中国科学院软件研究所机构知识库
Log In
Register
Email:
Passwd
验 证:
换一张
Have you forgotten your password?
Stay signed in
Log In
ALL
Title
Author
Keyword
Sponsors
Type
Publication date
Submitted Time
Subject
Conference Name
Source
Categories
KOS Subject
Advisor
ORCID
Advanced
在结果中检索
Communities
Subjects
All Items
Community
软件所图书馆 [38]
信息安全国家重点实... [25]
作者
Content Type
会议论文 [48]
期刊论文 [15]
Issued Date
Language
英语 [45]
中文 [1]
Source
lecture n... [26]
ieee trans... [4]
globecom -... [2]
ieee netwo... [2]
2011 ieee ... [1]
更多...
Project
descriptio... [2]
Indexed
EI [63]
Spnsorship
national n... [2]
university... [2]
国科图 [2]
acm sigsac... [1]
adnovum [1]
更多...
ISCAS OpenIR
Search Results
Help
Item hits:
(Results 11-20 of 63)
Filters
Indexed:EI
Items/Page:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
Sort:
Select
Submitted Time Ascending
Submitted Time Descending
Title Ascending
Title Descending
Author Ascending
Author Descending
Issue Date Ascending
Issue Date Descending
VCCBox: Practical Confinement of Untrusted Software in Virtual Cloud Computing
[会议论文]
ICST International Conference on Security and Privacy in Communication Networks, Sydney, Australia, 2013/9/25-2013/9/27
Jun Jiang
;
Meining Nie
;
Purui Su
;
Dengguo Feng
  |  
bind your phone number with caution: automated user profiling through address book matching on smartphone
[会议论文]
8th ACM SIGSAC Symposium on Information, Computer and Communications Security, ASIA CCS 2013, Hangzhou, China, May 8, 2013 - May 10, 2013
Cheng Yao
;
Ying Lingyun
;
Jiao Sibei
;
Su Purui
;
Feng Dengguo
improved key recovery attacks on reduced-round salsa20 and chacha
[会议论文]
15th International Conference on Information Security and Cryptology, ICISC 2012, Seoul, Korea, Republic of, November 28, 2012 - November 30, 2012
Shi Zhenqing
;
Zhang Bin
;
Feng Dengguo
;
Wu Wenling
fully secure attribute-based systems with short ciphertexts/signatures and threshold access structures
[会议论文]
Cryptographers' Track at the RSA Conference 2013, CT-RSA 2013, San Francisco, CA, United states, February 25, 2013 - March 1, 2013
Chen Cheng
;
Chen Jie
;
Lim Hoon Wei
;
Zhang Zhenfeng
;
Feng Dengguo
;
Ling San
;
Wang Huaxiong
efficient identity-based strong designated verifier signature schemes
[期刊论文]
Security and Communication Networks, 2013-01-01, 卷号: 6, 期号: 7, 页码: 902-911
Duan Meijiao
;
Xu Jing
;
Feng Dengguo
a secure and efficient revocation scheme for fine-grained access control in cloud storage
[会议论文]
2012 4th IEEE International Conference on Cloud Computing Technology and Science, CloudCom 2012, Taipei, Taiwan, December 3, 2012 - December 6, 2012
Lv Zhiquan
;
Hong Cheng
;
Zhang Min
;
Feng Dengguo
an attribute based encryption scheme with fine-grained attribute revocation
[会议论文]
2012 IEEE Global Communications Conference, GLOBECOM 2012, Anaheim, CA, United states, December 3, 2012 - December 7, 2012
Li Qiang
;
Feng Dengguo
;
Zhang Liwu
benchmarking for steganography by kernel fisher discriminant criterion
[会议论文]
7th China International Conference on Information Security and Cryptography, Inscrypt 2011, Beijing, China, November 30, 2011 - December 3, 2011
Huang Wei
;
Zhao Xianfeng
;
Feng Dengguo
;
Sheng Rennong
a real-time key recovery attack on the lightweight stream cipher a2u2
[会议论文]
11th International Conference on Cryptology and Network Security, CANS 2012, Darmstadt, Germany, December 12, 2012 - December 14, 2012
Shi Zhenqing
;
Feng Xiutao
;
Feng Dengguo
;
Wu Chuankun
tsd: a flexible root of trust for the cloud
[会议论文]
11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012, Liverpool, United kingdom, June 25, 2012 - June 27, 2012
Chang Dexian
;
Chu Xiaobo
;
Qin Yu
;
Feng Dengguo
previous
1
2
3
4
5
6
7
next
Copyright © 2007-2021
中国科学院软件研究所
-
Feedback
Powered by
CSpace