中国科学院软件研究所机构知识库
Advanced  
ISCAS OpenIR

Search Results

Help

Item hits: (Results 1-10 of 11)

Items/Page:    Sort:
separation of duty in trust-based collaboration [会议论文]
4th International Conference on Information Security and Cryptology (Inscript 2008), Beijing, PEOPLES R CHINA, DEC 14-17,
Deng Lingli; He Yeping; Xu Ziyao
  |  
 
an integrity assurance mechanism for run-time programs [会议论文]
4th International Conference on Information Security and Cryptology (Inscript 2008), Beijing, PEOPLES R CHINA, DEC 14-17,
Xu Ziyao; He Yeping; Deng Lingli
  |  
 
unlinkable randomizable signature and its application in group signature [会议论文]
3rd SKLOIS Conference on Information Security and Cryptology, Xining, PEOPLES R CHINA, AUG 31-SEP
Zhou Sujing; Lin Dongdai
  |  
 
resettable zero knowledge with concurrent soundness in the bare public-key model under standard assumption [会议论文]
3rd SKLOIS Conference on Information Security and Cryptology, Xining, PEOPLES R CHINA, AUG 31-SEP
Deng Yi; Lin Dongdai
  |  
 
multiplicative linear secret sharing schemes based on connectivity of graphs [会议论文]
1st SKLOIS Conference on Information Security and Cryptology, Beijing, PEOPLES R CHINA, DEC 15-17,
Liu Mulan; Xiao Liangliang; Zhang Zhifang
  |  
 
a verifiable formal specification for rbac model with constraints of separation of duty [会议论文]
2nd SKLOIS Conference on Information Security and Cryptology, Beijing, PEOPLES R CHINA, NOV 29-DEC
Yuan Chunyang; He Yeping; He Jianbo; Zhou Zhouyi
  |  
 
a practical alternative to domain and type enforcement integrity formal models [会议论文]
2nd SKLOIS Conference on Information Security and Cryptology, Beijing, PEOPLES R CHINA, NOV 29-DEC
Tang Liuying; Qing Sihan
  |  
 
opmac: one-key poly1305 mac [会议论文]
2nd SKLOIS Conference on Information Security and Cryptology, Beijing, PEOPLES R CHINA, NOV 29-DEC
Wang Dayin; Lin Dongdai; Wu Wenling
  |  
 
new guess-and-determine attack on the self-shrinking generator [会议论文]
12th International Conference on the Theory of Application of Cryptology and Information Security, Shanghai, PEOPLES R CHINA, DEC 03-07,
Zhang Bin; Feng Dengguo
  |  
 
security analysis of some threshold signature schemes and multi-signature schemes [会议论文]
1st SKLOIS Conference on Information Security and Cryptology, Beijing, PEOPLES R CHINA, DEC 15-17,
Cao TJ; Lin DD
  |  
 

1 2 next

 

Valid XHTML 1.0!
Copyright © 2007-2020  中国科学院软件研究所 - Feedback
Powered by CSpace