中国科学院软件研究所机构知识库
Advanced  
ISCAS OpenIR

Search Results

Help

Item hits: (Results 1-10 of 52)

Filters    
Items/Page:    Sort:
一个基于稳固加密RFID协议的安全性分析 [期刊论文]
计算机研究与发展, 2012-01-01, 卷号: 49, 期号: 5, 页码: 958-961
韦永壮; 欧阳宁; 马春波
  |  
 
depsim: a dependency-based malware similarity comparison system [会议论文]
6th China International Conference on Information Security and Cryptology, Inscrypt 2010, Shanghai, China, 20-Oct
Yi Yang; Lingyun Ying; Rui Wang; Purui Su; Dengguo Feng
  |  
 
bcbc: a more efficient mac algorithm [会议论文]
7th International Conference on Information Security Practice and Experience, ISPEC 2011, Guangzhou, China, 30-May-20
Liang Bo; Wu Wenling; Zhang Liting
  |  
 
acquiring key privacy from data privacy [会议论文]
6th China International Conference on Information Security and Cryptology, Inscrypt 2010, Shanghai, China, 20-Oct
Zhang Rui
  |  
 
an instruction-level software simulation approach to resistance evaluation of cryptographic implementations against power analysis attacks [会议论文]
2011 IEEE International Conference on Computer Science and Automation Engineering, CSAE 2011, Shanghai, China, 10-Jun-02
Li Jiantang; Zhou Yongbin; Liu Jiye; Zhang Hailong
  |  
 
attacking bivium and trivium with the characteristic set method [会议论文]
4th International Conference on the Theory and Application of Cryptographic Techniques, AFRICACRYPT 2011, Dakar, Senegal, 5-Jul-20
Huang Zhenyu; Lin Dongdai
  |  
 
on enumeration of polynomial equivalence classes and their application to mpkc [会议论文]
on enumeration of polynomial equivalence classes and their application to mpkc, 北京, 2010
Lin Dongdai; Faug&#; re Jean-Charles; Perret Ludovic; Wang Tianze
  |  
 
on the security of a bidirectional proxy re-encryption scheme from pkc 2010 [会议论文]
14th International Conference on Practice and Theory in Public Key Cryptography, PKC 2011, Taormina, Italy, 6-Mar-02
Weng Jian; Zhao Yunlei; Hanaoka Goichiro
  |  
 
hyper-sbox view of aes-like permutations: a generalized distinguisher [会议论文]
6th China International Conference on Information Security and Cryptology, Inscrypt 2010, Shanghai, China, 20-Oct
Wu Shuang; Feng Dengguo; Wu Wenling; Su Bozhan
  |  
 
an efficient location-based compromise-tolerant key management scheme for sensor networks [期刊论文]
Information Processing Letters, 2011-01-01, 卷号: 111, 期号: 11, 页码: 503-507
Duan Mei-Jiao; Xu Jing
  |  
 

1 2 3 4 5 6 next

 

Valid XHTML 1.0!
Copyright © 2007-2021  中国科学院软件研究所 - Feedback
Powered by CSpace