中国科学院软件研究所机构知识库
Advanced  
ISCAS OpenIR

Search Results

Help

Item hits: (Results 1-10 of 83)

Filters    
Items/Page:    Sort:
Automated proof for authorization protocols of TPM 2.0 in computational model [会议论文]
10th International Conference on Information Security Practice and Experience, ISPEC 2014, Fuzhou, China, May 5, 2014 - May 8, 2014
Wang, Weijin (1); Qin, Yu (1); Feng, Dengguo (1)

 
ExBLACR: Extending BLACR system [会议论文]
19th Australasian Conference on Information Security and Privacy, ACISP 2014, Wollongong, NSW, Australia, July 7, 2014 - July 9, 2014
Wang, Weijin (1); Feng, Dengguo (1); Qin, Yu (1); Shao, Jianxiong (1); Xi, Li (1); Chu, Xiaobo (1)

 
DAA-related APIs in TPM 2.0 revisited [会议论文]
7th International Conference on Trust and Trustworthy Computing, TRUST 2014, Heraklion, Crete, Greece, June 30, 2014 - July 2, 2014
Xi, Li (1); Yang, Kang (1); Zhang, Zhenfeng (1); Feng, Dengguo (1)

 
A Novel privacy-preserving group matching scheme in social networks [会议论文]
15th International Conference on Web-Age Information Management, WAIM 2014, Macau, China, June 16, 2014 - June 18, 2014
Chi, Jialin (1); Lv, Zhiquan (1); Zhang, Min (1); Li, Hao (1); Hong, Cheng (1); Feng, Dengguo (1)

 
Optimal defense strategies for DDoS defender using Bayesian game model [会议论文]
9th International Conference on Information Security Practice and Experience, ISPEC 2013, Lanzhou, China, May 12, 2013 - May 14, 2013
Liu, Yuling (1); Feng, Dengguo (1); Lian, Yifeng (1); Chen, Kai (2); Zhang, Yingjun (1)

 
TEEM: A user-oriented trusted mobile device for multi-platform security applications [会议论文]
6th International Conference on Trust and Trustworthy Computing, TRUST 2013, London, United kingdom, June 17, 2013 - June 19, 2013
Feng, Wei (1); Feng, Dengguo (1); Wei, Ge (2); Qin, Yu (1); Zhang, Qianying (1); Chang, Dexian (1)

 
Type-based analysis of protected storage in the TPM [会议论文]
15th International Conference on Information and Communications Security, ICICS 2013, Beijing, China, November 20, 2013 - November 22, 2013
Shao, Jianxiong (1); Feng, Dengguo (1); Qin, Yu (1)

 
Cryptanalysis of Helix and Phelix revisited [会议论文]
18th Australasian Conference on Information Security and Privacy, ACISP 2013, Brisbane, QLD, Australia, July 1, 2013 - July 3, 2013
Shi, Zhenqing (1); Zhang, Bin (2); Feng, Dengguo (1)

 
On the security of an efficient attribute-based signature [会议论文]
7th International Conference on Network and System Security, NSS 2013, Madrid, Spain, June 3, 2013 - June 4, 2013
Zhang, Yan (1); Feng, Dengguo (1); Zhang, Zhengfeng (1); Zhang, Liwu (1)

 
VCCBox: Practical Confinement of Untrusted Software in Virtual Cloud Computing [会议论文]
ICST International Conference on Security and Privacy in Communication Networks, Sydney, Australia, 2013/9/25-2013/9/27
Jun Jiang; Meining Nie; Purui Su; Dengguo Feng
  |  
 

1 2 3 4 5 6 7 8 9 next

 

Valid XHTML 1.0!
Copyright © 2007-2021  中国科学院软件研究所 - Feedback
Powered by CSpace