中国科学院软件研究所机构知识库
Advanced  
ISCAS OpenIR

Search Results

Help

Item hits: (Results 1-6 of 6)

Filters            
Items/Page:    Sort:
Random table and hash coding-based binary code obfuscation against stack trace analysis [期刊论文]
IET INFORMATION SECURITY, 2016-01-01, 卷号: 10, 期号: 1, 页码: 18-27
Xie, X;  Lu, B;  Gong, DF;  Luo, XY;  Liu, FL
  |  
 
load-aware and position-aided routing in satellite ip networks [期刊论文]
INTERNATIONAL JOURNAL OF COMPUTERS COMMUNICATIONS & CONTROL, 2012-01-01, 卷号: 7, 期号: 1, 页码: 163-172
Wang L.; Liu L.; Hu X.
  |  
 
effective retransmission in network coding for tcp [期刊论文]
INTERNATIONAL JOURNAL OF COMPUTERS COMMUNICATIONS & CONTROL, 2011-01-01, 卷号: 6, 期号: 1, 页码: 53-62
Chen J.; Liu L. X.; Hu X. H.; Tan W.

 
cheating immune visual cryptography scheme [期刊论文]
IET Information Security, 2011-01-01, 卷号: 5, 期号: 1, 页码: 51-59
Liu F.; Wu C.; Lin X.
  |  
 
analysis of an authenticated identity-based multicast scheme [期刊论文]
IET COMMUNICATIONS, 2008-01-01, 卷号: 2, 期号: 7, 页码: 935-937
Lin X. -J.; Wu C. -K; Liu F.
  |  
 
colour visual cryptography schemes [期刊论文]
IET INFORMATION SECURITY, 2008-01-01, 卷号: 2, 期号: 4, 页码: 151-165
Liu F.; Wu C. K.; Lin X. J.
  |  
 

1

 

Valid XHTML 1.0!
Copyright © 2007-2020  中国科学院软件研究所 - Feedback
Powered by CSpace