Especial Total Colorings Towards Multiple Authentications In Network Encryption
暂无分享,去创建一个
Bing Yao | Hui Sun | Hongyu Wang | Fei Ma | Jing Su | Xiaomin Wang
[1] Frank Harary,et al. Graph Theory , 2016 .
[2] Bing Yao,et al. Exploring Topological Graph Passwords of Information Security by Chinese Culture , 2018, 2018 IEEE 3rd Advanced Information Technology, Electronic and Automation Control Conference (IAEAC).
[3] Bing Yao,et al. Matrices From Topological Graphic Coding of Network Security , 2019, 2019 IEEE 4th Advanced Information Technology, Electronic and Automation Control Conference (IAEAC).
[4] Bing Yao,et al. Exploring New Cryptographical Construction of Complex Network Data , 2016, 2016 IEEE First International Conference on Data Science in Cyberspace (DSC).
[5] Mingjun Zhang,et al. Using Chinese Characters To Generate Text-Based Passwords For Information Security , 2019, ArXiv.
[6] Chao Yang,et al. Topological Graphic Passwords And Their Matchings Towards Cryptography , 2018, ArXiv.
[7] Jin Xu,et al. New-Type Graphical Passwords Made by Chinese Characters with Their Topological Structures , 2018, 2018 2nd IEEE Advanced Information Management,Communicates,Electronic and Automation Control Conference (IMCEC).
[8] Bing Yao,et al. Hanzi-TB-paws For Helping Chinese People To Memorize Their Passwords With Longer Bytes , 2019, 2019 IEEE 3rd Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC).
[9] Joseph A. Gallian,et al. A Dynamic Survey of Graph Labeling , 2009, The Electronic Journal of Combinatorics.
[10] Jin Xu,et al. The key-models and their lock-models for designing new labellings of networks , 2016, 2016 IEEE Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC).
[11] Razvan Pascanu,et al. Relational inductive biases, deep learning, and graph networks , 2018, ArXiv.