CORC

浏览/检索结果: 共67条,第1-10条 帮助

限定条件                    
已选(0)清除 条数/页:   排序方式:
基于DCR假设的KDM-CCA安全性 其他
2017-01-01
郭伟; 常金勇; 高磊
收藏  |  浏览/下载:10/0  |  提交时间:2017/12/03
对象云存储中分类分级数据的访问控制方法 其他
2017-01-01
杨腾飞; 申培松; 田雪; 冯荣权
收藏  |  浏览/下载:8/0  |  提交时间:2017/12/03
Twin Odd-Graceful Trees Towards Information Security 其他
2017-01-01
Wang, Hongyu; Xu, Jin; Yao, Bing
收藏  |  浏览/下载:4/0  |  提交时间:2017/12/03
SEYARN: Enhancing Security of YARN Clusters Based on Health Check Service 其他
2017-01-01
Li, Wenting; Shen, Qingni; Dong, Chuntao; Yang, Yahui; Wu, Zhonghai
收藏  |  浏览/下载:4/0  |  提交时间:2017/12/03
DDoS  Hadoop  YARN  Security  
Separations in circular security for arbitrary length key cycles, revisited 其他
2016-01-01
Chang, Jinyong; Dai, Honglong; Xu, Maozhi; Xue, Rui
收藏  |  浏览/下载:3/0  |  提交时间:2017/12/03
A semantically secure public key cryptoscheme using bit-pair shadows 其他
2016-01-01
Su, Shenghui; Lu, Shuwang; Xu, Maozhi; Xie, Tao
收藏  |  浏览/下载:4/0  |  提交时间:2017/12/03
A semantically secure public key cryptoscheme using bit-pair shadows 其他
2016-01-01
Su, Shenghui; Lu, Shuwang; Xu, Maozhi; Xie, Tao
收藏  |  浏览/下载:6/0  |  提交时间:2017/12/03
The Applications of NVM Technology in Hardware Security 其他
2016-01-01
Yang, Chaofei; Liu, Beiye; Wang, Yandan; Chen, Yiran; Li, Hai; Zhang, Xian; Sun, Guangyu
收藏  |  浏览/下载:18/0  |  提交时间:2017/12/03
The Request for Better Measurement: A Comparative Evaluation of Two-Factor Authentication Schemes 其他
2016-01-01
Wang, Ding; Gu, Qianchen; Cheng, Haibo; Wang, Ping
收藏  |  浏览/下载:4/0  |  提交时间:2017/12/03
SLA-DO: A SLA-based Data Distribution Strategy on Multiple Cloud Storage Systems 其他
2016-01-01
Guo, Chang; Li, Ying; Wu, Zhonghai
收藏  |  浏览/下载:3/0  |  提交时间:2017/12/03


©版权所有 ©2017 CSpace - Powered by CSpace