提交时间:2019/05/09
Time-bound hierarchical key assignment: an overview 期刊论文
Ieice transactions on information and systems, 2010, 卷号: E93d, 期号: 5, 页码: 1044-1052
作者:  Zhu, Wen Tao;  Deng, Robert H.;  Zhou, Jianying;  Rao, Feng
收藏  |  浏览/下载:15/0  |  提交时间:2019/05/10
Information content security on the internet: the control model and its evaluation 期刊论文
Science china-information sciences, 2010, 卷号: 53, 期号: 1, 页码: 30-49
作者:  Fang BinXing;  Guo YunChuan;  Zhou Yuan
收藏  |  浏览/下载:24/0  |  提交时间:2019/05/10
Propagation of active worms: a survey 期刊论文
Computer systems science and engineering, 2009, 卷号: 24, 期号: 3, 页码: 157-172
作者:  Xiang, Yang;  Fan, Xiang;  Zhu, Wen Tao
收藏  |  浏览/下载:21/0  |  提交时间:2019/05/10
Distributed intrusion detection for mobile ad hoc networks 期刊论文
Journal of systems engineering and electronics, 2008, 卷号: 19, 期号: 4, 页码: 851-859
作者:  Yi Ping;  Jiang Xinghao;  Wu Yue;  Liu Ning
收藏  |  浏览/下载:14/0  |  提交时间:2019/05/10
Multi-agent cooperative intrusion response in mobile adhoc networks 期刊论文
Journal of systems engineering and electronics, 2007, 卷号: 18, 期号: 4, 页码: 785-794
作者:  Yi Ping;  Zou Futai;  Jiang Xinghao;  Li Jianhua
收藏  |  浏览/下载:12/0  |  提交时间:2019/05/10
A concurrency control algorithm in multi-version multilevel dbms 期刊论文
Chinese journal of electronics, 2005, 卷号: 14, 期号: 3, 页码: 467-471
作者:  Zhang, M;  Feng, DG
收藏  |  浏览/下载:16/0  |  提交时间:2019/05/10
Security analysis of the generalized self-shrinking generator 期刊论文
Information and communications security, proceedings, 2004, 卷号: 3269, 页码: 388-400
作者:  Zhang, B;  Wu, HJ;  Feng, DG;  Bao, F
收藏  |  浏览/下载:35/0  |  提交时间:2019/05/10


©版权所有 ©2017 CSpace - Powered by CSpace