中国科学院软件研究所机构知识库
Advanced  
ISCAS OpenIR

Search Results

Help

Item hits: (Results 41-50 of 124)

Items/Page:    Sort:
a drtm-based method for trusted network connection [会议论文]
10th IEEE Int. Conf. on Trust, Security and Privacy in Computing and Communications, TrustCom 2011, 8th IEEE Int. Conf. on Embedded Software and Systems, ICESS 2011, 6th Int. Conf. on Frontier of Computer Science and Technology, FCST 2011, Changsha, China, November 1
Feng Wei; Qin Yu; Yu Ai-Min; Feng Dengguo

 
network traffic monitoring, analysis and anomaly detection [guest editorial] [期刊论文]
IEEE Network, 2011-01-01, 卷号: 25, 期号: 3, 页码: 4-7
Wang Wei; Zhang Xiangliang; Shi Wenchang; Lian Shiguo; Feng Dengguo

 
improved multi-pass fast correlation attacks with applications [期刊论文]
SCIENCE CHINA-INFORMATION SCIENCES, 2011-01-01, 卷号: 54, 期号: 8, 页码: 1635-1644
Zhang Bin; Feng DengGuo

 
on guess and determine analysis of rabbit [期刊论文]
INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, 2011-01-01, 卷号: 22, 期号: 6, 页码: 1283-1296
Feng Xiutao; Shi Zhenqing; Wu Chuankun; Feng Dengguo

 
depsim: a dependency-based malware similarity comparison system [会议论文]
6th China International Conference on Information Security and Cryptology, Inscrypt 2010, Shanghai, China, 20-Oct
Yi Yang; Lingyun Ying; Rui Wang; Purui Su; Dengguo Feng
  |  
 
an efficient pba protocol based on elliptic curves [会议论文]
2011 IEEE 3rd International Conference on Communication Software and Networks, ICCSN 2011, Xi'an, China, 27-May-20
Chu Xiaobo; Qin Yu; Feng Dengguo
  |  
 
efficient ciphertext policy attribute-based encryption with constant-size ciphertext and constant computation-cost [会议论文]
5th International Conference on Provable Security, ProvSec 2011, Xi'an, China, 16-Oct
Chen Cheng; Zhang Zhenfeng; Feng Dengguo
  |  
 
loiss: a byte-oriented stream cipher [会议论文]
3rd International Workshop on Coding and Cryptology, IWCC 2011, Qingdao, China, 30-May-20
Feng Dengguo; Feng Xiutao; Zhang Wentao; Fan Xiubin; Wu Chuankun
  |  
 
how to characterize side-channel leakages more accurately? [会议论文]
7th International Conference on Information Security Practice and Experience, ISPEC 2011, Guangzhou, China, 30-May-20
Liu Jiye; Zhou Yongbin; Han Yang; Li Jiantang; Yang Shuguo; Feng Dengguo
  |  
 
hyper-sbox view of aes-like permutations: a generalized distinguisher [会议论文]
6th China International Conference on Information Security and Cryptology, Inscrypt 2010, Shanghai, China, 20-Oct
Wu Shuang; Feng Dengguo; Wu Wenling; Su Bozhan
  |  
 

previous 1 2 3 4 5 6 7 8 9 10 11 12 13 next

 

Valid XHTML 1.0!
Copyright © 2007-2021  中国科学院软件研究所 - Feedback
Powered by CSpace