搜索筛选:
搜索耗时0.0921秒,为你在为你在102,285,761篇论文里面共找到 9 篇相符的论文内容
发布年度:
[期刊论文] 作者:Lizhao Liu,Wentu Gao,Jian Liu,,
来源:中国通信:英文版 年份:2016
An image trust root is a special type of soft trust root for trusted computing. However,image trust root generation is difficult,as it needs a corresponding sta...
[期刊论文] 作者:LIU Lizhao,LIU Jian,DAI Yaomei,
来源:中国通信:英文版 年份:2016
Many websites use verification codes to prevent users from using the machine automatically to register,login,malicious vote or irrigate but it brought great bur...
[会议论文] 作者:Lizhao Liu,Gaixia Luo,Jijun Zhao,
来源:2014第二届中国网络安全大会 年份:2014
...
[会议论文] 作者:Lizhao Liu,Haili Gao,Jijun Zhao,
来源:第二届计算纳米科学与新能源材料研讨会 年份:2009
...
[会议论文] 作者:LIU Lizhao,LIU Jian,ZHU Shunzhi,LI Lin,SUN Zhonghai,
来源:第六届中国可信计算与信息安全学术会议 年份:2012
A new authentication algorithm for grid identity trusted computing unlimited by hardware is presented;the trusted root is made as an image data.The grid entity is trusted in the soft platform when its...
[期刊论文] 作者:LIU Lizhao,LIU Jian,DAI Yaomei,XU Huarong,YIN Huayi,ZHU Shunzhi,
来源:中国通信(英文版) 年份:2016
Many websites use verification codes to prevent users from using the machine automatically to register,login,malicious vote or irrigate but it brought great bur...
[期刊论文] 作者:Lizhao Liu,Wentu Gao,Jian Liu,Huayi Yin,Huarong Xu,Shunzhi Zhu,,
来源:中国通信 年份:2016
An image trust root is a special type of soft trust root for trusted computing. However,image trust root generation is difficult,as it needs a corresponding stable logic feature generation model and a...
[会议论文] 作者:Lizhao LIU,Yaomei DAI,Jian LIU,Huarong XU,Huayi YIN,Shunzhi ZHU,
来源:第九届中国可信计算与信息安全学术会议 年份:2015
...
[会议论文] 作者:Yaomei DAI,Lizhao LIU,Huarong XU,Shunzhi ZHU,Huayi YIN,Jian LIU,
来源:第九届中国可信计算与信息安全学术会议 年份:2015
...
相关搜索: