中国科学院软件研究所机构知识库
Advanced  
ISCAS OpenIR

Search Results

Help

Item hits: (Results 1-10 of 17)

Filters        
Items/Page:    Sort:
preface of iwdtn'10: the 2010 ieee international workshop on delay/disruption tolerant networking [期刊论文]
Proceedings - Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing in Conjunction with the UIC 2010 and ATC 2010 Conferences, UIC-ATC 2010, 2010-01-01, 期号: 1, 页码: xxvii-xxviii
Sun Limin; Qin Weijun; Shu Yantai; Hui Pan

 
on general factorizations for n-d polynomial matrices [期刊论文]
Circuits, Systems, and Signal Processing, 2010-01-01, 期号: 1, 页码: 40557
Liu Jinwang; Li Dongmei; Wang Mingsheng
  |  
 
on ea-equivalence of certain permutations to power mappings [期刊论文]
Designs, Codes, and Cryptography, 2010-01-01, 期号: 1, 页码: 40554
Li Yongqiang; Wang Mingsheng
  |  
 
security of the sms4 block cipher against differential cryptanalysis [期刊论文]
Journal of Computer Science and Technology, 2010-01-01, 卷号: 26, 期号: 1, 页码: 130-138
Su Bo-Zhan; Wu Wen-Ling; Zhang Wen-Tao
  |  
 
some improvements on model checking coreasm models of security protocols [会议论文]
2nd International Symposium on Data, Privacy and E-Commerce, ISDPE 2010, Buffalo, NY, United states, September
Zhao Zhenju; Liu Feng; Peng Jianhua; Huang Danqing; Xue Rui; Zhang Zhenfeng
  |  
 
the lower bound on the second-order nonlinearity of a class of boolean functions with high nonlinearity [会议论文]
Applicable Algebra in Engineering, Communications and Computing, 北京, 2010
Sun Guanghong; Wu Chuankun
  |  
 
towards a flexible spatially aware access control model [会议论文]
2nd International Symposium on Data, Privacy and E-Commerce, ISDPE 2010, Buffalo, NY, United states, September
Zhang Desheng; Zhang Min; Chen Chi
  |  
 
proposition of two cipher structures [会议论文]
5th International Conference on Information Security and Cryptology, Inscrypt 2009, Beijing, China, 40878
Zhang Lei; Wu Wenling; Zhang Liting
  |  
 
privacy preserving of trust management credentials based on trusted computing [会议论文]
6th International Conference on Information Security Practice and Experience, ISPEC 2010, Seoul, Korea, Republic of, 43963
Wu Bin; Feng Dengguo; Duan Meijiao
  |  
 
fault propagation pattern based dfa on feistel ciphers, with application to camellia [会议论文]
10th IEEE International Conference on Computer and Information Technology, CIT-2010, 7th IEEE International Conference on Embedded Software and Systems, ICESS-2010, 10th IEEE Int. Conf. Scalable Computing and Communications, ScalCom-2010, Bradford, United kingdom, 37436
Chen Haining; Zhou Yongbin; Wu Wenling; Wang Na
  |  
 

1 2 next

 

Valid XHTML 1.0!
Copyright © 2007-2019  中国科学院软件研究所 - Feedback
Powered by CSpace