• <u id="saeeq"><wbr id="saeeq"></wbr></u>
  • <s id="saeeq"><div id="saeeq"></div></s>
  • <u id="saeeq"></u>
  • <u id="saeeq"><noscript id="saeeq"></noscript></u>
  • <s id="saeeq"></s>
  • 論文
      論文題目 第一作者 發表年度 刊物/會議名稱
      a spectral method on tetrahedra using rational basis functions 李會元 2010 INTERNATIONAL JOURNAL OF NUMERICAL ANALYSIS AND MODELING
      一類非張量積區域快速傅立葉變換算法在國產并行機上的可擴展性測試 張云泉 2010 數值計算與計算機應用
      optimal error estimates in jacobi-weighted sobolev spaces for polynomial approximations on the triangle 李會元 2010 MATHEMATICS OF COMPUTATION
      Acquiring Key Privacy from Data Privacy 張銳 2010
      Formal Verification of HMQV using ASM-SPV 黃丹青 2010 2010 IEEE
      A Language For Secure Requirement Description Based on Information Flow 程亮 2010 2010 IEEE
      DepSim: A Dependency-based Malware Similarity Comparison System 楊軼 2010 The 6th China International Conference on Information Security and Cryptology (Inscrypt 2010)
      Towards A Flexible Spatially Aware Access Control Model 張德勝 2010
      cryptanalysis of mame compression function 薛宇 2010 2010 international conference on computer design and appliations
      Constructing Rate-1 MACs from Related-Key Unpredictable Block Ciphers: PGV Model Revisited 張立廷 2010 International Association for Cryptologic Research 2010
      Privacy Preserving of Trust Management Credentials Based on Trusted Computing 吳檳 2010 Springer-Verlag Berlin Heidelberg 2010
      基于信任度的信任鏈模型 汪丹 2010 第七屆中國信息和通信安全學術會議論文集
      Real-Time Remote Attestation with Privacy Protection 于愛民 2010 Springer-Verlag Berlin Heidelberg 2010
      measuring the effectiveness of dpa attacks- from the perspective of distinguishers' statistical characteristics 黃金剛 2010 ICCSIT 2010
      trusted channels with password-based authentication and tpm-based attestation 周玲麗 2010 CMC 2010
      a novel vector edge sampling scheme for ip traceback against ddos attacks 陳愷 2010 ICMLC 2010
      practical rebound attack on 12-round cheetah-256 吳雙 2010 Springer-Verlag Berlin Heidelberg 2010
      controlling data disclosure in computational pir protocols 周永彬 2010 Copyright 2010 ACM 978-1-60558-936-7 ...$10.00.
      A Hypervisor-Based Secure Storage Scheme 汪丹 2010 The 2nd International Conference on Networks Security, Wireless Communications and Trusted Computing
      fine-grained cloud db damage examination based on bloom filters 張敏 2010
      Accelerating Inverse of GF(2n) with Precomputation 徐磊 2010 Lecture Notes in Computer Science, 2010, Volume 6047/2010, 85-95
      Threshold Password-Based Authenticated Group Key Exchange in Gateway-Oriented Setting 李徽 2010 Springer-Verlag Berlin Heidelberg 2010
      refinement of miller's algorithm over edwards curves 徐磊 2010
      Congestion Control with Fixed Cost at the Domain Border 石志強 2010 The 2010 International Conference on Future Computer and Communication
      Efficient Address Updating for Seamless Handover in Multi-homed Mobile Wnvironments 喬元松 2010 IFIP會刊
      Collusion Attack on a Self-healing Key Distribution with Revocation in Wireless Sensor 鮑克華 2010
      MANET下位置感知的服務發現 張扶桑 2010 PCC 2010,第6屆全國普適計算學術會議
      面向終端用戶的 Web 信息集成系統 于翔斐 2010 中國計算機學會 2010年全國軟件與應用學術會議(NASAC 2010)
      一種基于MapReduce的數據處理流程開發方法 易小華 2010 中國計算機學會 2010年全國軟件與應用學術會議(NASAC 2010)
      一種面向運環境的自適應集群調整方法 周歡云 2010 中國計算機學會 2010年全國軟件與應用學術會議(NASAC 2010)
       

  • <u id="saeeq"><wbr id="saeeq"></wbr></u>
  • <s id="saeeq"><div id="saeeq"></div></s>
  • <u id="saeeq"></u>
  • <u id="saeeq"><noscript id="saeeq"></noscript></u>
  • <s id="saeeq"></s>
  • 久久久综合香蕉尹人综合网