中国科学院软件研究所机构知识库
Log In
Register
Email:
Passwd
验 证:
换一张
Have you forgotten your password?
Stay signed in
Log In
ALL
Title
Author
Keyword
Sponsors
Type
Publication date
Submitted Time
Subject
Conference Name
Source
Categories
KOS Subject
Advisor
ORCID
Advanced
在结果中检索
Communities
Subjects
All Items
Community
软件所图书馆 [32]
作者
Content Type
会议论文 [32]
Issued Date
2014 [4]
2013 [8]
2012 [13]
2011 [3]
Language
英语 [32]
Source
lecture n... [15]
asia ccs 2... [1]
cloudcom 2... [1]
globecom -... [1]
proc. 10th... [1]
更多...
Project
Indexed
EI [31]
CPCI [1]
ISTP [1]
SCI [1]
Spnsorship
national n... [2]
university... [2]
acm sigsac... [1]
adnovum [1]
beijing in... [1]
更多...
ISCAS OpenIR
Search Results
Help
Item hits:
(Results 1-10 of 32)
Filters
Content Type:会议论文
Community:软件所图书馆
Items/Page:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
Sort:
Select
Submitted Time Ascending
Submitted Time Descending
Title Ascending
Title Descending
Author Ascending
Author Descending
Issue Date Ascending
Issue Date Descending
Automated proof for authorization protocols of TPM 2.0 in computational model
[会议论文]
10th International Conference on Information Security Practice and Experience, ISPEC 2014, Fuzhou, China, May 5, 2014 - May 8, 2014
Wang, Weijin (1)
;
Qin, Yu (1)
;
Feng, Dengguo (1)
ExBLACR: Extending BLACR system
[会议论文]
19th Australasian Conference on Information Security and Privacy, ACISP 2014, Wollongong, NSW, Australia, July 7, 2014 - July 9, 2014
Wang, Weijin (1)
;
Feng, Dengguo (1)
;
Qin, Yu (1)
;
Shao, Jianxiong (1)
;
Xi, Li (1)
;
Chu, Xiaobo (1)
DAA-related APIs in TPM 2.0 revisited
[会议论文]
7th International Conference on Trust and Trustworthy Computing, TRUST 2014, Heraklion, Crete, Greece, June 30, 2014 - July 2, 2014
Xi, Li (1)
;
Yang, Kang (1)
;
Zhang, Zhenfeng (1)
;
Feng, Dengguo (1)
A Novel privacy-preserving group matching scheme in social networks
[会议论文]
15th International Conference on Web-Age Information Management, WAIM 2014, Macau, China, June 16, 2014 - June 18, 2014
Chi, Jialin (1)
;
Lv, Zhiquan (1)
;
Zhang, Min (1)
;
Li, Hao (1)
;
Hong, Cheng (1)
;
Feng, Dengguo (1)
Optimal defense strategies for DDoS defender using Bayesian game model
[会议论文]
9th International Conference on Information Security Practice and Experience, ISPEC 2013, Lanzhou, China, May 12, 2013 - May 14, 2013
Liu, Yuling (1)
;
Feng, Dengguo (1)
;
Lian, Yifeng (1)
;
Chen, Kai (2)
;
Zhang, Yingjun (1)
TEEM: A user-oriented trusted mobile device for multi-platform security applications
[会议论文]
6th International Conference on Trust and Trustworthy Computing, TRUST 2013, London, United kingdom, June 17, 2013 - June 19, 2013
Feng, Wei (1)
;
Feng, Dengguo (1)
;
Wei, Ge (2)
;
Qin, Yu (1)
;
Zhang, Qianying (1)
;
Chang, Dexian (1)
Type-based analysis of protected storage in the TPM
[会议论文]
15th International Conference on Information and Communications Security, ICICS 2013, Beijing, China, November 20, 2013 - November 22, 2013
Shao, Jianxiong (1)
;
Feng, Dengguo (1)
;
Qin, Yu (1)
Cryptanalysis of Helix and Phelix revisited
[会议论文]
18th Australasian Conference on Information Security and Privacy, ACISP 2013, Brisbane, QLD, Australia, July 1, 2013 - July 3, 2013
Shi, Zhenqing (1)
;
Zhang, Bin (2)
;
Feng, Dengguo (1)
On the security of an efficient attribute-based signature
[会议论文]
7th International Conference on Network and System Security, NSS 2013, Madrid, Spain, June 3, 2013 - June 4, 2013
Zhang, Yan (1)
;
Feng, Dengguo (1)
;
Zhang, Zhengfeng (1)
;
Zhang, Liwu (1)
bind your phone number with caution: automated user profiling through address book matching on smartphone
[会议论文]
8th ACM SIGSAC Symposium on Information, Computer and Communications Security, ASIA CCS 2013, Hangzhou, China, May 8, 2013 - May 10, 2013
Cheng Yao
;
Ying Lingyun
;
Jiao Sibei
;
Su Purui
;
Feng Dengguo
1
2
3
4
next
Copyright © 2007-2021
中国科学院软件研究所
-
Feedback
Powered by
CSpace