搜索筛选:
搜索耗时1.2614秒,为你在为你在102,285,761篇论文里面共找到 54 篇相符的论文内容
类      型:
[期刊论文] 作者:LIU Jinhui,ZHANG Huanguo,JIA Jianwei,, 来源:Chinese Journal of Electronics 年份:2017
Advances in quantum computation threaten to break public key cryptosystems such as RSA,ECC, and El Gamal that are based on the difficulty of factorization or ta...
[期刊论文] 作者:WANG Yahui,YAN Songyuan,ZHANG Huanguo,, 来源:Wuhan University Journal of Natural Sciences 年份:2017
Shor proposed a quantum polynomial-time integer factorization algorithm to break the RSA public-key cryptosystem.In this paper,we propose a new quantum algorith...
[期刊论文] 作者:Wang Chao,Zhang Huanguo,Liu Li, 来源:中国通信 年份:2011
Elliptic curve cryptography is one of the most important public-key cryptography.The Koblitz Curve is a special kind of elliptic curve in ECC and its security m...
[期刊论文] 作者:MAO Shaowu ZHANG Huanguo WU Wa, 来源:中国通信:英文版 年份:2014
[期刊论文] 作者:LIU Jinhui,ZHANG Huanguo,JIA Jianwei,, 来源:Wuhan University Journal of Natural Sciences 年份:2016
Advances in quantum computation threaten to break public key cryptosystems that are based on the difficulty of factorization or the difficulty of discrete logar...
[期刊论文] 作者:JIA Jianwei,LIU Jinhui,ZHANG Huanguo,, 来源:Chinese Journal of Electronics 年份:2017
A key exchange protocol is considered unsafe.The scheme is based on a set of m commuting square singular matrices of dimension n×n over a finite field,and its...
[会议论文] 作者:WEI Guoheng,ZHANG Huanguo,WANG Ya, 来源:第九届中国可信计算与信息安全学术会议 年份:2015
Relay attack is one of the most threatening challenges against RFID now.Distance bounding protocols have been introduced to thwart relay attacks....
[会议论文] 作者:WEI Guoheng,ZHANG Huanguo,WANG Ya, 来源:第九届中国可信计算与信息安全学术会议 年份:2015
[会议论文] 作者:CAO Hui,ZHANG Huanguo,YAN Fei, 来源:第六届中国可信计算与信息安全学术会议 年份:2012
Security testing is a key technology for software security.The testing results can reflect the relationship between Software testing and software security,and they can help program designers for evalu...
[期刊论文] 作者:YAN Fei,ZHANG Huanguo,SUN Qi,S, 来源:武汉大学学报:自然科学英文版 年份:2006
格子安全基础结构(GSI ) 的当前的代表团机制装“ tsatisfy 在格子的动态、分布式、实际的安全的要求虚拟组织。改进这种状况,使 TC 能的 GSI 在这篇论文被讨论。使 WithTC 能...
[期刊论文] 作者:LIANG Yu,PENG Guojun,ZHANG Huanguo,WANG Ying, 来源:第七届中国可信计算与信息安全学术会议 年份:2013
  Aiming at the difficulty of unknown Trojan detection in the APT flooding situation, an improved detecting method has been proposed.The basic idea of this me...
[会议论文] 作者:Peng GuoJun,彭国军,Zhang HuanGuo,张焕国, 来源:第17届全国计算机新科技与计算机教育学术大会 年份:2006
本文对武汉大学一次全校师生信息安全意识调查问卷结果进行了详细分析,问卷结果表明,目前高校师生信息安全意识相对比较薄弱,加强高校师生信息安全意识已经刻不容缓。本文最后还介绍了武汉大学《信息安全概论》通识教育课程的教学内容大致设置以及学生一些相关建议......
[期刊论文] 作者:LI Pengwei,FU Jianming,XU Chao,CHENG Binlin,ZHANG Huanguo, 来源:城市道桥与防洪 年份:2019
该文从挂篮荷载计算、施工流程、支座及临时固结施工、挂篮安装及试验、合拢段施工、模板制作安装、钢筋安装、混凝土的浇筑及养生、测量监控等方面人手,介绍了S226海滨大桥...
[期刊论文] 作者:SONG Jun,HE Chunjiao,ZHANG Lei,TANG Shanyu,ZHANG Huanguo, 来源:中国通信 年份:2014
[期刊论文] 作者:MAO Shaowu,ZHANG Huanguo,ZHANG Pe,SONG Jun,LIU Jinhu, 来源:中国通信(英文版) 年份:2016
The hardness of tensor decomposition problem has many achievements,but limited applications in cryptography,and the tensor decomposition problem has been consid...
[期刊论文] 作者:Tang Ming,Qiu Zhenlong,Deng Hui,Liu Shubo,Zhang Huanguo, 来源:中国通信 年份:2012
[期刊论文] 作者:Chen Jing,Du Ruiying,Yu Fajiang,Zheng Minghui,Zhang Huanguo, 来源:中国通信 年份:2012
[期刊论文] 作者:SONG Jun,ZHANG Mohan,HAN Chunling,WANG Kaixin,ZHANG Huanguo,, 来源:Wuhan University Journal of Natural Sciences 年份:2016
In order to enhance the security of Android applications,we propose a repackaging and dynamic authority management scheme based on Android application reinforce...
[期刊论文] 作者:LIU Jinhui,YU Yong,WU Fusheng,CHENG Yuehua,ZHANG Huanguo, 来源:武汉大学自然科学学报(英文版) 年份:2022
Many evidences have showed that some intelligence agen-cies(often called big brother)attempt to monitor citizens\'communica-tion by providing coerced citizens a lot of subverted cryptographic algo-rithms and coercing them to adopt these alg......
[期刊论文] 作者:MAO Shaowu,ZHANG Huanguo,WU Wanqing,LIU Jinhui,LI Shuanbao,Wang Houzhen, 来源:中国通信 年份:2014
相关搜索: