已选(0)清除
条数/页: 排序方式:
|
| [Effects of 'Tongdu Tiaoshen' acupuncture on cerebral blood flow in patients with high risk of cerebral ischemic stroke based on ASL and PWI technique]. 期刊论文 Chinese acupuncture & moxibustion, 2018, 卷号: Vol.38 No.9, 页码: 913-917 作者: Ling Zhang; Guoqing Zhang; Sifang Chen; Wei Han; Shanbin Sun 收藏  |  浏览/下载:8/0  |  提交时间:2019/04/24
|
| Algebraic Cryptanalysis Scheme of AES-256 Using Grobner Basis 期刊论文 JOURNAL OF ELECTRICAL AND COMPUTER ENGINEERING, 2017 作者: Zhao,Kaixin; Cui,Jie; Xie,Zhiqiang 收藏  |  浏览/下载:8/0  |  提交时间:2019/04/22
|
| A privacy-aware two-factor authentication protocol based on elliptic curve cryptography for wireless sensor networks 期刊论文 International Journal of Network Management, 2017, 卷号: Vol.27 No.3, 页码: e1937 作者: Chilamkurti,Naveen; Shen,Jian 收藏  |  浏览/下载:3/0  |  提交时间:2019/04/22
|
| Related-key cryptanalysis on 7-round AES-128/192 期刊论文 International Journal of Electronic Security and Digital Forensics, 2015, 卷号: Vol.7 No.2, 页码: 166-178 作者: Jie Cui; Jiankai Wang; Runhua Shi; Hong Zhong 收藏  |  浏览/下载:2/0  |  提交时间:2019/04/22
|
| Image Watermarking Scheme Based on Scale-Invariant Feature Transform 期刊论文 KSII Transactions on Internet and Information Systems(TIIS), 2014, 卷号: Vol.8 No.10, 页码: 3591-3606 作者: Chang,Chin-Chen; Lyu,Wan-Li; Lin,Chia-Chen; Thai-Son Nguyen 收藏  |  浏览/下载:10/0  |  提交时间:2019/04/24
|
| Load-Balanced Secure Routing Protocol for Wireless Sensor Networks 期刊论文 International Journal of Distributed Sensor Networks, 2013, 卷号: Vol.2013 作者: Zhan Yong-zhao; Wang Xin-sheng; Wang Liang-min 收藏  |  浏览/下载:4/0  |  提交时间:2019/04/22
|
| Detecting and Defending against Replication Attacks in Wireless Sensor Networks 期刊论文 International Journal of Distributed Sensor Networks, 2013, 卷号: Vol.2013 作者: Zhan,Yong-zhao; Chen,Xiang-yi; Meng,Li-xia 收藏  |  浏览/下载:2/0  |  提交时间:2019/04/22
|
| AN IMPROVED AES S-BOX AND ITS PERFORMANCE ANALYSIS 期刊论文 International Journal of Innovative Computing, Information and Control, 2011, 卷号: Vol.7 No.5A, 页码: 2291-2302 作者: Cui,JE; Chang,CC; Yang,W; Huang,LS; Zhong,H 收藏  |  浏览/下载:1/0  |  提交时间:2019/04/22
|
| Verifiable Public-Key Encryption with Keyword Search Secure against Continual Memory Attacks 期刊论文 Mobile Networks and Applications, 页码: 1-11 作者: Pengtao Liu; Hailong Zhang; Shanqing Guo; Chengyu Hu; Zhen Li 收藏  |  浏览/下载:6/0  |  提交时间:2019/04/24
|
| A countermeasure against cryptographic key leakage in cloud: public-key encryption with continuous leakage and tampering resilience 期刊论文 The Journal of Supercomputing, 页码: 1-24 作者: Pengtao Liu; Tong Li; Fanyu Kong; Chengyu Hu; Rupeng Yang 收藏  |  浏览/下载:8/0  |  提交时间:2019/04/24
|