暂无分享,去创建一个
He Xu | Xiongfeng Ma | Hoi-Kwong Lo | Feihu Xu | Bing Qi | Xiaoqing Tan | Feihu Xu | H. Lo | Xiongfeng Ma | B. Qi | He Xu | Xiaoqing Tan
[1] Dave Cliff,et al. In/Proceedings of the 15th IEEE International Conference on the Engineering of Complex Computer Systems/ (ICECCS 2010), Oxford , 2010 .
[2] M. Nivat. Theoretical Computer Science Volume 213-214 , 1999 .
[3] Yvo Desmedt,et al. Advances in Cryptology — CRYPTO ’94 , 2001, Lecture Notes in Computer Science.
[4] K. K. Nambiar,et al. Foundations of Computer Science , 2001, Lecture Notes in Computer Science.
[5] October I. Physical Review Letters , 2022 .
[6] R. Fildes. Journal of the American Statistical Association : William S. Cleveland, Marylyn E. McGill and Robert McGill, The shape parameter for a two variable graph 83 (1988) 289-300 , 1989 .
[7] Ran Canetti,et al. Universally composable security: a new paradigm for cryptographic protocols , 2001, Proceedings 2001 IEEE International Conference on Cluster Computing.
[8] R. Stephenson. A and V , 1962, The British journal of ophthalmology.
[9] M. Panella. Associate Editor of the Journal of Computer and System Sciences , 2014 .
[10] Christof Paar,et al. Cryptographic Hardware and Embedded Systems - CHES 2003 , 2003, Lecture Notes in Computer Science.
[11] Bruce Schneier,et al. Applied cryptography : protocols, algorithms, and source codein C , 1996 .
[12] Patrick C. Fischer,et al. Proceedings of the fourth annual ACM symposium on Theory of computing , 1969, STOC 1969.
[13] S. WEINTROUB,et al. A Review of Scientific Instruments , 1932, Nature.
[14] Dan Suciu,et al. Journal of the ACM , 2006 .
[15] D. S. Johnson,et al. Proceedings of the twenty-first annual ACM symposium on Theory of computing , 1989, STOC 1989.