CORC

浏览/检索结果: 共9条,第1-9条 帮助

限定条件                
已选(0)清除 条数/页:   排序方式:
Approaches to grey state modeling and modal control of complicated systems 会议论文
2014 IEEE International Conference on Security, Pattern Analysis, and Cybernetics, SPAC 2014, Wuhan, Hubei, China, October 18, 2014 - October 19, 2014
作者:  Chen, Weizhen*;  Zhou, Long
收藏  |  浏览/下载:2/0  |  提交时间:2019/12/27
Research on security problems in wireless sensor networks 会议论文
2013 2nd International Conference on Measurement, Instrumentation and Automation, ICMIA 2013, Guilin, China, April 23, 2013 - April 24, 2013
作者:  Liu, Wentao*
收藏  |  浏览/下载:2/0  |  提交时间:2019/12/27
Research on Multi-policy Supporting System Security Based on Behavior and State Control 会议论文
International Conference on Intelligence Science and Information Engineering (ISIE 2012), Lushan, PEOPLES R CHINA, AUG 25-26, 2012
作者:  Wang Jing*;  Lin Zhi
收藏  |  浏览/下载:2/0  |  提交时间:2019/12/27
A Security Log Based Trust Negotiation Model 期刊论文
Proceedings of the 2009 International Conference on Computational Intelligence and Natural Computing, CINC 2009, 2009, 卷号: 2, 期号: 2, 页码: 517-520
作者:  Yuan, Cao*;  Li, Yaqin;  Yan, Jun;  Liao, Zhengsong
收藏  |  浏览/下载:5/0  |  提交时间:2019/12/27
A Novelty Approach for Checking Consistency of Security Policy 会议论文
International Forum on Information Technology and Applications (IFITA 2009), Chengdu, PEOPLES R CHINA, MAY 15-17, 2009
作者:  Liu Changhua*;  Li Yaqin;  Liao Zhensong
收藏  |  浏览/下载:2/0  |  提交时间:2019/12/27
Research on Policy-based Access Control Model 会议论文
International Conference on Networks Security, Wireless Communications and Trusted Computing, Wuhan, PEOPLES R CHINA, APR 25-26, 2009
作者:  Lin Zhi*;  Wang Jing;  Chen Xiao-su;  Jia Lian-xing
收藏  |  浏览/下载:3/0  |  提交时间:2019/12/27
Policy-based Behavior Control 会议论文
5th International Conference on Wireless Communications, Networking and Mobile Computing, Beijing, PEOPLES R CHINA, SEP 24-26, 2009
作者:  Lin Zhi*;  Wang Jing;  Jia Lian-xing
收藏  |  浏览/下载:1/0  |  提交时间:2019/12/27
Application Research of the CAN on Role-Based Access Control 期刊论文
2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, 2009, 页码: 4668-+
作者:  Qin, Shi-Hong*;  Zhao, Qing;  Ge, Zhou;  Li, Huanhuan
收藏  |  浏览/下载:1/0  |  提交时间:2019/12/27
Image watermarking technique based on two-dimensional chaotic stream encryption 期刊论文
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2005, 卷号: 3823, 页码: 817-824
作者:  Hu, Hanping;  Chen, Yongqiang
收藏  |  浏览/下载:2/0  |  提交时间:2019/12/27


©版权所有 ©2017 CSpace - Powered by CSpace