中国科学院软件研究所机构知识库
Advanced  
ISCAS OpenIR

Search Results

Help

Item hits: (Results 31-40 of 83)

Filters    
Items/Page:    Sort:
depsim: a dependency-based malware similarity comparison system [会议论文]
6th China International Conference on Information Security and Cryptology, Inscrypt 2010, Shanghai, China, 20-Oct
Yi Yang; Lingyun Ying; Rui Wang; Purui Su; Dengguo Feng
  |  
 
an efficient pba protocol based on elliptic curves [会议论文]
2011 IEEE 3rd International Conference on Communication Software and Networks, ICCSN 2011, Xi'an, China, 27-May-20
Chu Xiaobo; Qin Yu; Feng Dengguo
  |  
 
efficient ciphertext policy attribute-based encryption with constant-size ciphertext and constant computation-cost [会议论文]
5th International Conference on Provable Security, ProvSec 2011, Xi'an, China, 16-Oct
Chen Cheng; Zhang Zhenfeng; Feng Dengguo
  |  
 
loiss: a byte-oriented stream cipher [会议论文]
3rd International Workshop on Coding and Cryptology, IWCC 2011, Qingdao, China, 30-May-20
Feng Dengguo; Feng Xiutao; Zhang Wentao; Fan Xiubin; Wu Chuankun
  |  
 
how to characterize side-channel leakages more accurately? [会议论文]
7th International Conference on Information Security Practice and Experience, ISPEC 2011, Guangzhou, China, 30-May-20
Liu Jiye; Zhou Yongbin; Han Yang; Li Jiantang; Yang Shuguo; Feng Dengguo
  |  
 
hyper-sbox view of aes-like permutations: a generalized distinguisher [会议论文]
6th China International Conference on Information Security and Cryptology, Inscrypt 2010, Shanghai, China, 20-Oct
Wu Shuang; Feng Dengguo; Wu Wenling; Su Bozhan
  |  
 
video steganography with perturbed motion estimation [会议论文]
13th International Conference on Information Hiding, IH 2011, Prague, Czech republic, 18-May-20
Cao Yun; Zhao Xianfeng; Feng Dengguo; Sheng Rennong
  |  
 
practical rebound attack on 12-round cheetah-256 [会议论文]
12th International Conference on Information Security and Cryptology, Seoul, SOUTH KOREA, DEC 02-04,
Wu Shuang; Feng Dengguo; Wu Wenling
  |  
 
privacy preserving of trust management credentials based on trusted computing [会议论文]
6th International Conference on Information Security Practice and Experience, ISPEC 2010, Seoul, Korea, Republic of, 43963
Wu Bin; Feng Dengguo; Duan Meijiao
  |  
 
fine-grained cloud db damage examination based on bloom filters [会议论文]
11th International Conference on Web-Age Information Management (WAIM 2010), Jiuzhaigou, PEOPLES R CHINA, JUL 15-17,
Zhang Min; Cai Ke; Feng Dengguo
  |  
 

previous 1 2 3 4 5 6 7 8 9 next

 

Valid XHTML 1.0!
Copyright © 2007-2021  中国科学院软件研究所 - Feedback
Powered by CSpace