CORC

浏览/检索结果: 共116条,第1-10条 帮助

限定条件                    
已选(0)清除 条数/页:   排序方式:
On the rate of coincidence of two clock-controlled combiners (EI收录) 会议论文
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Beijing, China, November 29, 2006 - December 1, 2006
作者:  Hu, Xuexian[1];  Ming, Yongtao[1];  Liu, Wenfen[1];  Li, Shiqu[1]
收藏  |  浏览/下载:3/0  |  提交时间:2019/04/18
Zero-knowledge proof of generalized compact Knapsacks (or a novel identification/signature scheme) (EI收录) 会议论文
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Wuhan, China, September 3, 2006 - September 6, 2006
作者:  Qin, Bo[1,2,3];  Wu, Qianhong[2];  Susilo, Willy[2];  Mu, Yi[2];  Wang, Yumin[1]
收藏  |  浏览/下载:4/0  |  提交时间:2019/04/18
A fair item-item exchange protocol satisfying newly introduced requirements (EI收录) 会议论文
Proceedings - 3rd International Conference on Information Technology and Applications, ICITA 2005, Sydney, Australia, July 4, 2005 - July 7, 2005
作者:  Wang, Hao[1];  Guo, Heqing[1];  Lin, Manshan[1];  Yin, Jianfei[1]
收藏  |  浏览/下载:0/0  |  提交时间:2019/04/18
Simple threshold RSA signature scheme based on simple secret sharing (EI收录) 会议论文
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Xi'an, China, December 15, 2005 - December 19, 2005
作者:  Tang, Shaohua[1]
收藏  |  浏览/下载:2/0  |  提交时间:2019/04/18
CA server cluster computing architecture and algorithms (EI收录) 会议论文
Proceedings of the IASTED International Conference on Parallel and Distributed Computing and Systems, Cambridge, MA, United states, November 9, 2004 - November 11, 2004
作者:  Tang, Shaohua[1]
收藏  |  浏览/下载:3/0  |  提交时间:2019/04/18
Security measurements of steganographic systems (CPCI-S收录) 会议论文
APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS
作者:  Zhang, WM;  Li, SQ
收藏  |  浏览/下载:0/0  |  提交时间:2019/04/18
Weaknesses of a password-authenticated key exchange protocol between clients with different passwords (EI收录) 会议论文
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Yellow Mountain, China, June 8, 2004 - June 11, 2004
作者:  Wang, Shuhong[1];  Wang, Jie[1];  Xu, Maozhi[1]
收藏  |  浏览/下载:1/0  |  提交时间:2019/04/18
Construction and analysis of Boolean functions of 2t + 1 variables with maximum algebraic immunity (EI收录) 会议论文
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Shanghai, China, December 3, 2006 - December 7, 2006
作者:  Li, Na[1];  Qi, Wen-Feng[1]
收藏  |  浏览/下载:2/0  |  提交时间:2019/04/18
A note of perfect nonlinear functions (EI收录) 会议论文
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Suzhou, China, December 8, 2006 - December 10, 2006
作者:  Zhang, Xiyong[1,2];  Guo, Hua[3];  Yuan, Jinjiang[1]
收藏  |  浏览/下载:0/0  |  提交时间:2019/04/18
Authenticated and communication efficient group key agreement for clustered ad hoc networks (EI收录) 会议论文
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Suzhou, China, December 8, 2006 - December 10, 2006
作者:  Shi, Hongsong[1,2];  He, Mingxing[1];  Qin, Zhiguang[2]
收藏  |  浏览/下载:0/0  |  提交时间:2019/04/18


©版权所有 ©2017 CSpace - Powered by CSpace