論文題目 |
第一作者 |
發表年度 |
刊物/會議名稱 |
a spectral method on tetrahedra using rational basis functions
|
李會元
|
2010
|
INTERNATIONAL JOURNAL OF NUMERICAL ANALYSIS AND MODELING
|
一類非張量積區域快速傅立葉變換算法在國產并行機上的可擴展性測試
|
張云泉
|
2010
|
數值計算與計算機應用
|
optimal error estimates in jacobi-weighted sobolev spaces for polynomial approximations on the triangle
|
李會元
|
2010
|
MATHEMATICS OF COMPUTATION
|
Acquiring Key Privacy from Data Privacy
|
張銳
|
2010
|
|
Formal Verification of HMQV using ASM-SPV
|
黃丹青
|
2010
|
2010 IEEE
|
A Language For Secure Requirement Description Based on Information Flow
|
程亮
|
2010
|
2010 IEEE
|
DepSim: A Dependency-based Malware Similarity Comparison System
|
楊軼
|
2010
|
The 6th China International Conference on Information Security and Cryptology (Inscrypt 2010)
|
Towards A Flexible Spatially Aware Access Control Model
|
張德勝
|
2010
|
|
cryptanalysis of mame compression function
|
薛宇
|
2010
|
2010 international conference on computer design and appliations
|
Constructing Rate-1 MACs from Related-Key Unpredictable Block Ciphers: PGV Model Revisited
|
張立廷
|
2010
|
International Association for Cryptologic Research 2010
|
Privacy Preserving of Trust Management Credentials Based on Trusted Computing
|
吳檳
|
2010
|
Springer-Verlag Berlin Heidelberg 2010
|
基于信任度的信任鏈模型
|
汪丹
|
2010
|
第七屆中國信息和通信安全學術會議論文集
|
Real-Time Remote Attestation with Privacy Protection
|
于愛民
|
2010
|
Springer-Verlag Berlin Heidelberg 2010
|
measuring the effectiveness of dpa attacks- from the perspective of distinguishers' statistical characteristics
|
黃金剛
|
2010
|
ICCSIT 2010
|
trusted channels with password-based authentication and tpm-based attestation
|
周玲麗
|
2010
|
CMC 2010
|
a novel vector edge sampling scheme for ip traceback against ddos attacks
|
陳愷
|
2010
|
ICMLC 2010
|
practical rebound attack on 12-round cheetah-256
|
吳雙
|
2010
|
Springer-Verlag Berlin Heidelberg 2010
|
controlling data disclosure in computational pir protocols
|
周永彬
|
2010
|
Copyright 2010 ACM 978-1-60558-936-7 ...$10.00.
|
A Hypervisor-Based Secure Storage Scheme
|
汪丹
|
2010
|
The 2nd International Conference on Networks Security, Wireless Communications and Trusted Computing
|
fine-grained cloud db damage examination based on bloom filters
|
張敏
|
2010
|
|
Accelerating Inverse of GF(2n) with Precomputation
|
徐磊
|
2010
|
Lecture Notes in Computer Science, 2010, Volume 6047/2010, 85-95
|
Threshold Password-Based Authenticated Group Key Exchange in Gateway-Oriented Setting
|
李徽
|
2010
|
Springer-Verlag Berlin Heidelberg 2010
|
refinement of miller's algorithm over edwards curves
|
徐磊
|
2010
|
|
Congestion Control with Fixed Cost at the Domain Border
|
石志強
|
2010
|
The 2010 International Conference on Future Computer and Communication
|
Efficient Address Updating for Seamless Handover in Multi-homed Mobile Wnvironments
|
喬元松
|
2010
|
IFIP會刊
|
Collusion Attack on a Self-healing Key Distribution with Revocation in Wireless Sensor
|
鮑克華
|
2010
|
|
MANET下位置感知的服務發現
|
張扶桑
|
2010
|
PCC 2010,第6屆全國普適計算學術會議
|
面向終端用戶的 Web 信息集成系統
|
于翔斐
|
2010
|
中國計算機學會 2010年全國軟件與應用學術會議(NASAC 2010)
|
一種基于MapReduce的數據處理流程開發方法
|
易小華
|
2010
|
中國計算機學會 2010年全國軟件與應用學術會議(NASAC 2010)
|
一種面向運環境的自適應集群調整方法
|
周歡云
|
2010
|
中國計算機學會 2010年全國軟件與應用學術會議(NASAC 2010)
|