中国科学院机构知识库网格
Chinese Academy of Sciences Institutional Repositories Grid
首页
机构
成果
学者
登录
注册
登陆
×
验证码:
换一张
忘记密码?
记住我
×
校外用户登录
CAS IR Grid
机构
软件研究所 [6]
武汉物理与数学研究所 [4]
采集方式
OAI收割 [10]
内容类型
会议论文 [5]
期刊论文 [5]
发表日期
2019 [2]
2018 [1]
2017 [1]
2012 [1]
2008 [2]
2007 [3]
更多
学科主题
Computer S... [1]
筛选
浏览/检索结果:
共10条,第1-10条
帮助
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
题名升序
题名降序
提交时间升序
提交时间降序
作者升序
作者降序
发表日期升序
发表日期降序
Cryptanalysis and Improvement of Ye et al's Quantum Private Comparison Protocol
期刊论文
OAI收割
INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2019, 卷号: 58, 期号: 6, 页码: 1854-1860
作者:
Zhang, HuanGuo
;
Wu, ShuoMei
;
Cai, QingYu
;
Wu, WanQing
  |  
收藏
  |  
浏览/下载:50/0
  |  
提交时间:2019/06/24
Cryptanalysis
Quantum private comparison
Participant attack
Cryptanalysis of He's quantum private comparison protocol and a new protocol
期刊论文
OAI收割
INTERNATIONAL JOURNAL OF QUANTUM INFORMATION, 2019, 卷号: 17, 期号: 3, 页码: 8
作者:
Wu, WanQing
;
Cai, QingYu
;
Wu, ShuoMei
;
Zhang, HuanGuo
  |  
收藏
  |  
浏览/下载:37/0
  |  
提交时间:2019/10/14
Quantum cryptography
quantum private comparison
Bell states
Bit-Oriented Quantum Public-Key Cryptosystem Based on Bell States
期刊论文
OAI收割
INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2018, 卷号: 57, 期号: 6, 页码: 1705-1715
作者:
Zhang, HuanGuo
;
Liang, XiaoYan
;
Wu, WanQing
;
Cai, QingYu
  |  
收藏
  |  
浏览/下载:38/0
  |  
提交时间:2018/08/15
Quantum Cryptography
Quantum Public Key Cryptosystem
Ciphertext Indistinguishability
Chosen Plaintext Attack
Holevo's Theorem
Bell States
Quantum Public Key Cryptosystem Based on Bell States
期刊论文
OAI收割
INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2017, 卷号: 56, 期号: 11, 页码: 3431-3440
作者:
Liang, XiaoYan
;
Zhang, HuanGuo
;
Cai, QingYu
;
Wu, WanQing
  |  
收藏
  |  
浏览/下载:23/0
  |  
提交时间:2017/12/06
Quantum Public Key Cryptosystem
Holevo's Theorem
Generalized Pauli Operations
Bell States
polar differential power attacks and evaluation
期刊论文
OAI收割
SCIENCE CHINA-INFORMATION SCIENCES, 2012, 卷号: 55, 期号: 7, 页码: 1588-1604
Tang Ming
;
Qiu ZhenLong
;
Gao Si
;
Yi Mu
;
Liu ShuBo
;
Zhang HuanGuo
;
Jin YingZhen
  |  
收藏
  |  
浏览/下载:25/0
  |  
提交时间:2013/09/17
computer security
differential power attack
side channel attack
vnida: building an ids architecture using vmm-based non-intrusive approach
会议论文
OAI收割
1st International Workshop on Knowledge Discovery and Data Mining, WKDD, Adelaide, Australia, 40566
Zhang Xiantao
;
Li Qi
;
Qing Sihan
;
Zhang Huanguo
  |  
收藏
  |  
浏览/下载:24/0
  |  
提交时间:2011/06/13
Administrative data processing
Computer crime
Computer networks
Data mining
Decision support systems
Information management
Knowledge based systems
Mining
a hash-tlb approach for mmu virtualization in xen/ia64
会议论文
OAI收割
IPDPS 2008 - 22nd IEEE International Parallel and Distributed Processing Symposium, Miami, FL, United states, April 14,
Zhang Xiantao
;
Xu Anthony X. F.
;
Li Qi
;
Yau David K. Y.
;
Qing Sihan
;
Zhang Huanguo
  |  
收藏
  |  
浏览/下载:24/0
  |  
提交时间:2011/06/13
Boolean functions
Computer networks
Distributed parameter networks
Shape memory effect
a schema of automated design security protocols
会议论文
OAI收割
2007 International Conference on Computational Intelligence and Security Workshops, CIS 2007, Harbin, Heilongjiang, China, 40878
Xue Haifeng
;
Zhang Huanguo
;
Qing Sihan
  |  
收藏
  |  
浏览/下载:17/0
  |  
提交时间:2011/06/29
Algorithms
Artificial intelligence
Automation
Intelligent control
Systems analysis
automated design of non-repudiation security protocols
会议论文
OAI收割
2007 International Conference on Wireless Communications, Networking and Mobile Computing, WiCOM 2007, Shanghai, China, September
Xue Haifeng
;
Zhang Huanguo
;
Qing Sihan
;
Yu Rongwei
  |  
收藏
  |  
浏览/下载:21/0
  |  
提交时间:2011/06/29
Genetic algorithms
Heuristic methods
Logic programming
Network protocols
a decentralized rbac model and its user-role administration
会议论文
OAI收割
ISCIT 2007 - 2007 International Symposium on Communications and Information Technologies, Sydney, Australia, 40832
Zhang Xiantao
;
Li Qi
;
Qing Sihan
;
Zhang Huanguo
;
Zhang Liqiang
  |  
收藏
  |  
浏览/下载:19/0
  |  
提交时间:2011/06/29
Access control
Communication
Control systems
Distributed computer systems
Electronic commerce
Information technology
Management
Software prototyping
Technology