CORC

浏览/检索结果: 共12条,第1-10条 帮助

限定条件    
已选(0)清除 条数/页:   排序方式:
On the Implications of Zipf's Law in Passwords 其他
2016-01-01
Wang, Ding; Wang, Ping
收藏  |  浏览/下载:3/0  |  提交时间:2017/12/03
Fork Path: Improving Efficiency of ORAM by Removing Redundant Memory Accesse 其他
2015-01-01
Zhang, Xian; Sun, Guangyu; Zhang, Chao; Zhang, Weiqi; Liang, Yun; Wang, Tao; Chen, Yiran; Di, Jia
收藏  |  浏览/下载:4/0  |  提交时间:2017/12/03
A hybrid encryption scheme for RFID system 其他
2014-01-01
Wang, Yunfeng; Zheng, Xing; Wang, Jing; Guo, Donghui; 王云峰; 郭东辉
收藏  |  浏览/下载:3/0  |  提交时间:2015/07/22
Rapdos: A RFID authentication protocol for defending against DoS 其他
2012-01-01
Wang, Zhao; Zhang, Xuesong; Chen, Zhong
收藏  |  浏览/下载:2/0  |  提交时间:2015/11/17
Analysis of OpenXML-based office encryption mechanism 其他
2012-01-01
Wu, Xiaohong; Hong, Jingxin; Zhang, Yixiong; 洪景新; 张贻雄
收藏  |  浏览/下载:3/0  |  提交时间:2015/07/22
On the security of key derivation functions in office 其他
2012-01-01
Zhou, Jun; Chen, Jie; Pan, Kun; Zhao, Cuicui; Li, Xiaochao; 陈杰; 李晓潮
收藏  |  浏览/下载:3/0  |  提交时间:2015/07/22
An Efficient Contents Sharing Method for DRM 其他
2009-01-01
Feng, Xue; Tang, Zhi; Yu, YinYan
收藏  |  浏览/下载:5/0  |  提交时间:2015/11/13
Efficient Identity-Based Key Issue With TPM 其他
2008-01-01
Guan, Zhi; Sun, Huiping; Chen, Zhong; Nan, Xianghao
收藏  |  浏览/下载:2/0  |  提交时间:2015/11/12
A secure authenticated encryption scheme and its extension 其他
2007-01-01
Zhang, Jianhong; Cheng, Ji
收藏  |  浏览/下载:3/0  |  提交时间:2015/11/10
Evolvement of DRM schema: From encryption to interoperability and monitoring 其他
2007-01-01
Huang, Tiejun
收藏  |  浏览/下载:4/0  |  提交时间:2015/11/13


©版权所有 ©2017 CSpace - Powered by CSpace