中国科学院软件研究所机构知识库
Log In
Register
Email:
Passwd
验 证:
换一张
Have you forgotten your password?
Stay signed in
Log In
ALL
Title
Author
Keyword
Sponsors
Type
Publication date
Submitted Time
Subject
Conference Name
Source
Categories
KOS Subject
Advisor
ORCID
Advanced
在结果中检索
Communities
Subjects
All Items
Community
软件所图书馆 [171]
信息安全国家重点实... [89]
基础软件国家工程研... [44]
互联网软件技术实验室... [4]
计算机科学国家重点实... [3]
更多...
作者
王雅哲 [3]
刘玉岭 [2]
王健 [1]
Content Type
期刊论文 [160]
会议论文 [155]
专著章节/文集论文 [1]
学位论文 [1]
Issued Date
2016 [3]
Language
英语 [140]
中文 [95]
Source
lecture n... [71]
软件学报 [16]
计算机学报 [14]
计算机研究与发展 [12]
science i... [10]
更多...
Project
descriptio... [1]
Indexed
EI [151]
SCI [51]
ISTP [22]
WANFANG [15]
IEEE [12]
更多...
Spnsorship
ieee [5]
national s... [5]
ieee compu... [3]
ministry o... [3]
中国计算机学会 [3]
更多...
ISCAS OpenIR
Search Results
Help
Item hits:
(Results 51-60 of 317)
Items/Page:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
Sort:
Select
Submitted Time Ascending
Submitted Time Descending
Title Ascending
Title Descending
Author Ascending
Author Descending
Issue Date Ascending
Issue Date Descending
interactive event detection in crowd scenes
[会议论文]
4th International Conference on Internet Multimedia Computing and Service, ICIMCS 2012, Wuhan, China, September 9, 2012 - September 11, 2012
Qin Lei
;
Cheng Zhongwei
;
Huang Qingming
;
Pang Junbiao
deterministic public key encryption and identity-based encryption from lattices in the auxiliary-input setting
[会议论文]
8th International Conference on Security and Cryptography for Networks, SCN 2012, Amalfi, Italy, September 5, 2012 - September 7, 2012
Xie Xiang
;
Xue Rui
;
Zhang Rui
survey of network and computer attack taxonomy
[会议论文]
2012 IEEE Symposium on Robotics and Applications, ISRA 2012, Kuala Lumpur, Malaysia, June 3, 2012 - June 5, 2012
Wei Jiang
enhance value by building trustworthy software-reliant system of systems from software product lines
[会议论文]
2012 3rd International Workshop on Product LinE Approaches in Software Engineering, PLEASE 2012, Zurich, Switzerland, June 4, 2012 - June 4, 2012
Li Dong
;
Yang Ye
improving flask implementation using hardware assisted in-vm isolation
[会议论文]
27th IFIP TC 11 Information Security and Privacy Conference, SEC 2012, Heraklion, Crete, Greece, June 4, 2012 - June 6, 2012
Ding Baozeng
;
Yao Fufeng
;
Wu Yanjun
;
He Yeping
ciphertext policy attribute-based encryption from lattices: extended abstract
[会议论文]
7th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2012, Seoul, Korea, Republic of, May 2, 2012 - May 4, 2012
Zhang Jiang
;
Zhang Zhenfeng
;
Ge Aijun
on the probability distribution of the carry cells of stream ciphers f-fcsr-h v2 and f-fcsr-h v3
[会议论文]
7th China International Conference on Information Security and Cryptography, Inscrypt 2011, Beijing, China, November 30, 2011 - December 3, 2011
Song Haixin
;
Fan Xiubin
;
Wu Chuankun
;
Feng Dengguo
preimage attacks on step-reduced sm3 hash function
[会议论文]
14th International Conference on Information Security and Cryptology, ICISC 2011, Seoul, Korea, Republic of, November 30, 2011 - December 2, 2011
Zou Jian
;
Wu Wenling
;
Wu Shuang
;
Su Bozhan
;
Dong Le
on the resistance of boolean functions against fast algebraic attacks
[会议论文]
14th International Conference on Information Security and Cryptology, ICISC 2011, Seoul, Korea, Republic of, November 30, 2011 - December 2, 2011
Du Yusong
;
Zhang Fangguo
;
Liu Meicheng
back propagation neural network based leakage characterization for practical security analysis of cryptographic implementations
[会议论文]
14th International Conference on Information Security and Cryptology, ICISC 2011, Seoul, Korea, Republic of, November 30, 2011 - December 2, 2011
Yang Shuguo
;
Zhou Yongbin
;
Liu Jiye
;
Chen Danyang
previous
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
next
Copyright © 2007-2021
中国科学院软件研究所
-
Feedback
Powered by
CSpace