搜索筛选:
搜索耗时0.5040秒,为你在为你在102,267,441篇论文里面共找到 24 篇相符的论文内容
类      型:
[会议论文] 作者:RuiJIANG;YuanXING;, 来源:第十届全国信息隐藏暨多媒体信息安全学术大会CIHW2012 年份:2012
Providing anonymous communications in mobile ad hoc networks is an effective countermeasure against malicious...Various anonymous routing scheme...
[会议论文] 作者:Zhang Xinfang,Xu Qiuliang, 来源:中国通信学会第五届学术年会 年份:2008
Analysing some typical identity-based.Encryption schemes,we get that most of them are not anonymous.In...
[会议论文] 作者:Xiaohan Yue,Fucai Zhou, 来源:第二届中国互联网学术年会 年份:2013
Direct Anonymous Attestation (DAA) is a cryptographic scheme which enables the remote authentication...
[会议论文] 作者:, 来源:第八届中国可信计算与信息安全学术会议 年份:2014
  Although the anonymous communication systems such as Tor are designed to conceal the relationship between...
[会议论文] 作者:MengJie;, 来源:2015年亚太地区教育质量保障组织国际学术研讨会:高等教育质量保障的全球性与多样性 年份:2015
  This article compares and analyses foreign academic result evaluation project to improve anonymous...
[会议论文] 作者:AnnP.Haas;PaulaJ.Clayton;, 来源:国际预防自杀协会(IASP)第26届世界大会 年份:2011
  The objectives of the proposed oral presentation are to: 1.Identify the need for proactive, anonymous...
[会议论文] 作者:JinLi[1]XuMa[2]DongqingXie[1], 来源:中国密码学会2011年会 年份:2011
  Attribute-based signature (ABS, for simplicity) is an important cryptographic tool for anonymous authentication...
[会议论文] 作者:Du Donglei, 来源:第八届工业与应用数学国际大会 年份:2015
  We completely characterize deterministic and anonymous strategyproof and group strategy-proof mechanisms...
[会议论文] 作者:HongliangZhang[1]YaminLi[1]ZhijuanFeng[2]ShubaoChen[2]TieqiaoLiu[2]XiaogangChen[2]JinsongTang[2]YanhuiLiao[2], 来源:中华医学会第十一次全国精神医学学术会议暨第三届亚洲神经精神药理学术会议 年份:2013
events,levels of anxiety and depression among clinical staff in the emergency department.Design An anonymous...
[会议论文] 作者:GiulioBigliardi;SaraCappelli;EnzoCocca;, 来源:第四届国际遥感考古会议 年份:2012
site of Adulis is well known by classical sources,as the Periplus Maris Erithraei written by an anonymous...
[会议论文] 作者:Jinli Zhang, 来源:第一届网络空间安全科学国际会议(The 1st International Conference on Science 年份:2018
Contents 1 Introduction 2 Metrics and Methods 3 Evaluations 4 Conclusions 1 Introduction Standpoint 1 Pay attention to personal privacy Electronic election Personal information dissemination online An...
[会议论文] 作者:Yan Liu,Yongsheng Tong, 来源:国际预防自杀协会(IASP)第26届世界大会 年份:2011
opportunity for large numbers of individuals who are unwilling to use traditional services to obtain anonymous...
[会议论文] 作者:Jin Li,Xu Ma,Dongqing Xie, 来源:中国密码学会2011年会 年份:2011
Attribute-based signature (ABS, for simplicity) is an important cryptographic tool for anonymous authentication...
[会议论文] 作者:Hongliang Zhang,Yamin Li,Zhijuan Feng,Shubao Chen,Tieqiao Liu,Xiaogang Chen,Jinsong Tang,Yanhui Liao, 来源:中华医学会第十一次全国精神医学学术会议暨第三届亚洲神经精神药理学术会议 年份:2013
events,levels of anxiety and depression among clinical staff in the emergency department.Design An anonymous...
[会议论文] 作者:Du Donglei, 来源:第八届工业与应用数学国际大会 年份:2015
We completely characterize deterministic and anonymous strategyproof and group strategy-proof mechanisms...
[会议论文] 作者:Meng Yu, 来源:第十五届亚太分子生物学网络组织年会 年份:2012
member of the dependence receptor UNC5 family,from the oligo-capping cDNA library generated from anonymous...
[会议论文] 作者:Giulio Bigliardi,Sara Cappelli,Enzo Cocca, 来源:第四届国际遥感考古会议 年份:2012
site of Adulis is well known by classical sources,as the Periplus Maris Erithraei written by an anonymous...
[会议论文] 作者:王一帆,邱昆,李永刚, 来源:2009中国西部第六届青年通信学术会议 年份:2009
Fibre Channel-Avionics Environment)基本内容及特点,并从系统建设的角度对FC-AE-ASM(Fibre Channel-AvionicsEnvironment-Anonymous...
[会议论文] 作者:ZhenqiangWU;YaleiMA;, 来源:2011年信息技术、服务科学与工程管理国际学术会议 年份:2011
  Now,wireless mesh network becomes a research focus.Users communicate through more nodes because of the multi-hop mechanism.Hence,the security problems becom...
[会议论文] 作者:, 来源:null 年份:2016
相关搜索: