×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
华南理工大学 [43]
内容类型
会议 [43]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共43条,第1-10条
帮助
限定条件
内容类型:会议
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Real-time state analysis of digitron and press plate in transformer substations (EI收录)
会议
Hangzhou, Zhejiang, China,
作者:
Zhu, Hongmin[1,2]
;
Dai, Daoqing[1]
;
Li, Jingzheng[2]
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/04/11
Artificial intelligence
Computational efficiency
Image coding
Image processing
Mathematical morphology
Presses (machine tools)
Security systems
Video signal processing
Video streaming
Secure conjunctive multi-keyword search for multiple data owners in cloud computing (EI收录)
会议
Wuhan, Hubei, China,
作者:
Yin, Hui[1,2]
收藏
  |  
浏览/下载:0/0
  |  
提交时间:2019/04/11
Cloud computing
Cryptography
Network security
Query processing
Leakage-Resilient anonymous identity-based broadcast encryption in the standard model (EI收录)
会议
Zhangjiajie, China,
作者:
Zhang, Leyou[1]
;
Wang, Zhuanning[1]
;
Wu, Qing[2]
收藏
  |  
浏览/下载:1/0
  |  
提交时间:2019/04/11
Computer architecture
Parallel architectures
Security of data
An Anti-Trojans Design Approach Based on Activation Probability Analysis (CPCI-S收录)
会议
作者:
Ye, Xuwei
;
Feng, Jianhua[1]
;
Gong, Haoran
;
He, Chunhua
;
Feng, Weilei
收藏
  |  
浏览/下载:1/0
  |  
提交时间:2019/04/11
Hardware Trojan
probability obfuscation scan chain
hardware security
activation probability
A Study of Hybrid DEA Model with Negative Data Based on Non-Oriented Measure
会议
作者:
Gao Lihao[1]
;
Ma Lu[1]
;
Wei Yiyi[2]
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/04/11
NOM- Hybrid DEA
SORM
CCR DEA
SBM DEA
Security Companies
Multi-tenancy authorization models for collaborative cloud services (CPCI-S收录)
会议
作者:
Tang, Bo[1,2]
;
Sandhu, Ravi[1,2]
;
Li, Qi[1,3]
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/04/11
security models for cloud computing
access control in collaboration environments
role-based access control
reputation
and trust
fundamentals and frameworks for security in collaboration systems
privacy protection for collaboration systems
Secure Image Deduplication in Cloud Storage (CPCI-S收录)
会议
作者:
Gang, Han[1]
;
Yan, Hongyang[2]
;
Xu, Lingling[3]
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/04/11
Cloud computing
Image deduplication
Cloud storage
Security
Two approaches to build UOV variants with shorter private key and faster signature generation (EI收录)
会议
Beijing, China,
作者:
Tan, Yang[1]
;
Tang, Shaohua[1]
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/04/11
Cryptography
Public key cryptography
Security of data
Fast implementation of simple matrix encryption scheme on modern x64 CPU (EI收录)
会议
Zhangjiajie, China,
作者:
Peng, Zhiniang[1]
;
Tang, Shaohua[1]
;
Chen, Ju[1]
;
Wu, Chen[1]
;
Zhang, Xinglin[1]
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2019/04/11
Outages
Probability
Public key cryptography
Security of data
Security systems
An easy defense mechanism against botnet-based DDoS flooding attack originated in SDN environment using sFlow (EI收录)
会议
Nanjing, China,
作者:
Lu, Yiqin[1]
;
Wang, Meng[1]
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2019/04/11
Complex networks
Distributed computer systems
Internet
Malware
Network security
Transmission control protocol
©版权所有 ©2017 CSpace - Powered by
CSpace