CORC

浏览/检索结果: 共52条,第1-10条 帮助

已选(0)清除 条数/页:   排序方式:
Seasonal and Spatial Variations in Fish Assemblage in the Yangtze Estuary and Adjacent Waters and Their Relationship with Environmental Factors 期刊论文
JOURNAL OF MARINE SCIENCE AND ENGINEERING, 2022, 卷号: 10, 期号: 11, 页码: 15
作者:  Chen, Zhaomin;  Ren, Qingqiang;  Liu, Chunlong;  Xian, Weiwei
收藏  |  浏览/下载:18/0  |  提交时间:2023/01/04
Improvement of BBRv2 Congestion Control Algorithm Based on Flow-aware ECN 期刊论文
SECURITY AND COMMUNICATION NETWORKS, 2022, 卷号: 2022
作者:  Pan, Wansu;  Tan, Haibo;  Li, Xiaofeng;  Xu, Jinlin;  Li, Xiru
收藏  |  浏览/下载:7/0  |  提交时间:2022/12/23
Breaking the hardness assumption and IND-CPA security of HQC submitted to NIST PQC project 期刊论文
IET INFORMATION SECURITY, 2020, 卷号: 14, 期号: 3, 页码: 313-320
作者:  Liu, Zhen;  Pan, Yanbin;  Xie, Tianyuan
收藏  |  浏览/下载:53/0  |  提交时间:2020/10/12
Efficient pairing-free PRE schemes for multimedia data sharing in IoT 期刊论文
MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 卷号: 77, 页码: 18327-18354
作者:  Hu, Xing;  Tang, Chunming;  Wong, Duncan S.;  Zheng, Xianghan
收藏  |  浏览/下载:6/0  |  提交时间:2019/11/21
Privacy-Preserving Sensory Data Recovery 会议论文
New York, NY, United states, July 31, 2018 - August 3, 2018
作者:  Chen, Cai;  Zhang, Manyuan;  Zhang, Huanzhi;  Huang, Zhenyun;  Li, Yong
收藏  |  浏览/下载:3/0  |  提交时间:2019/12/09
基于DCR假设的KDM-CCA安全性 其他
2017-01-01
郭伟; 常金勇; 高磊
收藏  |  浏览/下载:10/0  |  提交时间:2017/12/03
The roles of countries in the international fossil fuel trade: An emergy and network analysis 期刊论文
ENERGY POLICY, 2017, 卷号: 100, 页码: 365-376
作者:  Zhong, Weiqiong;  An, Haizhong;  Shen, Lei;  Fang, Wei;  Gao, Xiangyun
收藏  |  浏览/下载:14/0  |  提交时间:2019/09/26
Introduction to the Special Section on Security and Privacy in Wearable and Embedded Technologies 期刊论文
Computers and Electrical Engineering, 2017, 卷号: 63
作者:  He, Debiao;  Choo, Kim-Kwang Raymond;  Kumar, Neeraj
收藏  |  浏览/下载:3/0  |  提交时间:2019/12/05
Efficient CCA2 secure revocable multi-authority large-universe attribute-based encryption 会议论文
9th International Symposium on Cyberspace Safety and Security, CSS 2017, Xi'an, China, 2017-10-23
作者:  Li, Dawei;  Chen, Jie;  Liu, Jianwei;  Wu, Qianhong;  Liu, Weiran
收藏  |  浏览/下载:6/0  |  提交时间:2019/12/30
Separations in circular security for arbitrary length key cycles, revisited 其他
2016-01-01
Chang, Jinyong; Dai, Honglong; Xu, Maozhi; Xue, Rui
收藏  |  浏览/下载:3/0  |  提交时间:2017/12/03


©版权所有 ©2017 CSpace - Powered by CSpace