中国科学院软件研究所机构知识库
Advanced  
ISCAS OpenIR

Search Results

Help

Item hits: (Results 11-20 of 124)

Items/Page:    Sort:
Type-based analysis of protected storage in the TPM [会议论文]
15th International Conference on Information and Communications Security, ICICS 2013, Beijing, China, November 20, 2013 - November 22, 2013
Shao, Jianxiong (1); Feng, Dengguo (1); Qin, Yu (1)

 
Cryptanalysis of Helix and Phelix revisited [会议论文]
18th Australasian Conference on Information Security and Privacy, ACISP 2013, Brisbane, QLD, Australia, July 1, 2013 - July 3, 2013
Shi, Zhenqing (1); Zhang, Bin (2); Feng, Dengguo (1)

 
On the security of an efficient attribute-based signature [会议论文]
7th International Conference on Network and System Security, NSS 2013, Madrid, Spain, June 3, 2013 - June 4, 2013
Zhang, Yan (1); Feng, Dengguo (1); Zhang, Zhengfeng (1); Zhang, Liwu (1)

 
VCCBox: Practical Confinement of Untrusted Software in Virtual Cloud Computing [会议论文]
ICST International Conference on Security and Privacy in Communication Networks, Sydney, Australia, 2013/9/25-2013/9/27
Jun Jiang; Meining Nie; Purui Su; Dengguo Feng
  |  
 
bind your phone number with caution: automated user profiling through address book matching on smartphone [会议论文]
8th ACM SIGSAC Symposium on Information, Computer and Communications Security, ASIA CCS 2013, Hangzhou, China, May 8, 2013 - May 10, 2013
Cheng Yao; Ying Lingyun; Jiao Sibei; Su Purui; Feng Dengguo

 
improved key recovery attacks on reduced-round salsa20 and chacha [会议论文]
15th International Conference on Information Security and Cryptology, ICISC 2012, Seoul, Korea, Republic of, November 28, 2012 - November 30, 2012
Shi Zhenqing; Zhang Bin; Feng Dengguo; Wu Wenling

 
fully secure attribute-based systems with short ciphertexts/signatures and threshold access structures [会议论文]
Cryptographers' Track at the RSA Conference 2013, CT-RSA 2013, San Francisco, CA, United states, February 25, 2013 - March 1, 2013
Chen Cheng; Chen Jie; Lim Hoon Wei; Zhang Zhenfeng; Feng Dengguo; Ling San; Wang Huaxiong

 
efficient identity-based strong designated verifier signature schemes [期刊论文]
Security and Communication Networks, 2013-01-01, 卷号: 6, 期号: 7, 页码: 902-911
Duan Meijiao; Xu Jing; Feng Dengguo

 
a secure and efficient revocation scheme for fine-grained access control in cloud storage [会议论文]
2012 4th IEEE International Conference on Cloud Computing Technology and Science, CloudCom 2012, Taipei, Taiwan, December 3, 2012 - December 6, 2012
Lv Zhiquan; Hong Cheng; Zhang Min; Feng Dengguo

 
an attribute based encryption scheme with fine-grained attribute revocation [会议论文]
2012 IEEE Global Communications Conference, GLOBECOM 2012, Anaheim, CA, United states, December 3, 2012 - December 7, 2012
Li Qiang; Feng Dengguo; Zhang Liwu

 

previous 1 2 3 4 5 6 7 8 9 10 11 next

 

Valid XHTML 1.0!
Copyright © 2007-2021  中国科学院软件研究所 - Feedback
Powered by CSpace