CSpace

浏览/检索结果: 共10条,第1-10条 帮助

限定条件    
已选(0)清除 条数/页:   排序方式:
Security performance analysis of a chaotic stream cipher 期刊论文
NONLINEAR DYNAMICS, 2018, 卷号: 94, 期号: 2, 页码: 1003-1017
作者:  Lin, Zhuosheng;  Wang, Guangyi;  Wang, Xiaoyuan;  Yu, Simin;  Lu, Jinhu
收藏  |  浏览/下载:163/0  |  提交时间:2018/11/16
Chosen-ciphertext attack  Chaotic stream cipher  Security performance analysis  Attack complexity  
A Causality Analysis of Societal Risk Perception and Stock Market Volatility in China 期刊论文
JOURNAL OF SYSTEMS SCIENCE AND SYSTEMS ENGINEERING, 2018, 卷号: 27, 期号: 5, 页码: 613-631
作者:  Xu, Nuo;  Tang, Xijin
收藏  |  浏览/下载:168/0  |  提交时间:2018/11/16
Societal risk perception  stock market volatility  Baidu Index  Granger causality test  multiple linear regressions  
Design and FPGA-Based Realization of a Chaotic Secure Video Communication System 期刊论文
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2018, 卷号: 28, 期号: 9, 页码: 2359-2371
作者:  Chen, Shikun;  Yu, Simin;  Lu, Jinhu;  Chen, Guanrong;  He, Jianbin
收藏  |  浏览/下载:85/0  |  提交时间:2018/11/16
Anti-control of chaos  chaos-based video encryption  Verilog HDL algorithm  FPGA-based realization  TESTU01 test  
Science and Technology on Communication Security Laboratory[6142103010701] 项目
项目编号: 6142103010701, 资助机构: Science and Technology on Communication Security Laboratory, 2018-
-
收藏  |  浏览/下载:69/0  |  提交时间:2018/09/08
The future natural gas consumption in China: Based on the LMDI-STIRPAT-PLSR framework and scenario analysis 期刊论文
ENERGY POLICY, 2018, 卷号: 119, 页码: 215-225
作者:  Chai, Jian;  Liang, Ting;  Lai, Kin Keung;  Zhang, Zhe George;  Wang, Shouyang
收藏  |  浏览/下载:178/0  |  提交时间:2018/09/08
Natural gas consumption  LMDI decomposition  STIRPAT model  PLS regression  Scenario analysis  
Fault Attack on ACORN v3 期刊论文
COMPUTER JOURNAL, 2018, 卷号: 61, 期号: 8, 页码: 1166-1179
作者:  Zhang, Xiaojuan;  Feng, Xiutao;  Lin, Dongdai
收藏  |  浏览/下载:146/0  |  提交时间:2018/09/08
CAESAR  authenticated cipher  stream cipher  ACORN  fault attack  
Information Security Protocol Based System Identification with Binary-Valued Observations 期刊论文
JOURNAL OF SYSTEMS SCIENCE & COMPLEXITY, 2018, 卷号: 31, 期号: 4, 页码: 946-963
作者:  Xu, Changbao;  Zhao, Yanlong;  Zhang, Ji-Feng
收藏  |  浏览/下载:144/0  |  提交时间:2018/07/30
Cryptography  identification algorithm  information security  passive attacks  security protocol  time complexity  
Cryptanalysis of a Chaotic Stream Cipher and Its Improved Scheme 期刊论文
INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 2018, 卷号: 28, 期号: 7, 页码: 27
作者:  Lin, Zhuosheng;  Yu, Simin;  Feng, Xiutao;  Lu, Jinhu
收藏  |  浏览/下载:126/0  |  提交时间:2019/12/13
Chaotic stream cipher  divide-and-conquer attack  chosen-ciphertext attack  improved chaotic encryption algorithm  
informationsecurityprotocolbasedsystemidentificationwithbinaryvaluedobservations 期刊论文
journalofsystemsscienceandcomplexity, 2018, 卷号: 031, 期号: 004, 页码: 946
作者:  Xu Changbao;  Zhao Yanlong;  Zhang Jifeng
收藏  |  浏览/下载:161/0  |  提交时间:2020/01/10
acausalityanalysisofsocietalriskperceptionandstockmarketvolatilityinchina 期刊论文
journalofsystemsscienceandsystemsengineering, 2018, 卷号: 27, 期号: 5, 页码: 613
作者:  Xu Nuo;  Tang Xijin
收藏  |  浏览/下载:152/0  |  提交时间:2020/01/10