中国科学院软件研究所机构知识库
Advanced  
ISCAS OpenIR

Search Results

Help

Item hits: (Results 1-7 of 7)

Filters    
Items/Page:    Sort:
measuring the effectiveness of dpa attacks- from the perspective of distinguishers statistical characteristics [会议论文]
2010 3rd IEEE International Conference on Computer Science and Information Technology, ICCSIT 2010, Chengdu, China, 44021
Huang Jingang; Zhou Yongbin; Liu Jiye
  |  
 
a unified iterative optimization algorithm for query model and ranking refinement [会议论文]
6th Asia Information Retrieval Societies Conference, AIRS 2010, Taipei, Taiwan, 40878
Huang Yunping; Sun Le; Nie Jian-Yun
  |  
 
generation of wsdl_based test case [会议论文]
International Workshop on Information Security and Application (IWISA 2009), Qingdao, PEOPLES R CHINA, NOV 21-22,
Dong Wenli

 
dynamic reconfiguration method for web service based on policy [会议论文]
International Symposium on Electronic Commerce and Security, Guangzhou, PEOPLES R CHINA, AUG 03-05,
Dong Wenli
  |  
 
automated design of non-repudiation security protocols [会议论文]
2007 International Conference on Wireless Communications, Networking and Mobile Computing, WiCOM 2007, Shanghai, China, September
Xue Haifeng; Zhang Huanguo; Qing Sihan; Yu Rongwei
  |  
 
optimization of covert channel identification [会议论文]
3rd International IEEE Security in Storage Workshop, San Francisco, CA, 12-13
Shen Jianjun; Qing Sihan; Shen Qingni; Li Liping
  |  
 
optimization of covert channel identification [会议论文]
3rd International IEEE Security in Storage Workshop, San Francisco, CA, 12-13
Shen Jianjun; Qing Sihan; Shen Qingni; Li Liping
  |  
 

1

 

Valid XHTML 1.0!
Copyright © 2007-2019  中国科学院软件研究所 - Feedback
Powered by CSpace