×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
华南理工大学 [116]
内容类型
会议论文 [116]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共116条,第1-10条
帮助
限定条件
内容类型:会议论文
专题:华南理工大学
第一署名单位
第一作者单位
通讯作者单位
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
On the rate of coincidence of two clock-controlled combiners (EI收录)
会议论文
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Beijing, China, November 29, 2006 - December 1, 2006
作者:
Hu, Xuexian[1]
;
Ming, Yongtao[1]
;
Liu, Wenfen[1]
;
Li, Shiqu[1]
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/04/18
Computer crime
Correlation methods
Cryptography
Mathematical models
Probability
Zero-knowledge proof of generalized compact Knapsacks (or a novel identification/signature scheme) (EI收录)
会议论文
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Wuhan, China, September 3, 2006 - September 6, 2006
作者:
Qin, Bo[1,2,3]
;
Wu, Qianhong[2]
;
Susilo, Willy[2]
;
Mu, Yi[2]
;
Wang, Yumin[1]
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/04/18
Approximation theory
Artificial intelligence
Computer science
Cryptography
Information technology
Problem solving
A fair item-item exchange protocol satisfying newly introduced requirements (EI收录)
会议论文
Proceedings - 3rd International Conference on Information Technology and Applications, ICITA 2005, Sydney, Australia, July 4, 2005 - July 7, 2005
作者:
Wang, Hao[1]
;
Guo, Heqing[1]
;
Lin, Manshan[1]
;
Yin, Jianfei[1]
收藏
  |  
浏览/下载:0/0
  |  
提交时间:2019/04/18
Computer networks
Cryptography
Network protocols
Problem solving
Simple threshold RSA signature scheme based on simple secret sharing (EI收录)
会议论文
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Xi'an, China, December 15, 2005 - December 19, 2005
作者:
Tang, Shaohua[1]
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/04/18
Computational complexity
Computational methods
Computer science
Cryptography
CA server cluster computing architecture and algorithms (EI收录)
会议论文
Proceedings of the IASTED International Conference on Parallel and Distributed Computing and Systems, Cambridge, MA, United states, November 9, 2004 - November 11, 2004
作者:
Tang, Shaohua[1]
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/04/18
Algorithms
Computational methods
Computer architecture
Electronic document identification systems
Mathematical models
Public key cryptography
Robustness (control systems)
Servers
Security measurements of steganographic systems (CPCI-S收录)
会议论文
APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS
作者:
Zhang, WM
;
Li, SQ
收藏
  |  
浏览/下载:0/0
  |  
提交时间:2019/04/18
Weaknesses of a password-authenticated key exchange protocol between clients with different passwords (EI收录)
会议论文
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Yellow Mountain, China, June 8, 2004 - June 11, 2004
作者:
Wang, Shuhong[1]
;
Wang, Jie[1]
;
Xu, Maozhi[1]
收藏
  |  
浏览/下载:1/0
  |  
提交时间:2019/04/18
Cryptography
Network security
Construction and analysis of Boolean functions of 2t + 1 variables with maximum algebraic immunity (EI收录)
会议论文
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Shanghai, China, December 3, 2006 - December 7, 2006
作者:
Li, Na[1]
;
Qi, Wen-Feng[1]
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/04/18
Algebra
Cryptography
Network security
A note of perfect nonlinear functions (EI收录)
会议论文
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Suzhou, China, December 8, 2006 - December 10, 2006
作者:
Zhang, Xiyong[1,2]
;
Guo, Hua[3]
;
Yuan, Jinjiang[1]
收藏
  |  
浏览/下载:0/0
  |  
提交时间:2019/04/18
Cryptography
Network security
Authenticated and communication efficient group key agreement for clustered ad hoc networks (EI收录)
会议论文
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Suzhou, China, December 8, 2006 - December 10, 2006
作者:
Shi, Hongsong[1,2]
;
He, Mingxing[1]
;
Qin, Zhiguang[2]
收藏
  |  
浏览/下载:0/0
  |  
提交时间:2019/04/18
Cryptography
Network security
©版权所有 ©2017 CSpace - Powered by
CSpace