论文题目 |
第一作者 |
发表年度 |
刊物/会议名称 |
a spectral method on tetrahedra using rational basis functions |
李会元 |
2010 |
INTERNATIONAL JOURNAL OF NUMERICAL ANALYSIS AND MODELING |
一类非张量积区域快速傅立叶变换算法在国产并行机上的可扩展性测试 |
张云泉 |
2010 |
数值计算与计算机应用 |
optimal error estimates in jacobi-weighted sobolev spaces for polynomial approximations on the triangle |
李会元 |
2010 |
MATHEMATICS OF COMPUTATION |
Acquiring Key Privacy from Data Privacy |
张锐 |
2010 |
|
Formal Verification of HMQV using ASM-SPV |
黄丹青 |
2010 |
2010 IEEE |
A Language For Secure Requirement Description Based on Information Flow |
程亮 |
2010 |
2010 IEEE |
DepSim: A Dependency-based Malware Similarity Comparison System |
杨轶 |
2010 |
The 6th China International Conference on Information Security and Cryptology (Inscrypt 2010) |
Towards A Flexible Spatially Aware Access Control Model |
张德胜 |
2010 |
|
cryptanalysis of mame compression function |
薛宇 |
2010 |
2010 international conference on computer design and appliations |
Constructing Rate-1 MACs from Related-Key Unpredictable Block Ciphers: PGV Model Revisited |
张立廷 |
2010 |
International Association for Cryptologic Research 2010 |
Privacy Preserving of Trust Management Credentials Based on Trusted Computing |
吴槟 |
2010 |
Springer-Verlag Berlin Heidelberg 2010 |
基于信任度的信任链模型 |
汪丹 |
2010 |
第七届中国信息和通信安全学术会议论文集 |
Real-Time Remote Attestation with Privacy Protection |
于爱民 |
2010 |
Springer-Verlag Berlin Heidelberg 2010 |
measuring the effectiveness of dpa attacks- from the perspective of distinguishers' statistical characteristics |
黄金刚 |
2010 |
ICCSIT 2010 |
trusted channels with password-based authentication and tpm-based attestation |
周玲丽 |
2010 |
CMC 2010 |
a novel vector edge sampling scheme for ip traceback against ddos attacks |
陈恺 |
2010 |
ICMLC 2010 |
practical rebound attack on 12-round cheetah-256 |
吴双 |
2010 |
Springer-Verlag Berlin Heidelberg 2010 |
controlling data disclosure in computational pir protocols |
周永彬 |
2010 |
Copyright 2010 ACM 978-1-60558-936-7 ...$10.00. |
A Hypervisor-Based Secure Storage Scheme |
汪丹 |
2010 |
The 2nd International Conference on Networks Security, Wireless Communications and Trusted Computing |
fine-grained cloud db damage examination based on bloom filters |
张敏 |
2010 |
|
Accelerating Inverse of GF(2n) with Precomputation |
徐磊 |
2010 |
Lecture Notes in Computer Science, 2010, Volume 6047/2010, 85-95 |
Threshold Password-Based Authenticated Group Key Exchange in Gateway-Oriented Setting |
李徽 |
2010 |
Springer-Verlag Berlin Heidelberg 2010 |
refinement of miller's algorithm over edwards curves |
徐磊 |
2010 |
|
Congestion Control with Fixed Cost at the Domain Border |
石志强 |
2010 |
The 2010 International Conference on Future Computer and Communication |
Efficient Address Updating for Seamless Handover in Multi-homed Mobile Wnvironments |
乔元松 |
2010 |
IFIP会刊 |
Collusion Attack on a Self-healing Key Distribution with Revocation in Wireless Sensor |
鲍克华 |
2010 |
|
MANET下位置感知的服务发现 |
张扶桑 |
2010 |
PCC 2010,第6届全国普适计算学术会议 |
面向终端用户的 Web 信息集成系统 |
于翔斐 |
2010 |
中国计算机学会 2010年全国软件与应用学术会议(NASAC 2010) |
一种基于MapReduce的数据处理流程开发方法 |
易小华 |
2010 |
中国计算机学会 2010年全国软件与应用学术会议(NASAC 2010) |
一种面向运环境的自适应集群调整方法 |
周欢云 |
2010 |
中国计算机学会 2010年全国软件与应用学术会议(NASAC 2010) |