中国科学院软件研究所机构知识库
Log In
Register
Email:
Passwd
验 证:
换一张
Have you forgotten your password?
Stay signed in
Log In
ALL
Title
Author
Keyword
Sponsors
Type
Publication date
Submitted Time
Subject
Conference Name
Source
Categories
KOS Subject
Advisor
ORCID
Advanced
在结果中检索
Communities
Subjects
All Items
Community
信息安全国家重点实... [78]
作者
Content Type
会议论文 [51]
期刊论文 [27]
Issued Date
Language
英语 [10]
中文 [2]
Source
lecture n... [24]
ieee trans... [5]
science in... [5]
chinese jo... [4]
science ch... [3]
更多...
Project
descriptio... [2]
Indexed
EI [25]
SCI [17]
SCI,EI [3]
CPCI(ISTP) [2]
SCI,SPRING... [2]
更多...
Spnsorship
ieee compu... [6]
china comp... [2]
chinese ac... [2]
ieee infor... [2]
ieee; ieee... [2]
更多...
ISCAS OpenIR
Search Results
Help
Item hits:
(Results 1-10 of 78)
Filters
Community:信息安全国家重点实验室
Items/Page:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
Sort:
Select
Submitted Time Ascending
Submitted Time Descending
Title Ascending
Title Descending
Author Ascending
Author Descending
Issue Date Ascending
Issue Date Descending
VCCBox: Practical Confinement of Untrusted Software in Virtual Cloud Computing
[会议论文]
ICST International Conference on Security and Privacy in Communication Networks, Sydney, Australia, 2013/9/25-2013/9/27
Jun Jiang
;
Meining Nie
;
Purui Su
;
Dengguo Feng
  |  
HyperCrop: A Hypervisor-Based Countermeasure for Return Oriented Programming
[会议论文]
International Conference on Information and Communications Security, Friendship Hotel, Haidian District, Beijing, China, 2011/11/23-2011/11/26
Jun Jiang
;
Xiaoqi Jia
;
Dengguo Feng
;
Shengzhi Zhang
;
Peng Liu
  |  
depsim: a dependency-based malware similarity comparison system
[会议论文]
6th China International Conference on Information Security and Cryptology, Inscrypt 2010, Shanghai, China, 20-Oct
Yi Yang
;
Lingyun Ying
;
Rui Wang
;
Purui Su
;
Dengguo Feng
  |  
an efficient pba protocol based on elliptic curves
[会议论文]
2011 IEEE 3rd International Conference on Communication Software and Networks, ICCSN 2011, Xi'an, China, 27-May-20
Chu Xiaobo
;
Qin Yu
;
Feng Dengguo
  |  
efficient ciphertext policy attribute-based encryption with constant-size ciphertext and constant computation-cost
[会议论文]
5th International Conference on Provable Security, ProvSec 2011, Xi'an, China, 16-Oct
Chen Cheng
;
Zhang Zhenfeng
;
Feng Dengguo
  |  
loiss: a byte-oriented stream cipher
[会议论文]
3rd International Workshop on Coding and Cryptology, IWCC 2011, Qingdao, China, 30-May-20
Feng Dengguo
;
Feng Xiutao
;
Zhang Wentao
;
Fan Xiubin
;
Wu Chuankun
  |  
how to characterize side-channel leakages more accurately?
[会议论文]
7th International Conference on Information Security Practice and Experience, ISPEC 2011, Guangzhou, China, 30-May-20
Liu Jiye
;
Zhou Yongbin
;
Han Yang
;
Li Jiantang
;
Yang Shuguo
;
Feng Dengguo
  |  
hyper-sbox view of aes-like permutations: a generalized distinguisher
[会议论文]
6th China International Conference on Information Security and Cryptology, Inscrypt 2010, Shanghai, China, 20-Oct
Wu Shuang
;
Feng Dengguo
;
Wu Wenling
;
Su Bozhan
  |  
video steganography with perturbed motion estimation
[会议论文]
13th International Conference on Information Hiding, IH 2011, Prague, Czech republic, 18-May-20
Cao Yun
;
Zhao Xianfeng
;
Feng Dengguo
;
Sheng Rennong
  |  
the weight enumerator of a class of cyclic codes
[期刊论文]
IEEE Transactions on Information Theory, 2011-01-01, 卷号: 57, 期号: 1, 页码: 397-402
Ma Changli
;
Zeng Liwei
;
Liu Yang
;
Feng Dengguo
;
Ding Cunsheng
  |  
1
2
3
4
5
6
7
8
next
Copyright © 2007-2021
中国科学院软件研究所
-
Feedback
Powered by
CSpace