CORC

浏览/检索结果: 共10条,第1-10条 帮助

限定条件                
已选(0)清除 条数/页:   排序方式:
[Effects of 'Tongdu Tiaoshen' acupuncture on cerebral blood flow in patients with high risk of cerebral ischemic stroke based on ASL and PWI technique]. 期刊论文
Chinese acupuncture & moxibustion, 2018, 卷号: Vol.38 No.9, 页码: 913-917
作者:  Ling Zhang;  Guoqing Zhang;  Sifang Chen;  Wei Han;  Shanbin Sun
收藏  |  浏览/下载:8/0  |  提交时间:2019/04/24
Algebraic Cryptanalysis Scheme of AES-256 Using Grobner Basis 期刊论文
JOURNAL OF ELECTRICAL AND COMPUTER ENGINEERING, 2017
作者:  Zhao,Kaixin;  Cui,Jie;  Xie,Zhiqiang
收藏  |  浏览/下载:8/0  |  提交时间:2019/04/22
A privacy-aware two-factor authentication protocol based on elliptic curve cryptography for wireless sensor networks 期刊论文
International Journal of Network Management, 2017, 卷号: Vol.27 No.3, 页码: e1937
作者:  Chilamkurti,Naveen;  Shen,Jian
收藏  |  浏览/下载:3/0  |  提交时间:2019/04/22
Related-key cryptanalysis on 7-round AES-128/192 期刊论文
International Journal of Electronic Security and Digital Forensics, 2015, 卷号: Vol.7 No.2, 页码: 166-178
作者:  Jie Cui;  Jiankai Wang;  Runhua Shi;  Hong Zhong
收藏  |  浏览/下载:2/0  |  提交时间:2019/04/22
Image Watermarking Scheme Based on Scale-Invariant Feature Transform 期刊论文
KSII Transactions on Internet and Information Systems(TIIS), 2014, 卷号: Vol.8 No.10, 页码: 3591-3606
作者:  Chang,Chin-Chen;  Lyu,Wan-Li;  Lin,Chia-Chen;  Thai-Son Nguyen
收藏  |  浏览/下载:10/0  |  提交时间:2019/04/24
Load-Balanced Secure Routing Protocol for Wireless Sensor Networks 期刊论文
International Journal of Distributed Sensor Networks, 2013, 卷号: Vol.2013
作者:  Zhan Yong-zhao;  Wang Xin-sheng;  Wang Liang-min
收藏  |  浏览/下载:4/0  |  提交时间:2019/04/22
Detecting and Defending against Replication Attacks in Wireless Sensor Networks 期刊论文
International Journal of Distributed Sensor Networks, 2013, 卷号: Vol.2013
作者:  Zhan,Yong-zhao;  Chen,Xiang-yi;  Meng,Li-xia
收藏  |  浏览/下载:2/0  |  提交时间:2019/04/22
AN IMPROVED AES S-BOX AND ITS PERFORMANCE ANALYSIS 期刊论文
International Journal of Innovative Computing, Information and Control, 2011, 卷号: Vol.7 No.5A, 页码: 2291-2302
作者:  Cui,JE;  Chang,CC;  Yang,W;  Huang,LS;  Zhong,H
收藏  |  浏览/下载:1/0  |  提交时间:2019/04/22
Verifiable Public-Key Encryption with Keyword Search Secure against Continual Memory Attacks 期刊论文
Mobile Networks and Applications, 页码: 1-11
作者:  Pengtao Liu;  Hailong Zhang;  Shanqing Guo;  Chengyu Hu;  Zhen Li
收藏  |  浏览/下载:6/0  |  提交时间:2019/04/24
A countermeasure against cryptographic key leakage in cloud: public-key encryption with continuous leakage and tampering resilience 期刊论文
The Journal of Supercomputing, 页码: 1-24
作者:  Pengtao Liu;  Tong Li;  Fanyu Kong;  Chengyu Hu;  Rupeng Yang
收藏  |  浏览/下载:8/0  |  提交时间:2019/04/24


©版权所有 ©2017 CSpace - Powered by CSpace