首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   4篇
  免费   0篇
综合类   3篇
铁路运输   1篇
  2007年   1篇
  2004年   1篇
  2001年   1篇
  1999年   1篇
排序方式: 共有4条查询结果,搜索用时 0 毫秒
1
1.
Yang and Shieh proposed a timestamp-based password authentication scheme. Fan and Shen gave different improvements on it. Wang claimed that Fan's improvement is insecure and gave his attack. Yang did the similar things on Shen's scheme. This paper gave further cryptanalysis on Wang's and Yang's attacks and pointed out that both of their attacks are infeasible. Wang and Yang made the same mathematic mistake and their attacks are pseudo.  相似文献   
2.
IntroductionWhen modeling network traffic,packet ar-rivals are often assumed to be Poisson processes,because such processes have attractive theoreticalproperties. Recenet work,however,argues con-vincingly that local- area network traffic is muchbetter modeled using statistically self- similar pro-cesses[1] ,which have more different theoreticalproperties than Poisson processes. A subsequentinvestigation suggests that the same holds forwide- area network traffic[2 ,3 ] .The theory of self- sim…  相似文献   
3.
IntroductionRecentempiricalstudies[1~4]ofhigh-resolutiontrafficmeasurementsfromavarietyofdifferentworkingcommunicationnetworkshaveprovidedampleevidencethatactualnetworktrafficisself-similar,orfractal,innature,i.e.,burstyoverawiderangeoftimescales.Thi…  相似文献   
4.
太长高速公路K62 + 44 0~K62 + 5 2 5段的砂岩松软、节理裂隙发育、完整性差 ,在此种地质条件下采用光面爆破技术并获得成功。分析砂岩爆破参数 ,介绍合理可靠的施工工艺。  相似文献   
1
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号