×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
北京大学 [8]
内容类型
期刊论文 [6]
其他 [2]
发表日期
2016 [1]
2015 [1]
2014 [1]
2013 [3]
2011 [1]
2008 [1]
更多...
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共8条,第1-8条
帮助
限定条件
专题:北京大学
第一署名单位
第一作者单位
通讯作者单位
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Topic shift impairs pronoun resolution during sentence comprehension: Evidence from event-related potentials
期刊论文
PSYCHOPHYSIOLOGY, 2016
Xu, Xiaodong
;
Zhou, Xiaolin
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2017/12/03
Topic
Topic shift
Subject shift
Pronoun resolution
ERP
P600
BRAIN POTENTIALS
LANGUAGE COMPREHENSION
REFERRING EXPRESSIONS
GRAMMATICAL GENDER
IMPLICIT CAUSALITY
TIME-COURSE
ERP
CHINESE
INFORMATION
DISCOURSE
Preserving privacy for free: Efficient and provably secure two-factor authentication scheme with user anonymity
期刊论文
INFORMATION SCIENCES, 2015
Wang, Ding
;
Wang, Nan
;
Wang, Ping
;
Qing, Sihan
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2017/12/03
Password authentication
User anonymity
De-synchronization
Random oracle model
WIRELESS SENSOR NETWORKS
KEY AGREEMENT PROTOCOL
SMART-CARDS
PASSWORD AUTHENTICATION
MUTUAL AUTHENTICATION
MOBILE NETWORKS
ROBUST
EXCHANGE
ENHANCEMENT
CRYPTANALYSIS
Understanding security failures of two-factor authentication schemes for real-time applications in hierarchical wireless sensor networks
期刊论文
2014
Wang, Ding
;
Wang, Ping
收藏
  |  
浏览/下载:6/0
  |  
提交时间:2015/11/11
Password authentication
Hierarchical wireless sensor networks
User anonymity
Smart card
Non-tamper resistant
REMOTE USER AUTHENTICATION
CLIENT-SERVER ENVIRONMENT
SMART-CARDS
PASSWORD AUTHENTICATION
MUTUAL AUTHENTICATION
KEY AGREEMENT
ANALYSIS ATTACKS
ACCESS-CONTROL
EFFICIENT
PROTOCOL
An attribute-based encryption scheme with constant-size ciphertexts
其他
2013-01-01
Qi, Yanfeng
;
Tang, Chunming
;
Lou, Yu
;
Xu, Maozhi
;
Guo, Baoan
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2015/11/13
Fine-grained document sharing using attribute-based encryption in cloud servers
其他
2013-01-01
Xu, Dongyang
;
Luo, Fengying
;
Gao, Lin
;
Tang, Zhi
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2015/11/17
Cryptanalysis and Improvement of a Password-Based Remote User Authentication Scheme without Smart Cards
期刊论文
2013
He, Debiao
;
Wang, Ding
;
Wu, Shuhua
收藏
  |  
浏览/下载:6/0
  |  
提交时间:2015/11/16
password-based
smart card
mutual authentication
KEY AGREEMENT PROTOCOL
LigBuilder 2: A Practical de Novo Drug Design Approach
期刊论文
journal of chemical information and modeling, 2011
Yuan, Yaxia
;
Pei, Jianfeng
;
Lai, Luhua
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2015/11/10
MOLECULAR ARCHITECTURES
BINDING-SITES
LIGAND DESIGN
INHIBITORS
PROGRAM
COMBINATORIAL
GENERATION
DISCOVERY
RECEPTOR
DATABASE
Separation of duty in privileged operating systems
期刊论文
jisuanji yanjiu yu fazhancomputer research and development, 2008
Cai, Jiayong
;
Qing, Sihan
;
Liu, Wei
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2015/11/17
©版权所有 ©2017 CSpace - Powered by
CSpace