中国科学院软件研究所机构知识库
Log In
Register
Email:
Passwd
验 证:
换一张
Have you forgotten your password?
Stay signed in
Log In
ALL
Title
Author
Keyword
Sponsors
Type
Publication date
Submitted Time
Subject
Conference Name
Source
Categories
KOS Subject
Advisor
ORCID
Advanced
在结果中检索
Communities
Subjects
All Items
Community
信息安全国家重点实... [51]
软件所图书馆 [32]
作者
Content Type
会议论文 [83]
Issued Date
Language
英语 [37]
Source
lecture n... [39]
globecom -... [2]
proceeding... [2]
proceeding... [2]
proceeding... [2]
更多...
Project
Indexed
EI [48]
SCI [5]
CPCI(ISTP) [2]
CPCI [1]
ISTP [1]
更多...
Spnsorship
china comp... [2]
chinese ac... [2]
ieee infor... [2]
ieee; ieee... [2]
inst infoc... [2]
更多...
ISCAS OpenIR
Search Results
Help
Item hits:
(Results 21-30 of 83)
Filters
Content Type:会议论文
Items/Page:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
Sort:
Select
Submitted Time Ascending
Submitted Time Descending
Title Ascending
Title Descending
Author Ascending
Author Descending
Issue Date Ascending
Issue Date Descending
fully secure doubly-spatial encryption under simple assumptions
[会议论文]
6th International Conference on Provable Security, ProvSec 2012, Chengdu, China, September 26, 2012 - September 28, 2012
Chen Cheng
;
Zhang Zhenfeng
;
Feng Dengguo
extending higher-order integral: an efficient unified algorithm of constructing integral distinguishers for block ciphers
[会议论文]
10th International Conference on Applied Cryptography and Network Security, ACNS 2012, Singapore, Singapore, June 26, 2012 - June 29, 2012
Zhang Wentao
;
Su Bozhan
;
Wu Wenling
;
Feng Dengguo
;
Wu Chuankun
an efficient leakage characterization method for profiled power analysis attacks
[会议论文]
14th International Conference on Information Security and Cryptology, ICISC 2011, Seoul, Korea, Republic of, November 30, 2011 - December 2, 2011
Zhang Hailong
;
Zhou Yongbin
;
Feng Dengguo
daa protocol analysis and verification
[会议论文]
3rd International Conference on Trusted Systems, INTRUST 2011, Beijing, China, November 27, 2011 - November 29, 2011
Qin Yu
;
Chu Xiaobo
;
Feng Dengguo
;
Feng Wei
(pseudo) preimage attack on round-reduced grstl hash function and others
[会议论文]
19th International Workshop on Fast Software Encryption, FSE 2012, Washington, DC, United states, March 19, 2012 - March 21, 2012
Wu Shuang
;
Feng Dengguo
;
Wu Wenling
;
Guo Jian
;
Dong Le
;
Zou Jian
combined public-key schemes: the case of abe and abs
[会议论文]
6th International Conference on Provable Security, ProvSec 2012, Chengdu, China, September 26, 2012 - September 28, 2012
Chen Cheng
;
Chen Jie
;
Lim Hoon Wei
;
Zhang Zhenfeng
;
Feng Dengguo
HyperCrop: A Hypervisor-Based Countermeasure for Return Oriented Programming
[会议论文]
International Conference on Information and Communications Security, Friendship Hotel, Haidian District, Beijing, China, 2011/11/23-2011/11/26
Jun Jiang
;
Xiaoqi Jia
;
Dengguo Feng
;
Shengzhi Zhang
;
Peng Liu
  |  
towards attribute revocation in key-policy attribute based encryption
[会议论文]
10th International Conference on Cryptography and Network Security, CANS 2011, Sanya, China, December 1
Wang Pengpian
;
Feng Dengguo
;
Zhang Liwu
comments on the sm2 key exchange protocol
[会议论文]
10th International Conference on Cryptography and Network Security, CANS 2011, Sanya, China, December 1
Xu Jing
;
Feng Dengguo
a drtm-based method for trusted network connection
[会议论文]
10th IEEE Int. Conf. on Trust, Security and Privacy in Computing and Communications, TrustCom 2011, 8th IEEE Int. Conf. on Embedded Software and Systems, ICESS 2011, 6th Int. Conf. on Frontier of Computer Science and Technology, FCST 2011, Changsha, China, November 1
Feng Wei
;
Qin Yu
;
Yu Ai-Min
;
Feng Dengguo
previous
1
2
3
4
5
6
7
8
9
next
Copyright © 2007-2021
中国科学院软件研究所
-
Feedback
Powered by
CSpace