搜索筛选:
搜索耗时1.5177秒,为你在为你在102,285,761篇论文里面共找到 54 篇相符的论文内容
类      型:
[期刊论文] 作者:ZHAO Lei,REN Xiangyu,LIU Mengleng,WANG Lina,ZHANG Hao,ZHANG Huanguo, 来源:中国通信 年份:2014
[期刊论文] 作者:ZHOU Shungan,DU Ruiying,CHEN Jing,SHEN Jian,DENG Hua,ZHANG Huanguo,, 来源:中国通信 年份:2016
Access control is a key mechanism to secure outsourced data in mobile clouds. Some existing solutions are proposed to enforce flexible access control on outsour...
[期刊论文] 作者:WU WanQing,ZHANG HuanGuo,WANG HouZhen,MAO ShaoWu,JIA JianWei,LIU JinHui,, 来源:Science China(Information Sciences) 年份:2015
Since the Shor algorithm showed that a quantum algorithm can efficiently calculate discrete logarithms and factorize integers, it has been used to break the RSA...
[期刊论文] 作者:TANG Ming,QIU ZhenLong,PENG HongBo,HU XiaoBo,YI Mu,ZHANG HuanGuo,, 来源:Science China(Information Sciences) 年份:2014
It has been widely accepted that the security cryptosystems should be only dependent on the security of their secret keys.However,there are still secret ciphers...
[期刊论文] 作者:ZHANG HuanGuo,HAN WenBao,LAI XueJia,LIN DongDai,MA JianFeng,LI JianHua,, 来源:Science China(Information Sciences) 年份:2015
Along with the rapid development and wide application of information technology, human society has entered the information era. In this era, people live and wor...
[会议论文] 作者:Zhou Shungan,Du ruiying,Chen Jing,Deng Hua,Shen Jian,Zhang Huanguo, 来源:第九届中国可信计算与信息安全学术会议 年份:2015
Data sharing is a main application of cloud computing.Some existing solutions are proposed to provide flexible access control for outsourced data in the cloud.H...
[会议论文] 作者:Mao Shaowu,Zhang Huanguo,Wanqing Wu,Wang Houzhen,Song jun,Liu jinhui, 来源:第九届中国可信计算与信息安全学术会议 年份:2015
[会议论文] 作者:Jia Jianwei,Wang Houzhen,Wu Wanqing,Mao Shaowu,Liu Jinhui,Zhang Huanguo, 来源:第九届中国可信计算与信息安全学术会议 年份:2015
[会议论文] 作者:Shen Jian,Zhou Shungan,Deng Hua,Zhang Huanguo,Chen Jing,Du ruiying, 来源:第九届中国可信计算与信息安全学术会议 年份:2015
[会议论文] 作者:Zhou shungan,Du Ruiying,Chen Jing,Shen Jian,Deng Hua,Zhang Huanguo, 来源:第九届中国可信计算与信息安全学术会议 年份:2015
Access control is a key mechanism to secure outsourced data in mobile clouds.Some existing solutions are proposed to enforce flexible access control on outsourced data or reduce the computations perfo...
[会议论文] 作者:Liu Jinhui,Zhang Huanguo,Jia Jianwei,Wang Houzhen,Mao Shaowu,Wu Wanqing, 来源:第九届中国可信计算与信息安全学术会议 年份:2015
During the last decades, many public key cryptosystems based on non-abelian algebraic structures were proposed, such as cryptosytems based on inner automorphism groups, general linear groups and braid...
[会议论文] 作者:Liu Jinhui,Jia Jianwei,Wu Shuomei,Zhang Huanguo,Wang Houzhen,Mao Shaowu, 来源:第九届中国可信计算与信息安全学术会议 年份:2015
Before going into details we would like to mention that non-abelian algebraic structures have already been used in a cryptographic context....
[会议论文] 作者:MI Lan Heinayati,ZHANG Huanguo,米兰·黑娜亚提,张焕国, 来源:第20届全国计算机新科技与计算机教育学术大会 年份:2009
  校园网络、教学资源库、网上教学支撑系统等是高校教育信息化的基础设施,缺少这些基础设施就无法实现教育的现代化。同样,双语教学是提高教学质量的有效手段。对于少数民族......
[会议论文] 作者:MI Lan Heinayati,米兰·黑娜亚提,ZHANG Huanguo,张焕国, 来源:全国高等学校计算机教育研究会 年份:2009
校园网络、教学资源库、网上教学支撑系统等是高校教育信息化的基础设施,缺少这些基础设施就无法实现教育的现代化。同样,双语教学是提高教学质量的有效手段。对于少数民族地区的高校,实行少数民族双语教学,即教学模式由以少数民族语授课为主向以汉语授课为主的转型......
相关搜索: