已选(0)清除
条数/页: 排序方式:
|
| Cryptanalysis and improvement of an authentication scheme for telecare medical information systems 期刊论文 International Journal of Electronic Security and Digital Forensics, 2014, 卷号: Vol.6 No.3, 页码: 157 - 168 作者: ChunmingZhang; YunZhao
![](/themes/default/image/downing1.png) 收藏  |  浏览/下载:6/0  |  提交时间:2019/12/30
|
| Security issues in government portals:an Indian scenario 期刊论文 International Journal of Logistics Economics and Globalisation, 2014, 卷号: Vol.6 No.2, 页码: 112-128 作者: AmanKwatra; M.P.Gupta; AbhishekNarainSingh
![](/themes/default/image/downing1.png) 收藏  |  浏览/下载:4/0  |  提交时间:2019/12/30
|
| Audit of bank's information security when working with electronic money 期刊论文 The Problems of Economy, 2013, 卷号: No.4, 页码: 341-347 作者: Melnychenko,O.V.
![](/themes/default/image/downing1.png) 收藏  |  浏览/下载:4/0  |  提交时间:2020/01/04
|
| Resiliency and application to routing protocols in wireless sensor networks 学位论文 : INSA de Lyon, 2013 作者: OchirkhandErdene-Ochir
![](/themes/default/image/downing1.png) 收藏  |  浏览/下载:3/0  |  提交时间:2019/12/30
|
| Cryptovirology: Virus Approach 期刊论文 International Journal of Network Security and Its Applications, 2011, 卷号: Vol.3 No.4, 页码: 33-46 作者: ShivaleSaurabhAnandrao
![](/themes/default/image/downing1.png) 收藏  |  浏览/下载:2/0  |  提交时间:2020/01/04
|
| Parallelized Side-Channel Attack Resisted Scalar Multiplication Using q-Based Addition-Subtraction k-Chains 会议论文 Hiroshima, Japan 【关键词】, 2016 作者: KittiphonPhalakarn; KittiphopPhalakarn; VorapongSuppakitpaisarn
![](/themes/default/image/downing1.png) 收藏  |  浏览/下载:5/0  |  提交时间:2019/12/24
|
| SEED masking implementations against power analysis attacks 会议论文 2010 作者: Hodgers,P.; Lu,Y.; Boey,K.; O'Neill,M.
![](/themes/default/image/downing1.png) 收藏  |  浏览/下载:2/0  |  提交时间:2020/01/04
|
| Using Multiclass Machine Learning Methods to Classify Malicious Behaviors Aimed at Web Systems 会议论文 2012 作者: Anastasovski,Goce; Pantev,Risto; Goseva-Popstojanova,Katerina
![](/themes/default/image/downing1.png) 收藏  |  浏览/下载:5/0  |  提交时间:2020/01/04
|