CORC

浏览/检索结果: 共8条,第1-8条 帮助

限定条件                
已选(0)清除 条数/页:   排序方式:
Cryptanalysis and improvement of an authentication scheme for telecare medical information systems 期刊论文
International Journal of Electronic Security and Digital Forensics, 2014, 卷号: Vol.6 No.3, 页码: 157 - 168
作者:  ChunmingZhang;  YunZhao
收藏  |  浏览/下载:6/0  |  提交时间:2019/12/30
Security issues in government portals:an Indian scenario 期刊论文
International Journal of Logistics Economics and Globalisation, 2014, 卷号: Vol.6 No.2, 页码: 112-128
作者:  AmanKwatra;  M.P.Gupta;  AbhishekNarainSingh
收藏  |  浏览/下载:4/0  |  提交时间:2019/12/30
Audit of bank's information security when working with electronic money 期刊论文
The Problems of Economy, 2013, 卷号: No.4, 页码: 341-347
作者:  Melnychenko,O.V.
收藏  |  浏览/下载:4/0  |  提交时间:2020/01/04
Resiliency and application to routing protocols in wireless sensor networks 学位论文
: INSA de Lyon, 2013
作者:  OchirkhandErdene-Ochir
收藏  |  浏览/下载:3/0  |  提交时间:2019/12/30
Cryptovirology: Virus Approach 期刊论文
International Journal of Network Security and Its Applications, 2011, 卷号: Vol.3 No.4, 页码: 33-46
作者:  ShivaleSaurabhAnandrao
收藏  |  浏览/下载:2/0  |  提交时间:2020/01/04
Parallelized Side-Channel Attack Resisted Scalar Multiplication Using q-Based Addition-Subtraction k-Chains 会议论文
Hiroshima, Japan 【关键词】, 2016
作者:  KittiphonPhalakarn;  KittiphopPhalakarn;  VorapongSuppakitpaisarn
收藏  |  浏览/下载:5/0  |  提交时间:2019/12/24
SEED masking implementations against power analysis attacks 会议论文
2010
作者:  Hodgers,P.;  Lu,Y.;  Boey,K.;  O'Neill,M.
收藏  |  浏览/下载:2/0  |  提交时间:2020/01/04
Using Multiclass Machine Learning Methods to Classify Malicious Behaviors Aimed at Web Systems 会议论文
2012
作者:  Anastasovski,Goce;  Pantev,Risto;  Goseva-Popstojanova,Katerina
收藏  |  浏览/下载:5/0  |  提交时间:2020/01/04


©版权所有 ©2017 CSpace - Powered by CSpace