设为首页
收藏本站
网站地图
|
English
|
公务邮箱
About the library
Background
History
Leadership
Organization
Readers' Guide
Opening Hours
Collections
Help Via Email
Publications
Electronic Information Resources
常用资源
电子图书
期刊论文
学位会议
外文资源
特色专题
内部出版物
馆藏书目(1)
CNKI会议论文(2)
CNKI期刊论文0611(8)
Springer电子图书(47)
CNKI学位论文(12684)
知网期刊论文(4423)
在“
SpringerLink电子期刊
”中,
命中:
3,056
条,耗时:0.013993 秒
在所有数据库中总计命中:
17,165
条
1.
Security
-Performance Tradeoffs in a Class of Wireless Network Scenarios
作者:
Poonam Jindal
;
Brahmjit Singh
关键词:
Encryption overhead
;
Response time
;
Security
protocols
;
Throughput
;
WEP
;
WPA
刊名:Journal of Network and Systems Management
出版年:2017
2.
Analyzing Protocol
Security
Through Information-Flow Control
关键词:
Security
protocols
;
Formal methods
;
Information
;
flow
security
刊名:Lecture Notes in Computer Science
出版年:2017
3.
On the (Im)Possibility of Receiving
Security
Beyond 2
l
Using an
l
-Bit PRNG
作者:
Masoumeh Safkhani
;
Mehdi Hosseinzadeh…
关键词:
RFID
;
EPC
;
C1
;
G2
;
Authentication
;
Security
vulnerabilities
刊名:Wireless Personal Communications
出版年:2017
4.
A Brief History of
Security
Protocols
刊名:Lecture Notes in Computer Science
出版年:2017
5.
Efficient One-Sided Adaptively Secure Computation
作者:
Carmit Hazay
;
Arpita Patra
关键词:
Secure two
;
party computation
;
Adaptive
security
;
Non
;
committing encryption
;
Oblivious transfer
刊名:Journal of Cryptology
出版年:2017
6.
A Full Proof of the BGW Protocol for Perfectly Secure Multiparty Computation
作者:
Gilad Asharov
;
Yehuda Lindell
关键词:
Multiparty computation
;
Perfect
security
;
BGW
;
Cryptographic
protocols
刊名:Journal of Cryptology
出版年:2017
7.
Anonymous handover authentication protocol for mobile wireless networks with conditional privacy preservation
作者:
Debiao He
;
Ding Wang
;
Qi Xie
;
Kefei Chen
关键词:
mobile wireless network
;
handover authentication
;
anonymity
;
conditional privacy preservation
;
provable
security
刊名:SCIENCE CHINA Information Sciences
出版年:2017
8.
Bounded Tamper Resilience: How to Go Beyond the Algebraic Barrier
作者:
Ivan Damgård
;
Sebastian Faust
;
Pratyay Mukherjee
;
Daniele Venturi
关键词:
Related key
security
;
Bounded tamper resilience
;
Public key encryption
;
Identification schemes
刊名:Journal of Cryptology
出版年:2017
9.
Universally composable anonymous password authenticated key exchange
作者:
Xuexian Hu
;
Jiang Zhang
;
Zhenfeng Zhang
;
Jing Xu
关键词:
anonymous password authentication
;
key exchange
;
universal composability
;
provable
security
;
standard model
刊名:SCIENCE CHINA Information Sciences
出版年:2017
10.
Cloud-Based Intrusion Detection and Response System: Open Research Issues, and Solutions
作者:
Zakira Inayat
;
Abdullah Gani…
关键词:
Intrusion
;
Security
;
Intrusion response system
;
Cloud
;
based IDRS
;
Mobile cloud computing
刊名:Arabian Journal for Science and Engineering
出版年:2017
1
2
3
4
5
6
7
8
9
按检索点细分(3056)
题名(227)
关键词(173)
文摘(2694)
NGLC 2004-2010.National Geological Library of China All Rights Reserved.
Add:29 Xueyuan Rd,Haidian District,Beijing,PRC. Mail Add: 8324 mailbox 100083
For exchange or info please contact us via
email
.