CORC

浏览/检索结果: 共18条,第1-10条 帮助

限定条件                    
已选(0)清除 条数/页:   排序方式:
finding and fixing vulnerabilities in several three-party password authenticated key exchange protocols without server public keys 期刊论文
Information Sciences, 2013, 页码: -
Xiong Hu; Chen Yanan; Guan Zhi; Chen Zhong
收藏  |  浏览/下载:13/0  |  提交时间:2013/09/17
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics): Preface 期刊论文
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2013, 卷号: 8202 LNAI, 页码: V-VI
Sun, Maosong (1); Liu, Ting (2); Sun, Le (3); Zhang, Min (4); Lin, Dekang (5); Wang, Haifeng (6)
收藏  |  浏览/下载:164/0  |  提交时间:2014/12/16
fully secure attribute-based systems with short ciphertexts/signatures and threshold access structures 会议论文
Cryptographers' Track at the RSA Conference 2013, CT-RSA 2013, San Francisco, CA, United states, February 25, 2013 - March 1, 2013
Chen Cheng; Chen Jie; Lim Hoon Wei; Zhang Zhenfeng; Feng Dengguo; Ling San; Wang Huaxiong
收藏  |  浏览/下载:23/0  |  提交时间:2013/09/22
Predicate Index Matching Algorithm Based on History Experience 会议论文
International Conference on Computer Science and Artificial Intelligence (ICCSAI), Chengdu, PEOPLES R CHINA, NOV 16-17, 2013
Wu, Yu-bin; Wang, Hai-bo
收藏  |  浏览/下载:12/0  |  提交时间:2014/12/16
tracking end-effectors for marker-less 3d human motion estimation in multi-view image sequences 会议论文
15th International Conference on Human-Computer Interaction, HCI International 2013, Las Vegas, NV, United states, July 21, 2013 - July 26, 2013
Wang Wenzhong; Wang Zhaoqi; Deng Xiaoming; Luo Bin
收藏  |  浏览/下载:16/0  |  提交时间:2013/09/22
recursive diffusion layers for (lightweight) block ciphers and hash functions 会议论文
19th International Conference on Selected Areas in Cryptography, SAC 2012, Windsor, ON, Canada, August 15, 2012 - August 16, 2012
Wu Shengbao; Wang Mingsheng; Wu Wenling
收藏  |  浏览/下载:14/0  |  提交时间:2013/09/22
improved key recovery attacks on reduced-round salsa20 and chacha 会议论文
15th International Conference on Information Security and Cryptology, ICISC 2012, Seoul, Korea, Republic of, November 28, 2012 - November 30, 2012
Shi Zhenqing; Zhang Bin; Feng Dengguo; Wu Wenling
收藏  |  浏览/下载:13/0  |  提交时间:2013/09/22
efficient public key cryptosystem resilient to key leakage chosen ciphertext attacks 会议论文
Cryptographers' Track at the RSA Conference 2013, CT-RSA 2013, San Francisco, CA, United states, February 25, 2013 - March 1, 2013
Liu Shengli; Weng Jian; Zhao Yunlei
收藏  |  浏览/下载:12/0  |  提交时间:2013/09/22
geometric quantifier elimination heuristics for automatically generating octagonal and max-plus invariants 期刊论文
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2013, 卷号: 7788, 页码: 189-228
Kapur Deepak; Zhang Zhihai; Horbach Matthias; Zhao Hengjun; Lu Qi; Nguyen ThanhVu
收藏  |  浏览/下载:13/0  |  提交时间:2013/09/17
e-block: a tangible programming tool with graphical blocks 期刊论文
Mathematical Problems in Engineering, 2013, 卷号: 2013, 页码: -
Wang Danli; Zhang Yang; Chen Shengyong
收藏  |  浏览/下载:23/0  |  提交时间:2013/09/17


©版权所有 ©2017 CSpace - Powered by CSpace