CORC

浏览/检索结果: 共9条,第1-9条 帮助

限定条件    
已选(0)清除 条数/页:   排序方式:
Establish the intrinsic binding in naming space for future internet using combined public key 其他
2016-01-01
Meng, Hongwei; Chen, Zhong; Hu, Jianbin; Guan, Zhi
收藏  |  浏览/下载:5/0  |  提交时间:2017/12/03
Later Passages of Neural Progenitor Cells from Neonatal Brain Are More Permissive for Human Cytomegalovirus Infection (vol 87, pg 10968, 2013) 其他
2016-01-01
作者:  Pan, Xing;  Li, Xiao-Jun;  Liu, Xi-Juan;  Yuan, Hui;  Li, Jia-Fu
收藏  |  浏览/下载:4/0  |  提交时间:2019/12/05
Yet Another Certificateless three-party authenticated key agreement protocol 其他
2011-01-01
Hu, Jianbin; Xiong, Hu; Guan, Zhi; Tang, Cong; Wang, Yonggang; Xin, Wei; Chen, Zhong
收藏  |  浏览/下载:2/0  |  提交时间:2015/11/13
Produre: A Novel proximity discovery mechanism in location tagging system 其他
2011-01-01
Hu, Jianbin; Wang, Yonggang; Yang, Tao; Guan, Zhi; Gui, Nike; Chen, Zhong
收藏  |  浏览/下载:3/0  |  提交时间:2015/11/13
TEAMA: Trust evaluation based authorization model for ad hoc networks 其他
2011-01-01
Jing, Qi; Hu, Jianbin; Guan, Zhi; Chen, Zhong
收藏  |  浏览/下载:3/0  |  提交时间:2015/11/13
Mobile browser as a second factor for web authentication 其他
2011-01-01
Guan, Zhi; Xiong, Hu; Li, Suke; Chen, Zhong
收藏  |  浏览/下载:6/0  |  提交时间:2015/11/13
Identity-based encryption based on DHIES 其他
2010-01-01
Chen, Yu; Charlemagne, Manuel; Guan, Zhi; Hu, Jianbin; Chen, Zhong
收藏  |  浏览/下载:2/0  |  提交时间:2015/11/13
An economical model for the risk evaluation of DoS vulnerabilities in cryptography protocols 其他
2007-01-01
Cao, Zhen; Guan, Zhi; Chen, Zhong; Hu, Jianbin; Tang, Liyong
收藏  |  浏览/下载:4/0  |  提交时间:2017/12/03
An economical model for the risk evaluation of DoS vulnerabilities in cryptography protocols 其他
2007-01-01
Cao, Zhen; Guan, Zhi; Chen, Zhong; Hu, Jianbin; Tang, Liyong
收藏  |  浏览/下载:2/0  |  提交时间:2015/11/13


©版权所有 ©2017 CSpace - Powered by CSpace