Zobrazeno 1 - 10
of 10
pro vyhledávání: '"LIHAO WEI"'
Publikováno v:
AIP Advances, Vol 14, Iss 1, Pp 015113-015113-5 (2024)
Circular polarizers have essential applications in modern radar and communication systems. However, an online tunable wideband dual-circular polarizer with a power capability of more than 150 kW in the Ku band has not been reported yet, and it has re
Externí odkaz:
https://doaj.org/article/e37fc433a3a1491791dd809db6ec9a25
Publikováno v:
Second International Symposium on Computer Technology and Information Science (ISCTIS 2022).
Publikováno v:
Journal of Building Engineering. 44:103186
As the most serious phase of construction pollution, the earthwork construction phase emits a large amount of dust into the environment and causes serious health hazards to construction workers. To reveal the characteristics of the health risks to wo
Publikováno v:
Security, Privacy, and Anonymity in Computation, Communication, and Storage ISBN: 9783319723884
SpaCCS
SpaCCS
Cloud computing platforms have the characteristics of large scale, complex interaction and dynamic environment, which cause it more and more serious to software and system security, and the monitoring technology is one of the key technologies to ensu
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::8897de9607b73a5138262ff33c986ca8
https://doi.org/10.1007/978-3-319-72389-1_33
https://doi.org/10.1007/978-3-319-72389-1_33
Publikováno v:
BMEI
A multi-party-signature protocol enables an ensemble of entities to sign on a message to produce a compressed signature. Recently, a lot of multi-party-signature protocols have been proposed in the security field. However, these schemes suffer either
Publikováno v:
BMEI
Module lattices have many advantages over traditional number theory to construct security schemes. Especially, module lattice-based security schemes are potentially able to resist to quantum attacks which can break traditional number theory based one
Publikováno v:
Proceedings of the 2015 International Symposium on Computers & Informatics.
Establishing a complete information security policy is the most important step to solve the problem of information security and the basis for the entire information security system. Using intrusion detection technology to identify the source of threa
Publikováno v:
2012 4th Electronic System-Integration Technology Conference.
Publikováno v:
Proceedings of 2012 National Conference on Information Technology and Computer Science.
This paper researches the method of SQL injection attack detection and the principle of static analysis scanning, and presents a Java source-code SQL injection attack detection algorithm. The detection algorithm includes these steps: lexical analysis
Publikováno v:
Proceedings of 2012 National Conference on Information Technology and Computer Science.
Regarding all the issues that Corporation faced during the grade evaluation, e.g.lack of accuracy on risk analysis, over dependence on the capability of the evaluater, etc. We bring out a new evaluation method on grade protection and the distributed