中国科学院软件研究所机构知识库
Advanced  
ISCAS OpenIR

Search Results

Help

Item hits: (Results 1-6 of 6)

Items/Page:    Sort:
VEGAS: Visual influEnce GrAph Summarization on Citation Networks [期刊论文]
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2015-01-01, 卷号: 27, 期号: 12, 页码: 3417-3431
Shi, L; Tong, HH; Tang, J; Lin, C
  |  
 
cheating immune visual cryptography scheme [期刊论文]
IET Information Security, 2011-01-01, 卷号: 5, 期号: 1, 页码: 51-59
Liu F.; Wu C.; Lin X.
  |  
 
finding optimal threshold for correction error reads in dna assembling [会议论文]
9th Asia Pacific Bioinformatics Conference, Beijing, PEOPLES R CHINA, JAN 13-16,
Chin Francis Y. L.; Leung Henry C. M.; Li Wei-Lin; Yiu Siu-Ming

 
analysis of bilinear pairing-based accumulator for identity escrowing [期刊论文]
IET INFORMATION SECURITY, 2008-01-01, 卷号: 2, 期号: 4, 页码: 99-107
Tartary C.; Zhou S.; Lin D.; Wang H.; Pieprzyk J.
  |  
 
analysis of an authenticated identity-based multicast scheme [期刊论文]
IET COMMUNICATIONS, 2008-01-01, 卷号: 2, 期号: 7, 页码: 935-937
Lin X. -J.; Wu C. -K; Liu F.
  |  
 
colour visual cryptography schemes [期刊论文]
IET INFORMATION SECURITY, 2008-01-01, 卷号: 2, 期号: 4, 页码: 151-165
Liu F.; Wu C. K.; Lin X. J.
  |  
 

1

 

Valid XHTML 1.0!
Copyright © 2007-2019  中国科学院软件研究所 - Feedback
Powered by CSpace