-
1دورية أكاديمية
المؤلفون: Lu, Yanrong, Xu, Zhengguang, Li, Li, Zhang, Jie, Chen, Wei
المصدر: ISA Transactions ; volume 133, page 102-115 ; ISSN 0019-0578
مصطلحات موضوعية: Applied Mathematics, Control and Systems Engineering, Electrical and Electronic Engineering, Computer Science Applications, Instrumentation
الإتاحة: https://doi.org/10.1016/j.isatra.2022.07.013Test
https://api.elsevier.com/content/article/PII:S0019057822003706?httpAccept=text/xmlTest
https://api.elsevier.com/content/article/PII:S0019057822003706?httpAccept=text/plainTest -
2دورية أكاديمية
المؤلفون: Liu, Jiaoqin, Guo, Chengjie, Lu, Yanrong, Liu, Hao, Jia, Mengye, Zhang, Jingjing, Jin, Riya, Qiao, Yina, Ma, Rui, Wu, Zhibo
المصدر: Chemical Engineering Science ; volume 281, page 119154 ; ISSN 0009-2509
مصطلحات موضوعية: Applied Mathematics, Industrial and Manufacturing Engineering, General Chemical Engineering, General Chemistry
الإتاحة: https://doi.org/10.1016/j.ces.2023.119154Test
https://api.elsevier.com/content/article/PII:S0009250923007108?httpAccept=text/xmlTest
https://api.elsevier.com/content/article/PII:S0009250923007108?httpAccept=text/plainTest -
3دورية أكاديمية
المؤلفون: Lu, Yanrong, Liao, Fucheng, Deng, Jiamei, Pattinson, Colin
المساهمون: National Natural Science Foundation of China
المصدر: Journal of the Franklin Institute ; volume 356, issue 2, page 908-934 ; ISSN 0016-0032
مصطلحات موضوعية: Applied Mathematics, Computer Networks and Communications, Signal Processing, Control and Systems Engineering
الإتاحة: https://doi.org/10.1016/j.jfranklin.2018.01.016Test
https://api.elsevier.com/content/article/PII:S0016003218300760?httpAccept=text/xmlTest
https://api.elsevier.com/content/article/PII:S0016003218300760?httpAccept=text/plainTest -
4دورية أكاديمية
المؤلفون: Xie, Qi1 qixie68@126.com, Lu, Yanrong2, Tan, Xiao1, Tang, Zhixiong1, Hu, Bin1
المصدر: PLoS ONE. 10/5/2018, Vol. 13 Issue 10, p1-17. 17p.
مصطلحات موضوعية: *COMPUTER security, *COMPUTER access control, *KEY agreement protocols (Computer network protocols), *COMPUTER passwords, *CHAOS theory
-
5دورية أكاديميةAn Extended Chaotic Maps-Based Three-Party Password-Authenticated Key Agreement with User Anonymity.
المؤلفون: Lu, Yanrong1,2, Li, Lixiang1,2 lixiang@bupt.edu.cn, Zhang, Hao1,2, Yang, Yixian1,2
المصدر: PLoS ONE. 4/21/2016, Vol. 11 Issue 4, p1-19. 19p.
مصطلحات موضوعية: *COMPUTER access control, *KEY agreement protocols (Computer network protocols), *CHAOS theory, *COMPUTER security, *CRYPTOGRAPHY, *APPLIED mathematics