咨询与建议

限定检索结果

文献类型

  • 4 篇 期刊文献

馆藏范围

  • 4 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2 篇 文学
    • 1 篇 中国语言文学
    • 1 篇 外国语言文学
  • 2 篇 工学
    • 1 篇 信息与通信工程
    • 1 篇 计算机科学与技术...

主题

  • 4 篇 impersonation
  • 1 篇 psychiatric trea...
  • 1 篇 poetry
  • 1 篇 the ghost writer
  • 1 篇 resilience
  • 1 篇 prime
  • 1 篇 authentication
  • 1 篇 factorization
  • 1 篇 narrative dilemm...
  • 1 篇 loneliness
  • 1 篇 security
  • 1 篇 traceability
  • 1 篇 exclusion
  • 1 篇 trapdoor
  • 1 篇 rfid protocol
  • 1 篇 ouafi phan priva...
  • 1 篇 ecdlp
  • 1 篇 function
  • 1 篇 privacy

机构

  • 1 篇 department of co...
  • 1 篇 department of el...
  • 1 篇 department of in...
  • 1 篇 tongji zhejiang ...
  • 1 篇 department of in...
  • 1 篇 university of gd...

作者

  • 1 篇 afrooz haghbin
  • 1 篇 olfa fahad abusa...
  • 1 篇 yao xiaohan
  • 1 篇 areej omar baalg...
  • 1 篇 jorgen steenveis...
  • 1 篇 zahra abbas al a...
  • 1 篇 mahtab mirmohsen...
  • 1 篇 jayaprakash kar
  • 1 篇 seyed salman saj...

语言

  • 4 篇 英文
检索条件"主题词=Impersonation"
4 条 记 录,以下是1-10 订阅
排序:
impersonation: A Practical Solution for Jewish Narrative Dilemma——On Philip Roth's Novella The Ghost Writer
收藏 引用
校园英语 2015年 第13期 249-250页
作者: Yao Xiaohan Tongji Zhejiang College
Philip Roth employs a twining narrative method in The Ghost Writer for the purpose of seeking a possible outlet for the narrative dilemma of Jewish *** embedding several story lines into one major plot, the author fin... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Cryptanalysis and improvement of two new RFID protocols based on R-RAPSE
收藏 引用
Journal of Communications and Information Networks 2017年 第3期2卷 107-122页
作者: Seyed Salman Sajjadi GhaemMaghami Afrooz Haghbin Mahtab Mirmohseni Department of Computer Engineering Science and Research branchIslamic Azad UniversityTehran ***Iran Department of Electrical Engineering Sharif University of TechnologyTehran 11365/8639Iran
RFID(Radio Frequency IDentification)is a pioneer technology which has depicted a new lifestyle for *** we observe an increase in the number of RFID applications and no one can ignore their numerous *** important issue... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Authenticated Key Agreement Protocols: A Comparative Study
收藏 引用
Journal of Information Security 2015年 第1期6卷 51-58页
作者: Areej Omar Baalghusun Olfa Fahad Abusalem Zahra Abbas Al Abbas Jayaprakash Kar Department of Information Technology Faculty of Computing and Information Technology King Abdulaziz University Jeddah KSA Department of Information Systems Information Security Research Group Faculty of Computing and Information Technology King Abdulaziz University Jeddah KSA
One of the most important and challenging cryptographic primitives in Public Key Cryptography is Key Agreement Protocol where two or more parties share secret values and establish the session key. Many authors have pr... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
The Mediator. Richard III and Macbeth in Einar MurGudmundsson' s Novel Angels of the Universe
收藏 引用
Journal of Literature and Art Studies 2018年 第2期8卷 216-221页
作者: Jorgen SteenVeisland University of Gdansk Gdansk Poland
Gudmundsson's Angels of the Universe (Englaralheimsins, 1993) stages a poetic psychodrama weaving Shakespeare's characters Richard IlI and Macbeth into the lives of the first-person narrator Paul and his friend Vi... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论