中国科学院软件研究所机构知识库
Log In
Register
Email:
Passwd
验 证:
换一张
Have you forgotten your password?
Stay signed in
Log In
ALL
Title
Author
Keyword
Sponsors
Type
Publication date
Submitted Time
Subject
Conference Name
Source
Categories
KOS Subject
Advisor
ORCID
Advanced
在结果中检索
Communities
Subjects
All Items
Community
软件所图书馆 [23]
信息安全国家重点实验... [5]
多媒体通信和网络工程... [3]
软件工程技术研究开发... [3]
计算机科学国家重点实... [1]
更多...
作者
Content Type
期刊论文 [19]
会议论文 [17]
Issued Date
2016 [1]
Language
英语 [19]
中文 [3]
Source
finite fie... [3]
iet inform... [2]
proceeding... [2]
数值计算与计算机应用 [2]
computer c... [1]
更多...
Project
Indexed
SCI [13]
EI [6]
CNKI [5]
ISTP [4]
SCIENCEDIR... [4]
更多...
Spnsorship
ieee [2]
ieee comp ... [2]
brandeis u... [1]
cadence, i... [1]
china comp... [1]
更多...
ISCAS OpenIR
Search Results
Help
Item hits:
(Results 1-10 of 36)
Items/Page:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
Sort:
Select
Submitted Time Ascending
Submitted Time Descending
Title Ascending
Title Descending
Author Ascending
Author Descending
Issue Date Ascending
Issue Date Descending
A scalable fully implicit method with adaptive time stepping for unsteady compressible inviscid flows
[期刊论文]
COMPUTERS & STRUCTURES, 2016-01-01, 卷号: 176, 页码: 1-12
Liu, YF
;
Yang, HJ
;
Jiang, C
;
Yang, C
  |  
Known-key distinguishers on type-1 Feistel scheme and near-collision attacks on its hashing modes
[期刊论文]
Frontiers of Computer Science, 2014-01-01, 卷号: 8, 期号: 3, 页码: 513-525
Dong, Le (1)
;
Wu, Wenling (2)
;
Wu, Shuang (2)
;
Zou, Jian (2)
Multi-neighboring grids schemes for solving PDE eigen-problems
[期刊论文]
SCIENCE CHINA-MATHEMATICS, 2013-01-01, 卷号: 56, 期号: 12, 页码: 2677-2700
Sun JiaChang
bypassing the decomposition attacks on two-round multivariate schemes by a practical cubic round
[期刊论文]
IET Information Security, 2010-01-01, 卷号: 4, 期号: 3, 页码: 167-184
Zhao X.
;
Feng D.
  |  
a two-round honest-verifier zero-knowledge protocol
[期刊论文]
SCIENCE CHINA-INFORMATION SCIENCES, 2010-01-01, 卷号: 53, 期号: 5, 页码: 954-963
Liu HanWu
;
Lin DongDai
  |  
a hypervisor-based secure storage scheme
[会议论文]
2nd International Conference on Networks Security, Wireless Communications and Trusted Computing, NSWCTC 2010, Wuhan, Hubei, April 24,
Dan Wang
;
Dengguo Feng
  |  
a scalable encryption scheme for ccsds image data compression standard
[会议论文]
2010 IEEE International Conference on Information Theory and Information Security, ICITIS 2010, Beijing, 40878
Mingyu Li
;
Xiaowei Yi
;
Hengtai Ma
  |  
a flexible transformation scheme between the or of bpmn and link of bpel
[会议论文]
3rd IEEE Asia-Pacific Service Computing Conference (APSCC 2008), Yilan, TAIWAN, DEC 09-12,
Bai Lin
;
Wei Jun
  |  
analysis of an authenticated identity-based multicast scheme
[期刊论文]
IET COMMUNICATIONS, 2008-01-01, 卷号: 2, 期号: 7, 页码: 935-937
Lin X. -J.
;
Wu C. -K
;
Liu F.
  |  
rearrangements of access structures and their realizations in secret sharing schemes
[期刊论文]
DISCRETE MATHEMATICS, 2008-01-01, 卷号: 308, 期号: 21, 页码: 4882-4891
Zhang Zhifang
;
Liu Mulan
;
Xiao Liangliang
  |  
1
2
3
4
next
Copyright © 2007-2021
中国科学院软件研究所
-
Feedback
Powered by
CSpace