中国科学院软件研究所机构知识库
Advanced  
ISCAS OpenIR

Search Results

Help

Item hits: (Results 1-10 of 13)

Filters            
Items/Page:    Sort:
some improvements on model checking coreasm models of security protocols [会议论文]
2nd International Symposium on Data, Privacy and E-Commerce, ISDPE 2010, Buffalo, NY, United states, September
Zhao Zhenju; Liu Feng; Peng Jianhua; Huang Danqing; Xue Rui; Zhang Zhenfeng
  |  
 
the lower bound on the second-order nonlinearity of a class of boolean functions with high nonlinearity [会议论文]
Applicable Algebra in Engineering, Communications and Computing, 北京, 2010
Sun Guanghong; Wu Chuankun
  |  
 
towards a flexible spatially aware access control model [会议论文]
2nd International Symposium on Data, Privacy and E-Commerce, ISDPE 2010, Buffalo, NY, United states, September
Zhang Desheng; Zhang Min; Chen Chi
  |  
 
proposition of two cipher structures [会议论文]
5th International Conference on Information Security and Cryptology, Inscrypt 2009, Beijing, China, 40878
Zhang Lei; Wu Wenling; Zhang Liting
  |  
 
privacy preserving of trust management credentials based on trusted computing [会议论文]
6th International Conference on Information Security Practice and Experience, ISPEC 2010, Seoul, Korea, Republic of, 43963
Wu Bin; Feng Dengguo; Duan Meijiao
  |  
 
fault propagation pattern based dfa on feistel ciphers, with application to camellia [会议论文]
10th IEEE International Conference on Computer and Information Technology, CIT-2010, 7th IEEE International Conference on Embedded Software and Systems, ICESS-2010, 10th IEEE Int. Conf. Scalable Computing and Communications, ScalCom-2010, Bradford, United kingdom, 37436
Chen Haining; Zhou Yongbin; Wu Wenling; Wang Na
  |  
 
formal verification of hmqv using asm-spv [会议论文]
6th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIHMSP 2010, Darmstadt, Germany, 40831
Huang Danqing; Xue Rui; Liu Feng; Peng Jianhua; Zhao Zhenju; Ji Dongyao
  |  
 
attribute-based conditional proxy re-encryption with chosen-ciphertext security [会议论文]
53rd IEEE Global Communications Conference, GLOBECOM 2010, Miami, FL, United states, 40883
Zhao Jing; Feng Dengguo; Zhang Zhenfeng
  |  
 
a language for secure requirement description based on information flow [会议论文]
2010 IEEE International Conference on Intelligent Computing and Intelligent Systems, ICIS 2010, Xiamen, China, 40845
Cheng Liang; Zhang Yang; Feng Dengguo
  |  
 
an interactive high-fidelity haptic needle simulator with gpu acceleration [会议论文]
9th ACM SIGGRAPH International Conference on VR Continuum and Its Applications in Industry, VRCAI 2010, Seoul, Korea, Republic of, 40878
Zhang Ji-Shuai; Chen Hui; Wu Wen; Heng Pheng-Ann
  |  
 

1 2 next

 

Valid XHTML 1.0!
Copyright © 2007-2019  中国科学院软件研究所 - Feedback
Powered by CSpace