中国科学院软件研究所机构知识库
Advanced  
ISCAS OpenIR

Search Results

Help

Item hits: (Results 51-60 of 156)

Filters            
Items/Page:    Sort:
security analysis of some threshold signature schemes and multi-signature schemes [会议论文]
1st SKLOIS Conference on Information Security and Cryptology, Beijing, PEOPLES R CHINA, DEC 15-17,
Cao TJ; Lin DD
  |  
 
covert channel identification founded on information flow analysis [会议论文]
International Conference on Computational Intelligence and Security, Xian, PEOPLES R CHINA, DEC 15-19,
Shen JJ; Qing SH; Shen QN; Li LP
  |  
 
energy-efficient target localization based on a prediction model [会议论文]
International Conference on Embedded and Ubiquitous Computing, Nagasaki, JAPAN, DEC 06-09,
Gu Y; Zhang W; Liu HC; Zhao BH; Qu YG
  |  
 
hctr: a variable-input-length enciphering mode [会议论文]
1st SKLOIS Conference on Information Security and Cryptology, Beijing, PEOPLES R CHINA, DEC 15-17,
Wang P; Feng DG; Wu WL
  |  
 
spiral pro: a project plan generation framework and support tool [会议论文]
International Software Process Workshop (SPW 2005), Beijing, PEOPLES R CHINA, MAY 25-27,
Wang JZ; Meyers S
  |  
 
software testing process automation based on utp - a case study [会议论文]
International Software Process Workshop (SPW 2005), Beijing, PEOPLES R CHINA, MAY 25-27,
Chen W; Ying Q; Xue YZ; Zhao C
  |  
 
evaluation of the capability of personal software process based on data envelopment analysis [会议论文]
International Software Process Workshop (SPW 2005), Beijing, PEOPLES R CHINA, MAY 25-27,
Ding LP; Yang QS; Sun L; Tong J; Wang YJ
  |  
 
a predicate spatial logic and model checking for mobile processes [会议论文]
1st International Colloquium on Theoretical Aspects of Computing (ICTAC 2004), Guiyang, PEOPLES R CHINA, SEP 20-24,
Lin HM
  |  
 
a development process for building oss-based applications [会议论文]
International Software Process Workshop (SPW 2005), Beijing, PEOPLES R CHINA, MAY 25-27,
Huang M; Yang LG; Yang Y
  |  
 
enforcing the principle of least privilege with a state-based privilege control model [会议论文]
1st Information Security Practice and Experience Conference, Singapore, SINGAPORE, APR 11-14,
Liang B; Liu H; Shi WC; Wu YJ
  |  
 

previous 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 next

 

Valid XHTML 1.0!
Copyright © 2007-2020  中国科学院软件研究所 - Feedback
Powered by CSpace