您当前的位置:
首页 >
文章列表页 >
The formal analysis of CC security functional components
更新时间:2024-10-14
    • The formal analysis of CC security functional components

    • Issue 7, Pages: 164-169(2003)
    • CLC: TP309
    • Published:2003

    移动端阅览

  • HUANG Yuan-fei1, HE De-quan2, CHEN Ming-qi1. The formal analysis of CC security functional components[J]. 2003, (7): 164-169. DOI:

  •  
  •  
icon
试读结束,您可以激活您的VIP账号继续阅读。
去激活 >
icon
试读结束,您可以通过登录账户,到个人中心,购买VIP会员阅读全文。
已是VIP会员?
去登录 >

0

Views

669

下载量

6

CSCD

Alert me when the article has been cited
提交
Tools
Download
Export Citation
Share
Add to favorites
Add to my album

Related Articles

Survey on chaos-based low probability of interception communication technology
Survey on privacy protection indoor positioning
Survey of capacity limits and implementation techniques in wireless covert communication
Research on coreference resolution technology of entity in information security
Research on color QR code watermarking technology based on chaos theory

Related Author

ZHOU Ang
WANG Shilian
CHEN Weiyu
XIA Guojiang
Zhiheng WANG
Yanyan XU
Weiyu CHEN
Junshan LUO

Related Institution

Beijing Institute of Astronautical Systems Engineering
College of Electronic Science and Technology, National University of Defense Technology
State Key Laboratory of Information Engineering in Surveying Mapping and Remote Sensing, Wuhan University
State Key Lab of Rail Traffic Control and Safety,Beijing Jiaotong University
College of Information and Communication, National University of Defense Technology
0