×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
华南理工大学 [19]
内容类型
会议论文 [18]
期刊论文 [1]
发表日期
2012 [1]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共19条,第1-10条
帮助
限定条件
专题:华南理工大学
第一署名单位
第一作者单位
通讯作者单位
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
SIP security scheme of internet multimedia communication (EI收录)
期刊论文
Huanan Ligong Daxue Xuebao/Journal of South China University of Technology (Natural Science), 2012, 卷号: 40, 页码: 1-7
作者:
Hu, Jin-Long[1,2]
;
Zhang, Ling[1]
;
Xu, Yong[1]
;
Ye, Zhao[1,2]
收藏
  |  
浏览/下载:6/0
  |  
提交时间:2019/04/26
Communication systems
Internet
Internet protocols
Multimedia systems
Design and applications of wireless SET protocol (EI收录)
会议论文
Proceedings of the 3rd International Conference on Mobile Technology, Applications and Systems, Mobility '06, Bangkok, Thailand, October 25, 2006 - October 27, 2006
作者:
Qi, Ming[1]
;
Yang, Chaobo[1]
收藏
  |  
浏览/下载:1/0
  |  
提交时间:2019/04/18
Network protocols
Network security
Telecommunication equipment
Scheme and applications of mobile payment based on 3-D security protocol (EI收录)
会议论文
ACM International Conference Proceeding Series, Bangkok, Thailand, October 25, 2006 - October 27, 2006
作者:
Yang, Chaobo[1]
;
Qi, Ming[1]
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/04/18
Electronic commerce
Network protocols
Problem solving
Cryptanalysis of two password-authenticated key exchange protocols (EI收录)
会议论文
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Sydney, NSW, Australia, July 13, 2004 - July 15, 2004
作者:
Wan, Zhiguo[1,3]
;
Wang, Shuhong[2,3]
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/04/18
Computer crime
Security of data
Scheme and applications of mobile payment based on 3-D security protocol (EI收录)
会议论文
Proceedings of the 3rd International Conference on Mobile Technology, Applications and Systems, Mobility '06, Bangkok, Thailand, October 25, 2006 - October 27, 2006
作者:
Yang, Chaobo[1]
;
Qi, Ming[2]
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/04/18
Network protocols
Network security
Telecommunication equipment
Three dimensional
Cryptographic method of 3G firewall based on IXA2850 (EI收录)
会议论文
2007 IEEE International Workshop on Anti-counterfeiting, Security, Identification, ASID, Xizmen, China, April 16, 2007 - April 18, 2007
作者:
Liu, Zhenyu[1]
;
Xie, Shengli[1]
;
Fu, Yuli[1]
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/04/17
Computer hardware
Computer system firewalls
Cryptography
Network protocols
Program processors
Security of data
Probability forecasting of burst transmission for IEEE 802.16 BWA systems (EI收录)
会议论文
ICCSE 2010 - 5th International Conference on Computer Science and Education, Final Program and Book of Abstracts, Hefei, China, August 24, 2010 - August 27, 2010
作者:
Li, Xiuyuan[1,2]
;
Li, Hengwu[1]
;
Li, Lijuan[3]
收藏
  |  
浏览/下载:0/0
  |  
提交时间:2019/04/16
Algorithms
Computer science
Education computing
Engineering education
Forecasting
Network protocols
Probability distributions
Quality control
Quality of service
Security systems
Signal filtering and prediction
Formal security analysis of Automated trust negotiation (EI收录)
会议论文
2010 International Conference on Machine Learning and Cybernetics, ICMLC 2010, Qingdao, China, July 11, 2010 - July 14, 2010
作者:
Liu, Xin-Xin[1]
;
Tang, Shad-Hua[1]
;
Wei, Kai[1]
收藏
  |  
浏览/下载:0/0
  |  
提交时间:2019/04/16
Automation
Calculations
Cybernetics
Learning systems
Network protocols
A group-based cooperative medium access control protocol for Cognitive Radio networks (EI收录)
会议论文
IEEE International Workshop on Quality of Service, IWQoS, Beijing, China, June 16, 2010 - June 18, 2010
作者:
Liu, Yi[1]
;
Yu, Rong[1]
;
Zhang, Yan[2]
;
Xie, Shengli[1]
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/04/16
Network protocols
Quality control
Quality of service
Radio
Radio systems
Security systems
Telecommunication services
Throughput
Tripartite key agreement protocols based on digital certification (EI收录)
会议论文
Proceedings - 2010 International Conference on Computational Intelligence and Security, CIS 2010, Nanning, China, December 11, 2010 - December 14, 2010
作者:
收藏
  |  
浏览/下载:1/0
  |  
提交时间:2019/04/16
Artificial intelligence
©版权所有 ©2017 CSpace - Powered by
CSpace