中国科学院软件研究所机构知识库
Advanced  
ISCAS OpenIR

Search Results

Help

Item hits: (Results 1-5 of 5)

Items/Page:    Sort:
bypassing the decomposition attacks on two-round multivariate schemes by a practical cubic round [期刊论文]
IET Information Security, 2010-01-01, 卷号: 4, 期号: 3, 页码: 167-184
Zhao X.; Feng D.
  |  
 
integrating load balancing into channelization strategy in publish/subscribe [会议论文]
24th IEEE International Conference on Advanced Information Networking and Applications, AINA2010, Perth, WA, Australia, April 20,
Chen Haibiao; Jin Beihong; Qi Fengliang
  |  
 
analysis of an authenticated identity-based multicast scheme [期刊论文]
IET COMMUNICATIONS, 2008-01-01, 卷号: 2, 期号: 7, 页码: 935-937
Lin X. -J.; Wu C. -K; Liu F.
  |  
 
moving schemes for mobile sinks in wireless sensor networks [会议论文]
IEEE International Performance Computing and Communications Conference, New Orleans, LA, APR 11-13,
Bi Yanzhong; Niu Jianwei; Sun Limin; Wei Huangfu; Sun Yi
  |  
 
cryptanalysis of the end-to-end security protocol for mobile communications with end-user identification/authentication [期刊论文]
Ieee Communications Letters, 2005-01-01, 卷号: 9, 期号: 4, 页码: 372-374
Zhou YB; Zhang ZF; Feng Dengguo
  |  
 

1

 

Valid XHTML 1.0!
Copyright © 2007-2021  中国科学院软件研究所 - Feedback
Powered by CSpace