×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
软件研究所 [22]
北京航空航天大学 [9]
西安交通大学 [3]
山东大学 [3]
华南理工大学 [3]
贵州大学 [3]
更多...
内容类型
会议论文 [53]
发表日期
2020 [1]
2017 [4]
2016 [4]
2014 [2]
2013 [1]
2012 [5]
更多...
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共53条,第1-10条
帮助
限定条件
内容类型:会议论文
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
A KG-based Enhancement Framework for Fact Checking Using Category Information
会议论文
线上, 2020年11月
作者:
Wang S(王帅)
;
Wang L(王磊)
;
Mao WJ(毛文吉)
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2022/07/01
fact checking knowledge graph
The Reliability EMC Design of WIA-PA Wireless Networks Equipment
会议论文
2017 International Conference on Circuits, Devices and Systems (ICCDS), Chengdu, China, September 5-8, 2017
作者:
Jiao P(焦平)
;
Yang ZJ(杨志家)
收藏
  |  
浏览/下载:32/0
  |  
提交时间:2017/12/21
component
WIA-PA wireless network
IEC61000-4-5
EMC
Idology and Its Applications in Public Security and Network Security
会议论文
INTELLIGENCE AND SECURITY INFORMATICS (PAISI 2017), 2017-01-01
作者:
Su, Shenghui
;
Zheng, Jianhua
;
Lu, Shuwang
;
Huang, Zhiqiu
;
Li, Zhoujun
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2019/12/30
Idology
Symmetric identity
Asymmetric identity
Identification
Anti-fraud
Digital signature
Hash function
United verification platform
iPUF: Interconnect PUF with Self-Masking Circuit for Performance Enhancement
会议论文
2017 18TH INTERNATIONAL WORKSHOP ON MICROPROCESSOR AND SOC TEST, SECURITY AND VERIFICATION (MTV 2017), 2017-01-01
作者:
Yu, Liting
;
Wang, Xiaoxiao
;
Rahman, Fahim
;
Tehranipoor, Mark
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/30
PUF
hardware security
interconnect
uniqueness enhancement
aging resistance
Confidentiality-Preserving Publicly Verifiable Computation
会议论文
10th International Conference on Provable Security (ProvSec), Nanjing Univ Finance & Econ, Nanjing, PEOPLES R CHINA, 2017-09-01
作者:
Sun, Jiameng
;
Zhu, Binrui
;
Qin, Jing
;
Hu, Jiankun
;
Wu, Qianhong
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/12/30
Attribute-based encryption
confidentiality-preserving publicly verifiable computation
delegatable outsourcing computation
public verification
Model checking quantum key distribution protocols
会议论文
作者:
Huang, Baichuan
;
Huang, Yan
;
Kong, Jiaming
;
Huang, Xin
收藏
  |  
浏览/下载:10/0
  |  
提交时间:2019/11/26
BB84
Discrete time Markov chains
Group QKD
Probabilistic computation tree logic
Quantum information theory
Quantum key distribution protocols
Security properties
Verification techniques
Formal Verification of Security Protocols Using Spin
会议论文
15th IEEE/ACIS International Conference on Computer and Information Science (ICIS), 2016-06-26
作者:
Chen, Shengbo[1]
;
Fu, Hao[2]
;
Miao, Huaikou[3]
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/04/26
security protocols
network security
model checking
Spin
LTL
Formal verification of RFID protocols using nuXmv
会议论文
Xiamen, China, September 23, 2016 - September 25, 2016
作者:
Yuan, Guanjie
;
Long, Shigong
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2020/01/05
Formal Verification of RFID Protocols Using nuXmv
会议论文
Xiamen, PEOPLES R CHINA, SEP 23-25, 2016
作者:
Yuan, Guanjie
;
Long, Shigong
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/12/31
Denial-of-service security attack in the continuous-time world
会议论文
34th IFIPWG6.1 International Conference on Formal Techniques for Distributed Objects, Components, and Systems, FORTE 2014 - Held as Part of the 9th International Federated Conference on Distributed Computing Techniques, DisCoTec 2014, Berlin, Germany, June 3, 2014 - June 5, 2014
Wang, Shuling (1)
;
Nielson, Flemming (2)
;
Nielson, Hanne Riis (2)
收藏
  |  
浏览/下载:22/0
  |  
提交时间:2014/12/16
Hybrid systems
Denial-of-service
Safety verification
Inference system
©版权所有 ©2017 CSpace - Powered by
CSpace