中国科学院软件研究所机构知识库
Log In
Register
Email:
Passwd
验 证:
换一张
Have you forgotten your password?
Stay signed in
Log In
ALL
Title
Author
Keyword
Sponsors
Type
Publication date
Submitted Time
Subject
Conference Name
Source
Categories
KOS Subject
Advisor
ORCID
Advanced
在结果中检索
Communities
Subjects
All Items
Community
信息安全国家重点实... [14]
作者
Content Type
会议论文 [14]
Issued Date
2013 [1]
2011 [4]
2010 [2]
2009 [7]
Language
英语 [14]
Source
lecture no... [4]
2009 8th i... [1]
applicable... [1]
computers ... [1]
ieee inter... [1]
更多...
Project
Indexed
EI [5]
其他 [4]
CPCI(ISTP) [2]
ISTP,EI,AC... [1]
SCI,ISTP,E... [1]
Spnsorship
ieee [1]
ieee compu... [1]
ieee; ieee... [1]
korea inte... [1]
national n... [1]
更多...
ISCAS OpenIR
Search Results
Help
Item hits:
(Results 1-10 of 14)
Filters
Collection:信息安全国家重点实验室_会议论文
Language:英语
Items/Page:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
Sort:
Select
Submitted Time Ascending
Submitted Time Descending
Title Ascending
Title Descending
Author Ascending
Author Descending
Issue Date Ascending
Issue Date Descending
VCCBox: Practical Confinement of Untrusted Software in Virtual Cloud Computing
[会议论文]
ICST International Conference on Security and Privacy in Communication Networks, Sydney, Australia, 2013/9/25-2013/9/27
Jun Jiang
;
Meining Nie
;
Purui Su
;
Dengguo Feng
  |  
HyperCrop: A Hypervisor-Based Countermeasure for Return Oriented Programming
[会议论文]
International Conference on Information and Communications Security, Friendship Hotel, Haidian District, Beijing, China, 2011/11/23-2011/11/26
Jun Jiang
;
Xiaoqi Jia
;
Dengguo Feng
;
Shengzhi Zhang
;
Peng Liu
  |  
color image segmentation using automatic pixel classification with support vector machine
[会议论文]
Wang Xiang-Yang
;
Wang Qin-Yan
;
Yang Hong-Ying
;
Bu Juan
  |  
geometrically invariant image watermarking using svr correction in nsct domain
[会议论文]
Yang Hong-ying
;
Wang Xiang-yang
;
Chen Li-li
  |  
new p-ary sequence family with low correlation and large linear span
[会议论文]
Zhou Zhengchun
;
Tang Xiaohu
;
Parampalli Udaya
;
Peng Daiyuan
  |  
threshold password-based authenticated group key exchange in gateway-oriented setting
[会议论文]
6th International Conference on Information Security Practice and Experience, Seoul, SOUTH KOREA, MAY 12-13,
Li Hui
;
Wu Chuan-Kun
;
Wei Lingbo
  |  
adaptive voice stream multicast over low-power wireless networks
[会议论文]
31st IEEE Real-Time Systems Symposium, RTSS 2010, San Diego, CA, 40850
Liqun Li
;
Guoliang Xing
;
Qi Han
;
Limin Sun
  |  
an efficient and provably secure cross-realm client-to-client password-authenticated key agreement protocol with smart cards
[会议论文]
8th International Conference on Cryptology and Network Security, CANS 2009, Kanazawa, Japan, 40878
Jin Wenting
;
Xu Jing
l-ucon: towards layered access control with ucon
[会议论文]
7th IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, EUC 2009, Vancouver, BC, Canada, August 29,
Hu Hao
;
Li Hao
;
Feng Dengguo
  |  
security analysis of two password authentication schemes
[会议论文]
2009 Eighth International Conference on Mobile Business, Liaoning, China, 37434
Tan Zuowen
  |  
1
2
next
Copyright © 2007-2021
中国科学院软件研究所
-
Feedback
Powered by
CSpace