中国科学院软件研究所机构知识库
Log In
Register
Email:
Passwd
验 证:
换一张
Have you forgotten your password?
Stay signed in
Log In
ALL
Title
Author
Keyword
Sponsors
Type
Publication date
Submitted Time
Subject
Conference Name
Source
Categories
KOS Subject
Advisor
ORCID
Advanced
在结果中检索
Communities
Subjects
All Items
Community
信息安全国家重点实... [78]
软件所图书馆 [46]
作者
Content Type
会议论文 [83]
期刊论文 [41]
Issued Date
Language
英语 [56]
中文 [2]
Source
lecture n... [39]
chinese jo... [5]
ieee trans... [5]
science ch... [5]
science in... [5]
更多...
Project
descriptio... [2]
Indexed
EI [63]
SCI [26]
SCI,EI [3]
CPCI(ISTP) [2]
SCI,SPRING... [2]
更多...
Spnsorship
ieee compu... [7]
china comp... [2]
chinese ac... [2]
ieee infor... [2]
ieee; ieee... [2]
更多...
ISCAS OpenIR
Search Results
Help
Item hits:
(Results 51-60 of 124)
Items/Page:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
Sort:
Select
Submitted Time Ascending
Submitted Time Descending
Title Ascending
Title Descending
Author Ascending
Author Descending
Issue Date Ascending
Issue Date Descending
video steganography with perturbed motion estimation
[会议论文]
13th International Conference on Information Hiding, IH 2011, Prague, Czech republic, 18-May-20
Cao Yun
;
Zhao Xianfeng
;
Feng Dengguo
;
Sheng Rennong
  |  
the weight enumerator of a class of cyclic codes
[期刊论文]
IEEE Transactions on Information Theory, 2011-01-01, 卷号: 57, 期号: 1, 页码: 397-402
Ma Changli
;
Zeng Liwei
;
Liu Yang
;
Feng Dengguo
;
Ding Cunsheng
  |  
security model and modular design of fair authentication key exchange protocols
[期刊论文]
SCIENCE CHINA-INFORMATION SCIENCES, 2010-01-01, 卷号: 53, 期号: 2, 页码: 278-287
Feng DengGuo
;
Chen WeiDong
  |  
on constant-round zero-knowledge proofs of knowledge for np-relations
[期刊论文]
SCIENCE CHINA-INFORMATION SCIENCES, 2010-01-01, 卷号: 53, 期号: 4, 页码: 788-799
Li HongDa
;
Xu HaiXia
;
Li Bao
;
Feng DengGuo
  |  
a property-based attestation protocol for tcm
[期刊论文]
SCIENCE CHINA-INFORMATION SCIENCES, 2010-01-01, 卷号: 53, 期号: 3, 页码: 454-464
Feng DengGuo
;
Qin Yu
  |  
practical rebound attack on 12-round cheetah-256
[会议论文]
12th International Conference on Information Security and Cryptology, Seoul, SOUTH KOREA, DEC 02-04,
Wu Shuang
;
Feng Dengguo
;
Wu Wenling
  |  
privacy preserving of trust management credentials based on trusted computing
[会议论文]
6th International Conference on Information Security Practice and Experience, ISPEC 2010, Seoul, Korea, Republic of, 43963
Wu Bin
;
Feng Dengguo
;
Duan Meijiao
  |  
fine-grained cloud db damage examination based on bloom filters
[会议论文]
11th International Conference on Web-Age Information Management (WAIM 2010), Jiuzhaigou, PEOPLES R CHINA, JUL 15-17,
Zhang Min
;
Cai Ke
;
Feng Dengguo
  |  
attribute-based conditional proxy re-encryption with chosen-ciphertext security
[会议论文]
53rd IEEE Global Communications Conference, GLOBECOM 2010, Miami, FL, United states, 40883
Zhao Jing
;
Feng Dengguo
;
Zhang Zhenfeng
  |  
a language for secure requirement description based on information flow
[会议论文]
2010 IEEE International Conference on Intelligent Computing and Intelligent Systems, ICIS 2010, Xiamen, China, 40845
Cheng Liang
;
Zhang Yang
;
Feng Dengguo
  |  
previous
1
2
3
4
5
6
7
8
9
10
11
12
13
next
Copyright © 2007-2021
中国科学院软件研究所
-
Feedback
Powered by
CSpace