共 50 条
- [41] Tamper detection and self-recovery scheme by DWT watermarking [J]. NONLINEAR DYNAMICS, 2015, 79 (03) : 1817 - 1833
- [42] Unpredictable cryptographic primitives for the Robust Wireless Network Security [J]. 15TH INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS AND PERVASIVE COMPUTING (MOBISPC 2018) / THE 13TH INTERNATIONAL CONFERENCE ON FUTURE NETWORKS AND COMMUNICATIONS (FNC-2018) / AFFILIATED WORKSHOPS, 2018, 134 : 316 - 321
- [44] Design and development of network intrusion detection system detection scheme on network processing unit [J]. 8TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY, VOLS 1-3: TOWARD THE ERA OF UBIQUITOUS NETWORKS AND SOCIETIES, 2006, : U1023 - U1025
- [46] The Design of Enterprise Network Information Sharing Scheme Based on Security Technology [J]. PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND MANAGEMENT INNOVATION, 2015, 28 : 623 - 626
- [47] Basing cryptographic protocols on tamper-evident seals [J]. AUTOMATA, LANGUAGES AND PROGRAMMING, PROCEEDINGS, 2005, 3580 : 285 - 297
- [49] Basing cryptographic protocols on tamper-evident seals [J]. THEORETICAL COMPUTER SCIENCE, 2010, 411 (10) : 1283 - 1310