中国科学院软件研究所机构知识库
Advanced  
ISCAS OpenIR

Search Results

Help

Item hits: (Results 51-60 of 317)

Items/Page:    Sort:
interactive event detection in crowd scenes [会议论文]
4th International Conference on Internet Multimedia Computing and Service, ICIMCS 2012, Wuhan, China, September 9, 2012 - September 11, 2012
Qin Lei; Cheng Zhongwei; Huang Qingming; Pang Junbiao

 
deterministic public key encryption and identity-based encryption from lattices in the auxiliary-input setting [会议论文]
8th International Conference on Security and Cryptography for Networks, SCN 2012, Amalfi, Italy, September 5, 2012 - September 7, 2012
Xie Xiang; Xue Rui; Zhang Rui

 
survey of network and computer attack taxonomy [会议论文]
2012 IEEE Symposium on Robotics and Applications, ISRA 2012, Kuala Lumpur, Malaysia, June 3, 2012 - June 5, 2012
Wei Jiang

 
enhance value by building trustworthy software-reliant system of systems from software product lines [会议论文]
2012 3rd International Workshop on Product LinE Approaches in Software Engineering, PLEASE 2012, Zurich, Switzerland, June 4, 2012 - June 4, 2012
Li Dong; Yang Ye

 
improving flask implementation using hardware assisted in-vm isolation [会议论文]
27th IFIP TC 11 Information Security and Privacy Conference, SEC 2012, Heraklion, Crete, Greece, June 4, 2012 - June 6, 2012
Ding Baozeng; Yao Fufeng; Wu Yanjun; He Yeping

 
ciphertext policy attribute-based encryption from lattices: extended abstract [会议论文]
7th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2012, Seoul, Korea, Republic of, May 2, 2012 - May 4, 2012
Zhang Jiang; Zhang Zhenfeng; Ge Aijun

 
on the probability distribution of the carry cells of stream ciphers f-fcsr-h v2 and f-fcsr-h v3 [会议论文]
7th China International Conference on Information Security and Cryptography, Inscrypt 2011, Beijing, China, November 30, 2011 - December 3, 2011
Song Haixin; Fan Xiubin; Wu Chuankun; Feng Dengguo

 
preimage attacks on step-reduced sm3 hash function [会议论文]
14th International Conference on Information Security and Cryptology, ICISC 2011, Seoul, Korea, Republic of, November 30, 2011 - December 2, 2011
Zou Jian; Wu Wenling; Wu Shuang; Su Bozhan; Dong Le

 
on the resistance of boolean functions against fast algebraic attacks [会议论文]
14th International Conference on Information Security and Cryptology, ICISC 2011, Seoul, Korea, Republic of, November 30, 2011 - December 2, 2011
Du Yusong; Zhang Fangguo; Liu Meicheng

 
back propagation neural network based leakage characterization for practical security analysis of cryptographic implementations [会议论文]
14th International Conference on Information Security and Cryptology, ICISC 2011, Seoul, Korea, Republic of, November 30, 2011 - December 2, 2011
Yang Shuguo; Zhou Yongbin; Liu Jiye; Chen Danyang

 

previous 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 next

 

Valid XHTML 1.0!
Copyright © 2007-2021  中国科学院软件研究所 - Feedback
Powered by CSpace