nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Accurate and efficient exploit capture and classification - 快速准确的Exploit自动捕获与分类方法和系统
|
Ding, Yu |
|
2016 |
60 |
5 |
p. 1-17 |
artikel |
2 |
Analysis and design of parameters in soft docking of micro/small satellites
|
Zhang, Xiang |
|
2017 |
60 |
5 |
p. 1-14 |
artikel |
3 |
An efficient protocol for secure multicast key distribution in the presence of adaptive adversaries - 一种快速有效能抵抗自适应攻击的组播密钥分发协议
|
Zhu, Huafei |
|
2016 |
60 |
5 |
p. 1-12 |
artikel |
4 |
A new construction on randomized message-locked encryption in the standard model via UCEs - 基于UCEs的在标准模型下可证明安全的随机化消息锁定加密的新构造
|
Wang, Huige |
|
2016 |
60 |
5 |
p. 1-19 |
artikel |
5 |
Anonymous handover authentication protocol for mobile wireless networks with conditional privacy preservation - 移动无线网络中具有条件隐私保护功能的匿名切换认证协议
|
He, Debiao |
|
2016 |
60 |
5 |
p. 1-17 |
artikel |
6 |
An overview of the configuration and manipulation of soft robotics for on-orbit servicing
|
Jing, Zhongliang |
|
2017 |
60 |
5 |
p. 1-19 |
artikel |
7 |
A static technique for detecting input validation vulnerabilities in Android apps - 基于静态分析的Android应用软件输入验证漏洞挖掘技术
|
Fang, Zhejun |
|
2016 |
60 |
5 |
p. 1-16 |
artikel |
8 |
Avoiding monopolization: mutual-aid collusive attack detection in cooperative spectrum sensing - 协作频谱感知中的 MAC 攻击及其检测机制研究
|
Feng, Jingyu |
|
2016 |
60 |
5 |
p. 1-3 |
artikel |
9 |
Common patterns of online collective attention flow
|
Li, Yong |
|
2016 |
60 |
5 |
p. 1-3 |
artikel |
10 |
Credit-based scheme for security-aware and fairness-aware resource allocation in cloud computing - 云计算中面向安全和公平资源分配的信誉模型
|
Lu, Di |
|
2016 |
60 |
5 |
p. 1-17 |
artikel |
11 |
Cryptanalysis of full PRIDE block cipher - PRIDE算法的全轮攻击
|
Dai, Yibin |
|
2016 |
60 |
5 |
p. 1-12 |
artikel |
12 |
Developing nonlinear adaptive optimal regulators through an improved neural learning mechanism
|
Wang, Ding |
|
2017 |
60 |
5 |
p. 1-3 |
artikel |
13 |
Editorial
|
Jing, Zhongliang |
|
2017 |
60 |
5 |
p. 1 |
artikel |
14 |
Hidden policy ciphertext-policy attribute-based encryption with keyword search against keyword guessing attack - 可抵抗关键字猜测攻击的隐藏策略属性基可检索加密方案
|
Qiu, Shuo |
|
2016 |
60 |
5 |
p. 1-12 |
artikel |
15 |
Improving multi-layer spiking neural networks by incorporating brain-inspired rules - 受脑启发的学习规则对深层脉冲神经网络性能的提升
|
Zeng, Yi |
|
2017 |
60 |
5 |
p. 1-11 |
artikel |
16 |
Minimum length key in MST cryptosystems - MST密码系统中极小长度密钥的研究
|
Hong, Haibo |
|
2016 |
60 |
5 |
p. 1-11 |
artikel |
17 |
On s-uniform property of compressing sequences derived from primitive sequences modulo odd prime powers - 模奇素数幂剩余类环上本原序列导出序列的同s分布性质
|
Jiang, Yupeng |
|
2016 |
60 |
5 |
p. 1-12 |
artikel |
18 |
Quantifying quantum information resources: a numerical study
|
Wang, Zhen |
|
2017 |
60 |
5 |
p. 1-9 |
artikel |
19 |
Tilting-Twisting-Rolling: a pen-based technique for compass geometric construction
|
Lyu, Fei |
|
2017 |
60 |
5 |
p. 1-6 |
artikel |
20 |
Two performance enhanced control of flexible-link manipulator with system uncertainty and disturbances
|
Xu, Bin |
|
2017 |
60 |
5 |
p. 1-11 |
artikel |
21 |
Universally composable anonymous password authenticated key exchange - 通用可组合的匿名口令认证密钥交换
|
Hu, Xuexian |
|
2016 |
60 |
5 |
p. 1-16 |
artikel |
22 |
Vibration suppression of a large flexible spacecraft for on-orbit operation
|
Meng, Deshan |
|
2017 |
60 |
5 |
p. 1-15 |
artikel |