Works matching IS 1001-3695 AND VI 31 AND IP 3 AND DT 2014


Results: 77
    1
    2
    3
    4
    5
    6
    7
    8
    9
    10
    11
    12
    13
    14
    15
    16
    17
    18
    19
    20
    21
    22
    23
    24
    25
    26
    27
    28
    29
    30
    31
    32
    33

    Differential power analysis attacks on PRESENT.

    Published in:
    Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 3, p. 843, doi. 10.3969/j.issn.1001-3695.2014.03.049
    By:
    • LI Lang;
    • LI Ren-fa;
    • LI Ken-li;
    • WANG Yi;
    • JIAO Ge;
    • ZOU Yi
    Publication type:
    Article
    34

    Data hiding based on disk slack space.

    Published in:
    Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 3, p. 839, doi. 10.3969/j.issn.1001-3695.2014.03.048
    By:
    • JIANG Zi-feng;
    • ZENG Guang-yu;
    • WANG Wei;
    • NIU Xiao-peng
    Publication type:
    Article
    35
    36
    37
    38
    39
    40

    Vulnerability assessment based on correlation.

    Published in:
    Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 3, p. 811, doi. 10.3969/j.issn.1001-3695.2014.03.042
    By:
    • ZHANG Feng-li;
    • FENG Bo
    Publication type:
    Article
    41
    42
    43
    44
    45
    46
    47
    48
    49
    50