中国科学院软件研究所机构知识库
Advanced  
ISCAS OpenIR

Search Results

Help

Item hits: (Results 1-10 of 51)

Filters        
Items/Page:    Sort:
VCCBox: Practical Confinement of Untrusted Software in Virtual Cloud Computing [会议论文]
ICST International Conference on Security and Privacy in Communication Networks, Sydney, Australia, 2013/9/25-2013/9/27
Jun Jiang; Meining Nie; Purui Su; Dengguo Feng
  |  
 
HyperCrop: A Hypervisor-Based Countermeasure for Return Oriented Programming [会议论文]
International Conference on Information and Communications Security, Friendship Hotel, Haidian District, Beijing, China, 2011/11/23-2011/11/26
Jun Jiang; Xiaoqi Jia; Dengguo Feng; Shengzhi Zhang; Peng Liu
  |  
 
depsim: a dependency-based malware similarity comparison system [会议论文]
6th China International Conference on Information Security and Cryptology, Inscrypt 2010, Shanghai, China, 20-Oct
Yi Yang; Lingyun Ying; Rui Wang; Purui Su; Dengguo Feng
  |  
 
an efficient pba protocol based on elliptic curves [会议论文]
2011 IEEE 3rd International Conference on Communication Software and Networks, ICCSN 2011, Xi'an, China, 27-May-20
Chu Xiaobo; Qin Yu; Feng Dengguo
  |  
 
efficient ciphertext policy attribute-based encryption with constant-size ciphertext and constant computation-cost [会议论文]
5th International Conference on Provable Security, ProvSec 2011, Xi'an, China, 16-Oct
Chen Cheng; Zhang Zhenfeng; Feng Dengguo
  |  
 
loiss: a byte-oriented stream cipher [会议论文]
3rd International Workshop on Coding and Cryptology, IWCC 2011, Qingdao, China, 30-May-20
Feng Dengguo; Feng Xiutao; Zhang Wentao; Fan Xiubin; Wu Chuankun
  |  
 
how to characterize side-channel leakages more accurately? [会议论文]
7th International Conference on Information Security Practice and Experience, ISPEC 2011, Guangzhou, China, 30-May-20
Liu Jiye; Zhou Yongbin; Han Yang; Li Jiantang; Yang Shuguo; Feng Dengguo
  |  
 
hyper-sbox view of aes-like permutations: a generalized distinguisher [会议论文]
6th China International Conference on Information Security and Cryptology, Inscrypt 2010, Shanghai, China, 20-Oct
Wu Shuang; Feng Dengguo; Wu Wenling; Su Bozhan
  |  
 
video steganography with perturbed motion estimation [会议论文]
13th International Conference on Information Hiding, IH 2011, Prague, Czech republic, 18-May-20
Cao Yun; Zhao Xianfeng; Feng Dengguo; Sheng Rennong
  |  
 
practical rebound attack on 12-round cheetah-256 [会议论文]
12th International Conference on Information Security and Cryptology, Seoul, SOUTH KOREA, DEC 02-04,
Wu Shuang; Feng Dengguo; Wu Wenling
  |  
 

1 2 3 4 5 6 next

 

Valid XHTML 1.0!
Copyright © 2007-2021  中国科学院软件研究所 - Feedback
Powered by CSpace