CORC

浏览/检索结果: 共53条,第1-10条 帮助

限定条件    
已选(0)清除 条数/页:   排序方式:
A KG-based Enhancement Framework for Fact Checking Using Category Information 会议论文
线上, 2020年11月
作者:  Wang S(王帅);  Wang L(王磊);  Mao WJ(毛文吉)
收藏  |  浏览/下载:4/0  |  提交时间:2022/07/01
The Reliability EMC Design of WIA-PA Wireless Networks Equipment 会议论文
2017 International Conference on Circuits, Devices and Systems (ICCDS), Chengdu, China, September 5-8, 2017
作者:  Jiao P(焦平);  Yang ZJ(杨志家)
收藏  |  浏览/下载:32/0  |  提交时间:2017/12/21
Idology and Its Applications in Public Security and Network Security 会议论文
INTELLIGENCE AND SECURITY INFORMATICS (PAISI 2017), 2017-01-01
作者:  Su, Shenghui;  Zheng, Jianhua;  Lu, Shuwang;  Huang, Zhiqiu;  Li, Zhoujun
收藏  |  浏览/下载:5/0  |  提交时间:2019/12/30
iPUF: Interconnect PUF with Self-Masking Circuit for Performance Enhancement 会议论文
2017 18TH INTERNATIONAL WORKSHOP ON MICROPROCESSOR AND SOC TEST, SECURITY AND VERIFICATION (MTV 2017), 2017-01-01
作者:  Yu, Liting;  Wang, Xiaoxiao;  Rahman, Fahim;  Tehranipoor, Mark
收藏  |  浏览/下载:3/0  |  提交时间:2019/12/30
Confidentiality-Preserving Publicly Verifiable Computation 会议论文
10th International Conference on Provable Security (ProvSec), Nanjing Univ Finance & Econ, Nanjing, PEOPLES R CHINA, 2017-09-01
作者:  Sun, Jiameng;  Zhu, Binrui;  Qin, Jing;  Hu, Jiankun;  Wu, Qianhong
收藏  |  浏览/下载:4/0  |  提交时间:2019/12/30
Model checking quantum key distribution protocols 会议论文
作者:  Huang, Baichuan;  Huang, Yan;  Kong, Jiaming;  Huang, Xin
收藏  |  浏览/下载:10/0  |  提交时间:2019/11/26
Formal Verification of Security Protocols Using Spin 会议论文
15th IEEE/ACIS International Conference on Computer and Information Science (ICIS), 2016-06-26
作者:  Chen, Shengbo[1];  Fu, Hao[2];  Miao, Huaikou[3]
收藏  |  浏览/下载:3/0  |  提交时间:2019/04/26
Formal verification of RFID protocols using nuXmv 会议论文
Xiamen, China, September 23, 2016 - September 25, 2016
作者:  Yuan, Guanjie;  Long, Shigong
收藏  |  浏览/下载:4/0  |  提交时间:2020/01/05
Formal Verification of RFID Protocols Using nuXmv 会议论文
Xiamen, PEOPLES R CHINA, SEP 23-25, 2016
作者:  Yuan, Guanjie;  Long, Shigong
收藏  |  浏览/下载:2/0  |  提交时间:2019/12/31
Denial-of-service security attack in the continuous-time world 会议论文
34th IFIPWG6.1 International Conference on Formal Techniques for Distributed Objects, Components, and Systems, FORTE 2014 - Held as Part of the 9th International Federated Conference on Distributed Computing Techniques, DisCoTec 2014, Berlin, Germany, June 3, 2014 - June 5, 2014
Wang, Shuling (1); Nielson, Flemming (2); Nielson, Hanne Riis (2)
收藏  |  浏览/下载:22/0  |  提交时间:2014/12/16


©版权所有 ©2017 CSpace - Powered by CSpace