CORC

浏览/检索结果: 共156条,第1-10条 帮助

限定条件                
已选(0)清除 条数/页:   排序方式:
cube cryptanalysis of lblock with noisy leakage 会议论文
15th International Conference on Information Security and Cryptology, ICISC 2012, Seoul, Korea, Republic of, November 28, 2012 - November 30, 2012
Li Zhenqi; Zhang Bin; Yao Yuan; Lin Dongdai
收藏  |  浏览/下载:9/0  |  提交时间:2013/09/22
a recognition system for online handwritten tibetan characters 会议论文
9th IAPR Workshop on Graphics Recognition, GREC 2011, Seoul, Korea, Republic of, September 15, 2011 - September 16, 2011
Ma Long-Long; Wu Jian
收藏  |  浏览/下载:13/0  |  提交时间:2013/09/22
A study on software effort prediction using machine learning techniques 会议论文
6th International Conference Evaluation of Novel Approaches to Software Engineering, ENASE 2011, Beijing, China, June 8, 2011 - June 11, 2011
Zhang, Wen (1); Yang, Ye (1); Wang, Qing (1)
收藏  |  浏览/下载:7/0  |  提交时间:2014/12/16
deformation models for dynamic terrain visualization 会议论文
2nd World Congress on Computer Science and Information Engineering, CSIE 2011, Changchun, China, June 17, 2011 - June 19, 2011
Zhang Jie; Zheng Changwen; Hu Xiaohui
收藏  |  浏览/下载:22/0  |  提交时间:2013/09/22
(pseudo) preimage attack on round-reduced grstl hash function and others 会议论文
19th International Workshop on Fast Software Encryption, FSE 2012, Washington, DC, United states, March 19, 2012 - March 21, 2012
Wu Shuang; Feng Dengguo; Wu Wenling; Guo Jian; Dong Le; Zou Jian
收藏  |  浏览/下载:11/0  |  提交时间:2013/09/22
cryptanalysis of reduced-round klein block cipher 会议论文
7th China International Conference on Information Security and Cryptography, Inscrypt 2011, Beijing, China, November 30, 2011 - December 3, 2011
Yu Xiaoli; Wu Wenling; Li Yanjun; Zhang Lei
收藏  |  浏览/下载:5/0  |  提交时间:2013/09/22
integration of iot with smart grid 会议论文
IET International Conference on Communication Technology and Application, ICCTA 2011, Beijing, China, October 14, 2011 - October 16, 2011
Chen Xi; Liu Jianming; Li Xiangzhen; Sun Limin; Zhen Yan
收藏  |  浏览/下载:23/0  |  提交时间:2013/09/22
autodunt: dynamic latent dependence analysis for detection of zero day vulnerability 会议论文
14th International Conference on Information Security and Cryptology, ICISC 2011, Seoul, Korea, Republic of, November 30, 2011 - December 2, 2011
Chen Kai; Lian Yifeng; Zhang Yingjun
收藏  |  浏览/下载:9/0  |  提交时间:2013/09/22
probabilistic multi-context systems 会议论文
Joint International Semantic Technology Conference, JIST 2011, Hangzhou, China, December 4, 2011 - December 7, 2011
Sotomayor Marco; Wang Kewen; Shen Yidong; Thornton John
收藏  |  浏览/下载:16/0  |  提交时间:2013/09/22
preimage attacks on step-reduced sm3 hash function 会议论文
14th International Conference on Information Security and Cryptology, ICISC 2011, Seoul, Korea, Republic of, November 30, 2011 - December 2, 2011
Zou Jian; Wu Wenling; Wu Shuang; Su Bozhan; Dong Le
收藏  |  浏览/下载:13/0  |  提交时间:2013/09/22


©版权所有 ©2017 CSpace - Powered by CSpace