中国科学院软件研究所机构知识库
Advanced  
ISCAS OpenIR

Search Results

Help

Item hits: (Results 41-50 of 63)

Filters    
Items/Page:    Sort:
loiss: a byte-oriented stream cipher [会议论文]
3rd International Workshop on Coding and Cryptology, IWCC 2011, Qingdao, China, 30-May-20
Feng Dengguo; Feng Xiutao; Zhang Wentao; Fan Xiubin; Wu Chuankun
  |  
 
how to characterize side-channel leakages more accurately? [会议论文]
7th International Conference on Information Security Practice and Experience, ISPEC 2011, Guangzhou, China, 30-May-20
Liu Jiye; Zhou Yongbin; Han Yang; Li Jiantang; Yang Shuguo; Feng Dengguo
  |  
 
video steganography with perturbed motion estimation [会议论文]
13th International Conference on Information Hiding, IH 2011, Prague, Czech republic, 18-May-20
Cao Yun; Zhao Xianfeng; Feng Dengguo; Sheng Rennong
  |  
 
the weight enumerator of a class of cyclic codes [期刊论文]
IEEE Transactions on Information Theory, 2011-01-01, 卷号: 57, 期号: 1, 页码: 397-402
Ma Changli; Zeng Liwei; Liu Yang; Feng Dengguo; Ding Cunsheng
  |  
 
privacy preserving of trust management credentials based on trusted computing [会议论文]
6th International Conference on Information Security Practice and Experience, ISPEC 2010, Seoul, Korea, Republic of, 43963
Wu Bin; Feng Dengguo; Duan Meijiao
  |  
 
attribute-based conditional proxy re-encryption with chosen-ciphertext security [会议论文]
53rd IEEE Global Communications Conference, GLOBECOM 2010, Miami, FL, United states, 40883
Zhao Jing; Feng Dengguo; Zhang Zhenfeng
  |  
 
a language for secure requirement description based on information flow [会议论文]
2010 IEEE International Conference on Intelligent Computing and Intelligent Systems, ICIS 2010, Xiamen, China, 40845
Cheng Liang; Zhang Yang; Feng Dengguo
  |  
 
an enhanced password authenticated key agreement protocol for wireless mobile network [会议论文]
5th International Conference on Information Security and Cryptology, Inscrypt 2009, Beijing, China, 40878
Gao Zhigang; Feng Dengguo
  |  
 
a byte-based guess and determine attack on sosemanuk [会议论文]
16th Annual International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2010, Singapore, Singapore, 40882
Feng Xiutao; Liu Jun; Zhou Zhaocun; Wu Chuankun; Feng Dengguo
  |  
 
a security function test suite generation method based on security policy model [期刊论文]
Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2009-01-01, 卷号: 46, 期号: 10, 页码: 1686-1692
Zhang Min; Feng Dengguo; Chen Chi

 

previous 1 2 3 4 5 6 7 next

 

Valid XHTML 1.0!
Copyright © 2007-2021  中国科学院软件研究所 - Feedback
Powered by CSpace