中国科学院软件研究所机构知识库
Log In
Register
Email:
Passwd
验 证:
换一张
Have you forgotten your password?
Stay signed in
Log In
ALL
Title
Author
Keyword
Sponsors
Type
Publication date
Submitted Time
Subject
Conference Name
Source
Categories
KOS Subject
Advisor
ORCID
Advanced
在结果中检索
Communities
Subjects
All Items
Community
软件所图书馆 [9]
计算机科学国家重点实... [3]
信息安全国家重点实验... [2]
作者
Content Type
会议论文 [11]
期刊论文 [3]
Issued Date
Language
英语 [8]
中文 [1]
Source
lecture no... [3]
informatio... [1]
mathematic... [1]
proceeding... [1]
proceeding... [1]
更多...
Project
Indexed
EI [14]
Spnsorship
assoc. com... [1]
ieee compu... [1]
ieee relia... [1]
internatio... [1]
the nation... [1]
更多...
ISCAS OpenIR
Search Results
Help
Item hits:
(Results 1-10 of 14)
Filters
Indexed:EI
Items/Page:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
Sort:
Select
Submitted Time Ascending
Submitted Time Descending
Author Ascending
Author Descending
Title Ascending
Title Descending
Issue Date Ascending
Issue Date Descending
LSG: A unified multi-dimensional latent semantic graph for personal information retrieval
[会议论文]
15th International Conference on Web-Age Information Management, WAIM 2014, Macau, China, June 16, 2014 - June 18, 2014
Huangfu, Yang (1)
;
Liu, Kuien (1)
;
Zhang, Wen (1)
;
Zhou, Peng (1)
;
Wu, Yanjun (1)
;
Wang, Qing (1)
;
Zhu, Jia (4)
Multi-resolution shadow mapping using CUDA rasterizer
[会议论文]
13th International Conference on Computer-Aided Design and Computer Graphics, CAD/Graphics 2013, Hong Kong, China, November 16, 2013 - November 18, 2013
Huang, Peng (1)
;
Liu, Xuehui (2)
;
Wu, Enhua (2)
Attacking and fixing the CS mode
[会议论文]
15th International Conference on Information and Communications Security, ICICS 2013, Beijing, China, November 20, 2013 - November 22, 2013
Sui, Han (1)
;
Wu, Wenling (1)
;
Zhang, Liting (1)
;
Wang, Peng (2)
3kf9: enhancing 3gpp-mac beyond the birthday bound
[会议论文]
18th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2012, Beijing, China, December 2, 2012 - December 6, 2012
Zhang Liting
;
Wu Wenling
;
Sui Han
;
Wang Peng
virtual machine replay update: improved implementation for modern hardware architecture
[会议论文]
2012 IEEE 6th International Conference on Software Security and Reliability Companion, SERE-C 2012, Gaithersburg, MD, United states, June 20, 2012 - June 22, 2012
Yu Jiageng
;
Zhou Peng
;
Wu Yanjun
;
Zhao Chen
deterministic replay of multithread applications using virtual machine
[会议论文]
26th IEEE International Conference on Advanced Information Networking and Applications Workshops, WAINA 2012, Fukuoka, Japan, March 26, 2012 - March 29, 2012
Yu Jiageng
;
Ci Yiwei
;
Zhou Peng
;
Wu Yanjun
;
Zhao Chen
cp-abe scheme supporting fully fine-grained attribute revocation
[期刊论文]
Ruan Jian Xue Bao/Journal of Software, 2012-01-01, 卷号: 23, 期号: 10, 页码: 2805-2816
Wang Peng-Pian
;
Feng Deng-Guo
;
Zhang Li-Wu
hybrid algorithms for hardware/software partitioning and scheduling on reconfigurable devices
[期刊论文]
Mathematical and Computer Modelling, 2012-01-01, 页码: -
Liu Peng
;
Wu Jigang
;
Wang Yongji
trcbc: another look at cbc-mac
[期刊论文]
Information Processing Letters, 2012-01-01, 卷号: 112, 期号: 7, 页码: 302-307
Zhang Liting
;
Wu Wenling
;
Wang Peng
;
Liang Bo
  |  
polye+ctr: a swiss-army-knife mode for block ciphers
[会议论文]
5th International Conference on Provable Security, ProvSec 2011, Xi'an, China, 16-Oct
Zhang Liting
;
Wu Wenling
;
Wang Peng
  |  
1
2
next
Copyright © 2007-2022
中国科学院软件研究所
-
Feedback
Powered by
CSpace