CORC

浏览/检索结果: 共38条,第1-10条 帮助

限定条件    
已选(0)清除 条数/页:   排序方式:
The Applications of NVM Technology in Hardware Security 其他
2016-01-01
Yang, Chaofei; Liu, Beiye; Wang, Yandan; Chen, Yiran; Li, Hai; Zhang, Xian; Sun, Guangyu
收藏  |  浏览/下载:18/0  |  提交时间:2017/12/03
SLA-DO: A SLA-based Data Distribution Strategy on Multiple Cloud Storage Systems 其他
2016-01-01
Guo, Chang; Li, Ying; Wu, Zhonghai
收藏  |  浏览/下载:3/0  |  提交时间:2017/12/03
Trident: Context-based Reverse Authentication for Phishing AP Detection in Commodity WiFi Networks 其他
2016-01-01
Zhao, Peng; Bian, Kaigui; Chen, Ping; Zhao, Tong; Duan, Yichun; Yan, Wei
收藏  |  浏览/下载:3/0  |  提交时间:2017/12/03
Sift an efficient method for co-residency detection on amazon EC2 其他
2016-01-01
Chen, Kang; Shen, Qingni; Li, Cong; Luo, Yang; Yang, Yahui; Wu, Zhonghai
收藏  |  浏览/下载:5/0  |  提交时间:2017/12/03
Research on Security Algorithm of Virtual Machine Live Migration for KVM Virtualization System 其他
2016-01-01
Fan, Wei; Zhang, Zhujun; Wang, Tingting; Hu, Bo; Qing, Sihan; Sun, Degang
收藏  |  浏览/下载:5/0  |  提交时间:2017/12/03
Accelerating RSA with Fine-Grained Parallelism Using GPU 其他
2015-01-01
Yang, Yang; Guan, Zhi; Sun, Huiping; Chen, Zhong
收藏  |  浏览/下载:5/0  |  提交时间:2017/12/03
A countermeasure for power analysis to scalar multiplication of ECC hardware 其他
2015-01-01
Liu, Lifei; Cui, Xiaole; Ran, Yalin; Cui, Xiaoxin
收藏  |  浏览/下载:3/0  |  提交时间:2017/12/03
An anti-trojans design approach based on activation probability analysis 其他
2015-01-01
Ye, Xuwei; Feng, Jianhua; Gong, Haoran; He, Chunhua; Feng, Weilei
收藏  |  浏览/下载:3/0  |  提交时间:2017/12/03
Handling a trillion (unfixable) flaws on a billion devices: Rethinking network security for the Internet-of-Things 其他
2015-01-01
Yu, Tianlong; Sekar, Vyas; Seshan, Srinivasan; Agarwal, Yuvraj; Xu, Chenren
收藏  |  浏览/下载:4/0  |  提交时间:2017/12/03
A Countermeasure for Power Analysis to Scalar Multiplication of ECC Hardware 其他
2015-01-01
Liu, Lifei; Cui, Xiaole; Ran, Yalin; Cui, Xiaoxin
收藏  |  浏览/下载:5/0  |  提交时间:2017/12/03


©版权所有 ©2017 CSpace - Powered by CSpace