CORC

浏览/检索结果: 共19条,第1-10条 帮助

限定条件                
已选(0)清除 条数/页:   排序方式:
SIP security scheme of internet multimedia communication (EI收录) 期刊论文
Huanan Ligong Daxue Xuebao/Journal of South China University of Technology (Natural Science), 2012, 卷号: 40, 页码: 1-7
作者:  Hu, Jin-Long[1,2];  Zhang, Ling[1];  Xu, Yong[1];  Ye, Zhao[1,2]
收藏  |  浏览/下载:6/0  |  提交时间:2019/04/26
Design and applications of wireless SET protocol (EI收录) 会议论文
Proceedings of the 3rd International Conference on Mobile Technology, Applications and Systems, Mobility '06, Bangkok, Thailand, October 25, 2006 - October 27, 2006
作者:  Qi, Ming[1];  Yang, Chaobo[1]
收藏  |  浏览/下载:1/0  |  提交时间:2019/04/18
Scheme and applications of mobile payment based on 3-D security protocol (EI收录) 会议论文
ACM International Conference Proceeding Series, Bangkok, Thailand, October 25, 2006 - October 27, 2006
作者:  Yang, Chaobo[1];  Qi, Ming[1]
收藏  |  浏览/下载:4/0  |  提交时间:2019/04/18
Cryptanalysis of two password-authenticated key exchange protocols (EI收录) 会议论文
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Sydney, NSW, Australia, July 13, 2004 - July 15, 2004
作者:  Wan, Zhiguo[1,3];  Wang, Shuhong[2,3]
收藏  |  浏览/下载:2/0  |  提交时间:2019/04/18
Scheme and applications of mobile payment based on 3-D security protocol (EI收录) 会议论文
Proceedings of the 3rd International Conference on Mobile Technology, Applications and Systems, Mobility '06, Bangkok, Thailand, October 25, 2006 - October 27, 2006
作者:  Yang, Chaobo[1];  Qi, Ming[2]
收藏  |  浏览/下载:4/0  |  提交时间:2019/04/18
Cryptographic method of 3G firewall based on IXA2850 (EI收录) 会议论文
2007 IEEE International Workshop on Anti-counterfeiting, Security, Identification, ASID, Xizmen, China, April 16, 2007 - April 18, 2007
作者:  Liu, Zhenyu[1];  Xie, Shengli[1];  Fu, Yuli[1]
收藏  |  浏览/下载:2/0  |  提交时间:2019/04/17
Probability forecasting of burst transmission for IEEE 802.16 BWA systems (EI收录) 会议论文
ICCSE 2010 - 5th International Conference on Computer Science and Education, Final Program and Book of Abstracts, Hefei, China, August 24, 2010 - August 27, 2010
作者:  Li, Xiuyuan[1,2];  Li, Hengwu[1];  Li, Lijuan[3]
收藏  |  浏览/下载:0/0  |  提交时间:2019/04/16
Formal security analysis of Automated trust negotiation (EI收录) 会议论文
2010 International Conference on Machine Learning and Cybernetics, ICMLC 2010, Qingdao, China, July 11, 2010 - July 14, 2010
作者:  Liu, Xin-Xin[1];  Tang, Shad-Hua[1];  Wei, Kai[1]
收藏  |  浏览/下载:0/0  |  提交时间:2019/04/16
A group-based cooperative medium access control protocol for Cognitive Radio networks (EI收录) 会议论文
IEEE International Workshop on Quality of Service, IWQoS, Beijing, China, June 16, 2010 - June 18, 2010
作者:  Liu, Yi[1];  Yu, Rong[1];  Zhang, Yan[2];  Xie, Shengli[1]
收藏  |  浏览/下载:2/0  |  提交时间:2019/04/16
Tripartite key agreement protocols based on digital certification (EI收录) 会议论文
Proceedings - 2010 International Conference on Computational Intelligence and Security, CIS 2010, Nanning, China, December 11, 2010 - December 14, 2010
作者:  
收藏  |  浏览/下载:1/0  |  提交时间:2019/04/16


©版权所有 ©2017 CSpace - Powered by CSpace