中国科学院软件研究所机构知识库
Advanced  
ISCAS OpenIR

Search Results

Help

Item hits: (Results 1-10 of 37)

Items/Page:    Sort:
bind your phone number with caution: automated user profiling through address book matching on smartphone [会议论文]
8th ACM SIGSAC Symposium on Information, Computer and Communications Security, ASIA CCS 2013, Hangzhou, China, May 8, 2013 - May 10, 2013
Cheng Yao; Ying Lingyun; Jiao Sibei; Su Purui; Feng Dengguo

 
offline rfid grouping proofs with trusted timestamps [会议论文]
11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012, Liverpool, United kingdom, June 25, 2012 - June 27, 2012
Ma Cunqing; Lin Jingqiang; Wang Yuewu; Shang Ming

 
tsd: a flexible root of trust for the cloud [会议论文]
11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012, Liverpool, United kingdom, June 25, 2012 - June 27, 2012
Chang Dexian; Chu Xiaobo; Qin Yu; Feng Dengguo

 
a new efficient property-based attestation protocol based on elliptic curves [会议论文]
11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012, Liverpool, United kingdom, June 25, 2012 - June 27, 2012
Chu Xiaobo; Yu Qin

 
ciphertext policy attribute-based encryption from lattices: extended abstract [会议论文]
7th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2012, Seoul, Korea, Republic of, May 2, 2012 - May 4, 2012
Zhang Jiang; Zhang Zhenfeng; Ge Aijun

 
HyperCrop: A Hypervisor-Based Countermeasure for Return Oriented Programming [会议论文]
International Conference on Information and Communications Security, Friendship Hotel, Haidian District, Beijing, China, 2011/11/23-2011/11/26
Jun Jiang; Xiaoqi Jia; Dengguo Feng; Shengzhi Zhang; Peng Liu
  |  
 
fast verification of memory consistency for chip multi-processor [会议论文]
2011 7th International Conference on Computational Intelligence and Security, CIS 2011, Sanya, Hainan, China, December 3, 2011 - December 4, 2011
Zheng Lv; Chen Hao; Chen Feng; Yi Lv

 
a property-based attestation scheme with the variable privacy [会议论文]
10th IEEE Int. Conf. on Trust, Security and Privacy in Computing and Communications, TrustCom 2011, 8th IEEE Int. Conf. on Embedded Software and Systems, ICESS 2011, 6th Int. Conf. on Frontier of Computer Science and Technology, FCST 2011, Changsha, China, November 1
Qin Yu; Chang Dexian; Zhao Shijun; Zhang Qianying

 
a drtm-based method for trusted network connection [会议论文]
10th IEEE Int. Conf. on Trust, Security and Privacy in Computing and Communications, TrustCom 2011, 8th IEEE Int. Conf. on Embedded Software and Systems, ICESS 2011, 6th Int. Conf. on Frontier of Computer Science and Technology, FCST 2011, Changsha, China, November 1
Feng Wei; Qin Yu; Yu Ai-Min; Feng Dengguo

 
on the invisibility of designated confirmer signatures [会议论文]
6th International Symposium on Information, Computer and Communications Security, ASIACCS 2011, Hong Kong, China, March 22,
Xia Fubiao; Wang Guilin; Xue Rui
  |  
 

1 2 3 4 next

 

Valid XHTML 1.0!
Copyright © 2007-2020  中国科学院软件研究所 - Feedback
Powered by CSpace