×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
软件研究所 [7]
深圳先进技术研究院 [4]
湖南大学 [2]
山东大学 [1]
华南理工大学 [1]
上海大学 [1]
更多...
内容类型
会议论文 [19]
发表日期
2017 [1]
2016 [1]
2013 [1]
2012 [2]
2011 [5]
2010 [1]
更多...
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共19条,第1-10条
帮助
限定条件
内容类型:会议论文
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
FPGA Optimal Implementation of PRINCE against Power Analysis Attacks
会议论文
ISCC 2017-the 5th International Conference on Information Science and Cloud Computing, 中国广东广州, 2017-12-16
作者:
Yi Zou
;
Lang Li
收藏
  |  
浏览/下载:1/0
  |  
提交时间:2019/12/24
Stability analysis of networked control systems with denial-of-service attacks
会议论文
11th UKACC International Conference on Control (UKACC Control), 2016-08-31
作者:
Zhang, Jin[1]
;
Peng, Chen[2]
;
Masroor, Suhaib[3]
;
Sun, Hongtao[4]
;
Chai, Lin[5]
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/04/26
Networked control systems
uniformly ultimately bounded
denial-of-service
Modbus/TCP communication anomaly detection based on PSO-SVM
会议论文
2013 2nd International Conference on Mechanical Design and Power Engineering, ICMDPE 2013, Beijing, China, November 29-30, 2013
作者:
Shang WL(尚文利)
;
Zhang SS(张盛山)
;
Wan M(万明)
收藏
  |  
浏览/下载:9/0
  |  
提交时间:2014/04/16
Intrusion detection
back propagation neural network based leakage characterization for practical security analysis of cryptographic implementations
会议论文
14th International Conference on Information Security and Cryptology, ICISC 2011, Seoul, Korea, Republic of, November 30, 2011 - December 2, 2011
Yang Shuguo
;
Zhou Yongbin
;
Liu Jiye
;
Chen Danyang
收藏
  |  
浏览/下载:14/0
  |  
提交时间:2013/09/22
Cryptography
Neural networks
Security of data
an efficient leakage characterization method for profiled power analysis attacks
会议论文
14th International Conference on Information Security and Cryptology, ICISC 2011, Seoul, Korea, Republic of, November 30, 2011 - December 2, 2011
Zhang Hailong
;
Zhou Yongbin
;
Feng Dengguo
收藏
  |  
浏览/下载:10/0
  |  
提交时间:2013/09/22
Characterization
Efficiency
Security of data
Simple power analysis attacks using chosen message against ECC hardware implementations
会议论文
World Congress on Internet Security, WorldCIS-2011, London, United kingdom
作者:
Huiyun Li
;
keke Wu
;
Guoqing Xu
;
Hai Yuan
;
Peng Luo
收藏
  |  
浏览/下载:13/0
  |  
提交时间:2015/08/25
simple power analysis attacks using chosen message against ecc hardware implementations
会议论文
World Congress on Internet Security, WorldCIS-2011, London, United kingdom, 2-Feb
Li Huiyun
;
Wu Keke
;
Xu Guoqing
;
Yuan Hai
;
Luo Peng
收藏
  |  
浏览/下载:22/0
  |  
提交时间:2011/10/10
Algorithms
Hardware
Internet
Public key cryptography
Telecommunication networks
an instruction-level software simulation approach to resistance evaluation of cryptographic implementations against power analysis attacks
会议论文
2011 IEEE International Conference on Computer Science and Automation Engineering, CSAE 2011, Shanghai, China, 10-Jun-02
Li Jiantang
;
Zhou Yongbin
;
Liu Jiye
;
Zhang Hailong
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2011/10/10
Computer science
Computer simulation
Cryptography
how to characterize side-channel leakages more accurately?
会议论文
7th International Conference on Information Security Practice and Experience, ISPEC 2011, Guangzhou, China, 30-May-20
Liu Jiye
;
Zhou Yongbin
;
Han Yang
;
Li Jiantang
;
Yang Shuguo
;
Feng Dengguo
收藏
  |  
浏览/下载:9/0
  |  
提交时间:2011/10/10
Characterization
Security systems
The impact of the clock frequency on the power analysis attacks
会议论文
2011 International Conference on Internet Technology and Applications, iTAP 2011, August 16, 2011 - August 18, 2011
作者:
Du, Zhi-Bo
;
Chen, Yun
;
Chen, Ai-Dong
收藏
  |  
浏览/下载:1/0
  |  
提交时间:2019/12/31
©版权所有 ©2017 CSpace - Powered by
CSpace