CORC

浏览/检索结果: 共111条,第1-10条 帮助

限定条件                    
已选(0)清除 条数/页:   排序方式:
An improved authenticated key agreement with anonymity for session initiation protocol 期刊论文
International Journal of Electronic Security and Digital Forensics, 2017, 卷号: 9, 期号: 2
作者:  Shen, Han;  Chen, Haoran;  Chen, Jianhua
收藏  |  浏览/下载:9/0  |  提交时间:2019/12/05
Urban Ecological Security Simulation and Prediction Using an Improved Cellular Automata (CA) Approach-A Case Study for the City of Wuhan in China 期刊论文
INTERNATIONAL JOURNAL OF ENVIRONMENTAL RESEARCH AND PUBLIC HEALTH, 2017, 卷号: 14, 期号: 6
作者:  Gao, Yuan;  Zhang, Chuanrong;  He, Qingsong;  Liu, Yaolin
收藏  |  浏览/下载:3/0  |  提交时间:2019/12/05
Improved One-Round Phrase Search Schemes Over Symmetrically Encrypted Data in Storage Outsourcing System 其他
2017-01-01
作者:  Shen, Ling;  Wang, Jie
收藏  |  浏览/下载:9/0  |  提交时间:2019/12/05
Introduction to the Special Section on Security and Privacy in Wearable and Embedded Technologies 其他
2017-01-01
作者:  He, Debiao;  Choo, Kim-Kwang Raymond;  Kumar, Neeraj
收藏  |  浏览/下载:3/0  |  提交时间:2019/12/05
Agile Practitioners' Understanding of Security Requirements: Insights from a Grounded Theory Analysis 其他
2017-01-01
作者:  Terpstra, Evenynke;  Daneva, Maya;  Wang, Chong
收藏  |  浏览/下载:8/0  |  提交时间:2019/12/05
Special issue on Secure Computation on Encrypted Data 其他
2017-01-01
作者:  Chen, Jiageng;  He, Debiao;  Su, Chunhua;  Xia, Zhe
收藏  |  浏览/下载:12/0  |  提交时间:2019/12/05
Integrated Approach for Online Dynamic Security Assessment with Credibility and Visualization Based on Exploring Connotative Associations in Massive Data 期刊论文
IEEE Access, 2017, 卷号: 5
作者:  Fan, Youping;  Li, Xin;  Zhang, Peng
收藏  |  浏览/下载:8/0  |  提交时间:2019/12/05
AMR steganalysis based on second-order difference of pitch delay 期刊论文
IEEE Transactions on Information Forensics and Security, 2017, 卷号: 12, 期号: 6
作者:  Ren, Yanzhen;  Yang, Jing;  Wang, Jinwei;  Wang, Lina
收藏  |  浏览/下载:4/0  |  提交时间:2019/12/05
Introduction to the Special Section on Security and Privacy in Wearable and Embedded Technologies 期刊论文
Computers and Electrical Engineering, 2017, 卷号: 63
作者:  He, Debiao;  Choo, Kim-Kwang Raymond;  Kumar, Neeraj
收藏  |  浏览/下载:3/0  |  提交时间:2019/12/05
Homomorphic Cloud Computing Scheme Based on Hybrid Homomorphic Encryption 其他
2017-01-01
作者:  Song, Xidan;  Wang, Yulin
收藏  |  浏览/下载:5/0  |  提交时间:2019/12/05


©版权所有 ©2017 CSpace - Powered by CSpace