搜索筛选:
搜索耗时0.0810秒,为你在为你在102,285,761篇论文里面共找到 22 篇相符的论文内容
类      型:
[期刊论文] 作者:XIAODe-qin,ZHANGHuan-guo, 来源:武汉大学学报:自然科学英文版 年份:2005
We present a model based on Computational Temporal Logic (CTL) methods for verifying security requirements of electronic commerce protocols. The model describes...
[期刊论文] 作者:Xiexiao-yao ZhangHuan-guo, 来源:武汉大学学报:自然科学英文版 年份:2004
The accountability of electronic commerce protocols is an important aspect to insures security of electronic transaction. This paper proposes to use Finite Auto...
[期刊论文] 作者:XIEXiao-yao,ZhangHuan-guo, 来源:武汉大学自然科学学报(英文版) 年份:2004
[期刊论文] 作者:TUGuo-qing ZHANGHuan-guo WANGL, 来源:武汉大学学报:自然科学英文版 年份:2005
To build a trusted platform based on Trusted Computing Platform Alliance (TCPA) ' s recommendation,we analyze the integrity mechanism for such a PC platform...
[期刊论文] 作者:MENGQing-shu,ZHANGHuan-guo,QIN, 来源:武汉大学学报:自然科学英文版 年份:2005
By the relationship between the first linear spectra of a function at partial points and the Hamming weights of the sub-functions, and by the Hamming weight of...
[期刊论文] 作者:LuoMin ZhangHuan-guo WangLi-na, 来源:武汉大学学报:自然科学英文版 年份:2003
An unsupervised clustering-based intrusion de tection algorithm is discussed in this paper. The basic idea of the algorithm is to produce the cluster by compari...
[期刊论文] 作者:LiLi,ZhangHuan-guo,WangLi-na, 来源:武汉大学学报:自然科学英文版 年份:2004
This paper proposes an improved non-repudiation protocol after pointing out two attacks on an existing non-repudiation protocol. To analyze the improved protoco...
[期刊论文] 作者:WANGZhang-yi,ZHANGHuan-guo,QIN, 来源:武汉大学学报:自然科学英文版 年份:2005
We use evolutionary computing to synthesize Boolean functions randomly. By using specific crossover and mutation operator in evolving process and modifying sear...
[期刊论文] 作者:WANGZhang-yi,ZHANGHuan-guo,QIN, 来源:上海交通大学学报(英文版) 年份:2006
[会议论文] 作者:XUMing-Di;DURui-Ying;ZHANGHuan-Guo;, 来源:第一届中国传感器网络学术会议(CWSN 2007) 年份:2007
A new trusted cluster-based is presented on the basis of the peculiarity of sensor network. The method is applied to LEACH protocol for enhancing security. The...
[期刊论文] 作者:LiLi,ZhangHuan-guo,WangLi-nat, 来源:武汉大学自然科学学报(英文版) 年份:2004
[期刊论文] 作者:LiuYu-zhen,QINZhong-ping,ZHANGHuan-guo, 来源:武汉大学自然科学学报(英文版) 年份:2005
[期刊论文] 作者:LIUYi-chun,WANGLi-na,ZHANGHuan-guo, 来源:武汉大学自然科学学报(英文版) 年份:2004
A new class of atomicity, namely contract atomicity is presented. A new technical strategy based on convertible signature and two-phase commitment is proposed f...
[期刊论文] 作者:XUANJian-hui,WANGLi-na,ZHANGHuan-guo, 来源:武汉大学自然科学学报(英文版) 年份:2005
[期刊论文] 作者:ZengXiang-yong,FuJian-ming,LIUHe-guo,ZhangHuan-guo, 来源:武汉大学自然科学学报(英文版) 年份:2004
[期刊论文] 作者:TUGuo-qing,ZHANGHuan-guo,WANGLi-na,YUDan-dan, 来源:武汉大学自然科学学报(英文版) 年份:2005
[期刊论文] 作者:PENGWen-ling,WANGLi-na,ZHANGHuan-guo,CHENWei, 来源:武汉大学自然科学学报(英文版) 年份:2004
In this paper, we describe and analyze the hypothesis about intrusion tolerance software system, so that it can provide an intended server capability and deal w...
[期刊论文] 作者:YANGMin,WANGLi-na,ZHANGHuan-guo,CHENWei, 来源:武汉大学自然科学学报(英文版) 年份:2005
[期刊论文] 作者:WANGZhang-yi,ZHANGHuan-guo,QINZhong-ping,MENGQing-Shu, 来源:武汉大学自然科学学报(英文版) 年份:2004
We use evolutionary computing to synthesize Boolean functions randomly. By using specific crossover and mutation operator in evolving process and modifying sear...
[期刊论文] 作者:MENGQing-Shu,ZHANGHuan-guo,QINZhong-ping,WANGZhang-yi, 来源:武汉大学自然科学学报(英文版) 年份:2004
By the relationship between the first linear spectra of a function at partial points and the Hamming weights of the sub-functions, and by the Hamming weight of...
相关搜索: