已选(0)清除
条数/页: 排序方式:
|
| 基于DCR假设的KDM-CCA安全性 其他 2017-01-01 郭伟; 常金勇; 高磊
![](/themes/default/image/downing1.png) 收藏  |  浏览/下载:10/0  |  提交时间:2017/12/03
|
| 对象云存储中分类分级数据的访问控制方法 其他 2017-01-01 杨腾飞; 申培松; 田雪; 冯荣权
![](/themes/default/image/downing1.png) 收藏  |  浏览/下载:8/0  |  提交时间:2017/12/03
|
| Twin Odd-Graceful Trees Towards Information Security 其他 2017-01-01 Wang, Hongyu; Xu, Jin; Yao, Bing
![](/themes/default/image/downing1.png) 收藏  |  浏览/下载:4/0  |  提交时间:2017/12/03
|
| SEYARN: Enhancing Security of YARN Clusters Based on Health Check Service 其他 2017-01-01 Li, Wenting; Shen, Qingni; Dong, Chuntao; Yang, Yahui; Wu, Zhonghai
![](/themes/default/image/downing1.png) 收藏  |  浏览/下载:4/0  |  提交时间:2017/12/03
|
| Separations in circular security for arbitrary length key cycles, revisited 其他 2016-01-01 Chang, Jinyong; Dai, Honglong; Xu, Maozhi; Xue, Rui
![](/themes/default/image/downing1.png) 收藏  |  浏览/下载:3/0  |  提交时间:2017/12/03
|
| A semantically secure public key cryptoscheme using bit-pair shadows 其他 2016-01-01 Su, Shenghui; Lu, Shuwang; Xu, Maozhi; Xie, Tao
![](/themes/default/image/downing1.png) 收藏  |  浏览/下载:4/0  |  提交时间:2017/12/03
|
| A semantically secure public key cryptoscheme using bit-pair shadows 其他 2016-01-01 Su, Shenghui; Lu, Shuwang; Xu, Maozhi; Xie, Tao
![](/themes/default/image/downing1.png) 收藏  |  浏览/下载:6/0  |  提交时间:2017/12/03
|
| The Applications of NVM Technology in Hardware Security 其他 2016-01-01 Yang, Chaofei; Liu, Beiye; Wang, Yandan; Chen, Yiran; Li, Hai; Zhang, Xian; Sun, Guangyu
![](/themes/default/image/downing1.png) 收藏  |  浏览/下载:18/0  |  提交时间:2017/12/03
|
| The Request for Better Measurement: A Comparative Evaluation of Two-Factor Authentication Schemes 其他 2016-01-01 Wang, Ding; Gu, Qianchen; Cheng, Haibo; Wang, Ping
![](/themes/default/image/downing1.png) 收藏  |  浏览/下载:4/0  |  提交时间:2017/12/03
|
| SLA-DO: A SLA-based Data Distribution Strategy on Multiple Cloud Storage Systems 其他 2016-01-01 Guo, Chang; Li, Ying; Wu, Zhonghai
![](/themes/default/image/downing1.png) 收藏  |  浏览/下载:3/0  |  提交时间:2017/12/03
|