中国科学院软件研究所机构知识库
Advanced  
ISCAS OpenIR

Search Results

Help

Item hits: (Results 1-10 of 25)

Items/Page:    Sort:
基于MTM的可信系统应用与安全性分析研究 [学位论文]
博士, 北京: 中国科学院研究生院, 2014-11-23
冯伟
  |  
 
The theory and practice in the evolution of trusted computing [期刊论文]
CHINESE SCIENCE BULLETIN, 2014-01-01, 卷号: 59, 期号: 32, 页码: 4173-4189
Feng, Dengguo; Qin, Yu; Feng, Wei; Shao, Jianxiong

 
Detecting performance anomaly with correlation analysis for Internetware [期刊论文]
Science China Information Sciences, 2013-01-01, 卷号: 56, 期号: 8, 页码: 1-15
Wang, Tao (1); Wei, Jun (1); Qin, Feng (4); Zhang, WenBo (2); Zhong, Hua (2); Huang, Tao (1)

 
The Ecology of Medical Care in Beijing [期刊论文]
PLOS ONE, 2013-01-01, 卷号: 8, 期号: 12
Shao, Shuang; Zhao, FeiFei; Wang, Jing; Feng, Lei; Lu, XiaoQin; Du, Juan; Yan, YuXiang; Wang, Chao; Fu, YingHong; Wu, JingJing; Yu, XinWei; Khoo, KayKeng; Wang, YouXin; Wang, Wei

 
TEEM: A user-oriented trusted mobile device for multi-platform security applications [会议论文]
6th International Conference on Trust and Trustworthy Computing, TRUST 2013, London, United kingdom, June 17, 2013 - June 19, 2013
Feng, Wei (1); Feng, Dengguo (1); Wei, Ge (2); Qin, Yu (1); Zhang, Qianying (1); Chang, Dexian (1)

 
fully secure attribute-based systems with short ciphertexts/signatures and threshold access structures [会议论文]
Cryptographers' Track at the RSA Conference 2013, CT-RSA 2013, San Francisco, CA, United states, February 25, 2013 - March 1, 2013
Chen Cheng; Chen Jie; Lim Hoon Wei; Zhang Zhenfeng; Feng Dengguo; Ling San; Wang Huaxiong

 
benchmarking for steganography by kernel fisher discriminant criterion [会议论文]
7th China International Conference on Information Security and Cryptography, Inscrypt 2011, Beijing, China, November 30, 2011 - December 3, 2011
Huang Wei; Zhao Xianfeng; Feng Dengguo; Sheng Rennong

 
an identity-based authentication scheme in cloud computing [会议论文]
2012 International Conference on Industrial Control and Electronics Engineering, ICICEE 2012, Xi'an, China, August 23, 2012 - August 25, 2012
Zhang Zhi-Hua; Jiang Xue-Feng; Li Jian-Jun; Jiang Wei

 
daa protocol analysis and verification [会议论文]
3rd International Conference on Trusted Systems, INTRUST 2011, Beijing, China, November 27, 2011 - November 29, 2011
Qin Yu; Chu Xiaobo; Feng Dengguo; Feng Wei

 
combined public-key schemes: the case of abe and abs [会议论文]
6th International Conference on Provable Security, ProvSec 2012, Chengdu, China, September 26, 2012 - September 28, 2012
Chen Cheng; Chen Jie; Lim Hoon Wei; Zhang Zhenfeng; Feng Dengguo

 

1 2 3 next

 

Valid XHTML 1.0!
Copyright © 2007-2019  中国科学院软件研究所 - Feedback
Powered by CSpace