中国科学院软件研究所机构知识库
Advanced  
ISCAS OpenIR

Search Results

Help

Item hits: (Results 1-7 of 7)

Filters    
Items/Page:    Sort:
prevent kernel return-oriented programming attacks using hardware virtualization [会议论文]
8th International Conference on Information Security Practice and Experience, ISPEC 2012, Hangzhou, China, April 9, 2012 - April 12, 2012
Tian Shuo; He Yeping; Ding Baozeng

 
trusted subjects configuration based on te model in mls systems [会议论文]
2nd International Conference on Trusted Systems, INTRUST 2010, Beijing, China, December 1
Li Shangjie; He Yeping

 
separation of duty in trust-based collaboration [会议论文]
4th International Conference on Information Security and Cryptology (Inscript 2008), Beijing, PEOPLES R CHINA, DEC 14-17,
Deng Lingli; He Yeping; Xu Ziyao
  |  
 
an integrity assurance mechanism for run-time programs [会议论文]
4th International Conference on Information Security and Cryptology (Inscript 2008), Beijing, PEOPLES R CHINA, DEC 14-17,
Xu Ziyao; He Yeping; Deng Lingli
  |  
 
combating index poisoning in p2p file sharing [会议论文]
3rd International Conference on Information Security and Assurance, Seoul, SOUTH KOREA, JUN 25-27,
Deng Lingli; He Yeping; Xu Ziyao
  |  
 
static analysis of a class of memory leaks in trustedbsd mac framework [会议论文]
5th International Conference on Information Security Practice and Experience, Xi an, PEOPLES R CHINA, APR 13-15,
Wu Xinsong; Zhou Zhouyi; He Yeping; Liang Hongliang

 
trusted reputation management service for peer-to-peer collaboration [会议论文]
On the Move Confederated International Conference and Workshops, Monterrey, MEXICO, NOV 09-14,
Deng Lingli; He Yeping; Xu Ziyao
  |  
 

1

 

Valid XHTML 1.0!
Copyright © 2007-2019  中国科学院软件研究所 - Feedback
Powered by CSpace