安全协议的分析方法
-
1冯登国,范红.安全协议形式化分析理论与方法研究综述[J].中国科学院研究生院学报,2003,20(4):389-406. 被引量:34
-
2YANG Yuanyuan,ZHANG Shuwen,YANG Jiuchun,CHANG Liping,BU Kun,XING Xiaoshi.A review of historical reconstruction methods of land use/land cover[J].Journal of Geographical Sciences,2014,24(4):746-766. 被引量:9
-
3陈丹伟,黄秀丽,孙国梓.基于SVO逻辑的云服务安全形式化分析[J].小型微型计算机系统,2010,31(12):2438-2441. 被引量:4
-
4成典勤.集群分布式安全探讨[J].现代计算机,2006,12(3):55-58.
-
5杨恩忠.风险矩阵法在玉门油田物资供应风险评估中的应用[J].北京石油管理干部学院学报,2008,15(2):57-60. 被引量:1
-
6光学信息处理、图像识别[J].中国光学,2000(3):42-48.
-
7任勇,何鹏,王洪良,岑仲洁,冯鹏,魏彪.Compressed sensing and Otsu's method based binary CT image reconstruction technique in non-destructive detection[J].Nuclear Science and Techniques,2015,26(5):63-68.
-
8SHI Minjia,WANG Yu.OPTIMAL BINARY CODES FROM ONE-LEE WEIGHT CODES AND TWO-LEE WEIGHT PROJECTIVE CODES OVER Z_4[J].Journal of Systems Science & Complexity,2014,27(4):795-810. 被引量:6
-
9修青磊,董明义,刘荣光,张建,欧阳群,陈元柏.Reconstruction algorithm study of 2D interpolating resistive readout structure[J].Chinese Physics C,2013,37(10):39-48.
-
10HU Lei,ZHOU JianXiong,SHI ZhiGuang,FU Qiang.Compressed sensing of superimposed chirps with adaptive dictionary refinement[J].Science China(Information Sciences),2013,56(12):167-181. 被引量:1
;