CORC

浏览/检索结果: 共10条,第1-10条 帮助

限定条件                    
已选(0)清除 条数/页:   排序方式:
Making Tagging Systems Resistant to Tricky Spam Attacks 其他
2015-01-01
Li, Zhou; Tang, Cong; Hu, Jianbin; Chen, Zhong
收藏  |  浏览/下载:2/0  |  提交时间:2017/12/03
Vulnerabilities Scoring Approach for Cloud SaaS 其他
2015-01-01
Li, Zhou; Tang, Cong; Hu, Jianbin; Chen, Zhong
收藏  |  浏览/下载:4/0  |  提交时间:2017/12/03
Need For Symmetry: Addressing Privacy Risks in Online Social Networks 其他
2011-01-01
Tang, Cong; Wang, Yonggang; Xiong, Hu; Yang, Tao; Hu, Jianbin; Shen, Qingni; Chen, Zhong
收藏  |  浏览/下载:2/0  |  提交时间:2015/11/16
Yet Another Certificateless three-party authenticated key agreement protocol 其他
2011-01-01
Hu, Jianbin; Xiong, Hu; Guan, Zhi; Tang, Cong; Wang, Yonggang; Xin, Wei; Chen, Zhong
收藏  |  浏览/下载:2/0  |  提交时间:2015/11/13
VLSP: Enabling location privacy in vehicular location based services 其他
2011-01-01
Yang, Tao; Tang, Cong; Yu, Liangwen; Xin, Wei; Deng, Yong; Hu, Jianbin; Chen, Zhong
收藏  |  浏览/下载:3/0  |  提交时间:2015/11/13
A hybrid movie recommender based on ontology and neural networks 其他
2010-01-01
Deng, Yong; Wu, Zhonghai; Tang, Cong; Si, Huayou; Xiong, Hu; Chen, Zhong
收藏  |  浏览/下载:3/0  |  提交时间:2015/11/13
An Adjacency Matrixes-based Model for Network Security Analysis 其他
2010-01-01
Xie, Anming; Tang, Cong; Gui, Nike; Cai, Zhuhua; Hu, Jianbin; Chen, Zhong
收藏  |  浏览/下载:3/0  |  提交时间:2015/11/16
SOLUTION STRUCTURE OF DROSOPHILA SNF:IMPLICATIONS FOR ITS ROLE IN SEX-LETHAL SPLICING 其他
2009-01-01
Jicheng HU; Gaofeng CUI; Congmin LI; Cong LIU; Erchang SHANG; Luhua LAI; Changwen JIN; Jiwu WANG; Bin XIA
收藏  |  浏览/下载:4/0  |  提交时间:2017/12/03
Evaluating Network Security With Two-layer Attack Graphs 其他
2009-01-01
Xie, Anming; Cai, Zhuhua; Tang, Cong; Hu, Jianbin; Chen, Zhong
收藏  |  浏览/下载:3/0  |  提交时间:2015/11/12
SKIP: A Secure Key Issuing Scheme for Peer-to-Peer Networks 其他
2009-01-01
Tang, Cong; Chen, Ruichuan; Cai, Zhuhua; Me, Anming; Hu, Jianbin; Tang, Liyong; Chen, Zhong
收藏  |  浏览/下载:3/0  |  提交时间:2015/11/12


©版权所有 ©2017 CSpace - Powered by CSpace