好文档就是一把金锄头!
欢迎来到金锄头文库![会员中心]
电子文档交易市场
安卓APP | ios版本
电子文档交易市场
安卓APP | ios版本

检索证明报告.doc

5页
  • 卖家[上传人]:创****公
  • 文档编号:305908952
  • 上传时间:2022-06-08
  • 文档格式:DOC
  • 文档大小:181.50KB
  • / 5 举报 版权申诉 马上下载
  • 文本预览
  • 下载提示
  • 常见问题
    • 报告编号:JS201501003论文收录引用检索证明报告教育部科技查新工作站(G07)南京航空航天大学查新检索咨询中心二零一五年一月八日检索证明报告委托人单位:南京工程学院委托人:张三检索要求:1、检索作者发表的论文或专著被SCI、EI、CPCI-S收录情况2、检索作者发表的论文或专著被他引情况检索日期:2015年01月08日检索数据库:1. SCI EXPANDED网络版(ISI Web of Science,1998 - 2015)2. EI COMPENDEX 网络版(Engineering Village 2,1969 - 2015)3. CPCI-S网络版(CPCI,1991 - 2015)检索方式:网络检索检索结果:经检索,作者发表的论文或专著被以上数据库收录和引用情况如下:1. EI收录:作者有5篇论文被EI收录,其中2篇为会议论文,3篇为期刊论文,均为第一作者2. SCI收录:作者有4篇期刊论文被SCI收录,均为第一作者3. CPCI-S收录:作者有2篇会议论文被CPCI-S收录,为第一作者4. SCI引用:作者有2篇期刊论文被SCI引用4次,他引2次此处“他引”是指文献被作者及合作者以外其他人的引用)说明:数据会有遗漏 (详见附件)特此证明!检索证明人: 杨琳 教育部科技查新工作站(G07) 南京航空航天大学查新检索咨询中心2015-01-08附件:张三发表的论文被SCI、EI等收录引用情况证明材料1、Information-Theoretic Approach to Optimal Differential Fault Analysis 作者: Sakiyama, Kazuo; Li, Yang; Iwamoto, Mitsugu; 等.IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY JCR® 类别JCR 分区COMPUTER SCIENCE, THEORY & METHODS Q1ENGINEERING, ELECTRICAL & ELECTRONIC Q1数据来自第 2013 版 Journal Citation Reports® 出版商 IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC, 445 HOES LANE, PISCATAWAY, NJ 08855-4141 USA ISSN: 1556-6013 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY  卷: 7   期: 1   特刊: SI   页: 109-120   子辑: 1   出版年: FEB 2012 SCI收录(WOS:000299438100011) 来源期刊影响因子(2013):2.065总引:1次 他引:1次 他引文献列表:第 1 条,共 1 条标题: A DFA on AES based on the entropy of error distributions 作者: Lashermes, R (Lashermes, Ronan); Reymond, G (Reymond, Guillaume); Dutertre, JM (Dutertre, Jean-Max); Fournier, J (Fournier, Jacques); Robisson, B (Robisson, Bruno); Tria, A (Tria, Assia)编者: Bertoni G; Gierlichs B来源出版物: 2012 WORKSHOP ON FAULT DIAGNOSIS AND TOLERANCE IN CRYPTOGRAPHY (FDTC)  页: 34-43  DOI: 10.1109/FDTC.2012.18  出版年: 2012  入藏号: WOS:000312493900005 会议名称: 9th International Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC) 会议日期: SEP09, 2012 会议地点: Leuven, BELGIUM 会议赞助商 : IACR, Univ Massachusetts,, Politecnico Milano, CNRS TELECOM-ParisTech, RiscureISBN: 978-0-7695-4834-02、New Fault-Based Side-Channel Attack Using Fault Sensitivity 作者: Li, Yang; Ohta, Kazuo; Sakiyama, KazuoIEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY JCR® 类别JCR 分区COMPUTER SCIENCE, THEORY & METHODS Q1ENGINEERING, ELECTRICAL & ELECTRONIC Q1数据来自第 2013 版 Journal Citation Reports® 出版商 IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC, 445 HOES LANE, PISCATAWAY, NJ 08855-4141 USA ISSN: 1556-6013 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY  卷: 7   期: 1   特刊: SI   页: 88-97   子辑: 1   出版年: FEB 2012 SCI收录(WOS:000299438100009) 来源期刊影响因子(2013):2.065总引:3次 他引:1次 他引文献列表:第 1 条,共1 条标题: One Attack to Rule Them All: Collision Timing Attack versus 42 AES ASIC Cores 作者: Moradi, A (Moradi, Amir); Mischke, O (Mischke, Oliver); Paar, C (Paar, Christof)来源出版物: IEEE TRANSACTIONS ON COMPUTERS  卷: 62  期: 9  页: 1786-1798  DOI: 10.1109/TC.2012.154  出版年: SEP 2013  入藏号: WOS:000322453200009 ISSN: 0018-9340 3、Yet another fault-based leakage in non-uniform faulty ciphertextsLi, Yang (University of Electro-Communications, Chofu-Shi, Japan); Hayashi, Yu-Ichi; Matsubara, Arisa; Homma, Naofumi; Aoki, Takafumi; Ohta, Kazuo; Sakiyama, Kazuo  Source: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), v 8352 LNCS, p 272-287, 2014, Foundations and Practice of Security - 6th International Symposium, FPS 2013, Revised Selected PapersDatabase: CompendexEI收录(Accession number: 20141817679505)4、Exploring the relations between fault sensitivity and power consumptionLi, Yang (University of Electro-Communications, Japan); Endo, Sho; Debande, Nicolas; Homma, Naofumi; Aoki, Takafumi; Le, Thanh-Ha; Danger, Jean-Luc; Ohta, Kazuo; Sakiyama, Kazuo  Source: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), v 7864 LNCS, p 137-153, 2013, Constructive Side-Channel Analysis and Secure Design - 4th International Workshop, COSADE 2013, Revised Selected PapersDatabase: CompendexEI收录(Accession number: 20133316601388)5、Security Evaluation of a DPA-Resistant S-Box Based on the Fourier Transform 作者: Li, Yang; Sakiyama, Kazuo; Kawamura, Shinichi; 等.编者: Qing, SH; Mitchell, CJ; Wang, GL会议: 11th International Conference on Information and Communications Security 会议地点: Beijing, PEOPLES R CHINA 会议日期: DEC 14-17, 2009 会议赞助商: Chinese Acad Sci, Inst Software; Peking Univ, Inst Software & Microelect; Natl Nat Sci Fdn China; Microsoft Corp; Beijing Tip Technol Corp; Trusted Comp Grp; Int Commun & Informat Secur Assoc INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS INFORMATION AND COMMUNICATIONS SECURITY, PRO。

      点击阅读更多内容
      关于金锄头网 - 版权申诉 - 免责声明 - 诚邀英才 - 联系我们
      手机版 | 川公网安备 51140202000112号 | 经营许可证(蜀ICP备13022795号)
      ©2008-2016 by Sichuan Goldhoe Inc. All Rights Reserved.