中国科学院软件研究所机构知识库
Log In
Register
Email:
Passwd
验 证:
换一张
Have you forgotten your password?
Stay signed in
Log In
ALL
Title
Author
Keyword
Sponsors
Type
Publication date
Submitted Time
Subject
Conference Name
Source
Categories
KOS Subject
Advisor
ORCID
Advanced
在结果中检索
Communities
Subjects
All Items
Community
软件所图书馆 [31]
信息安全国家重点实验... [3]
作者
陈美会 [1]
Content Type
会议论文 [23]
期刊论文 [11]
Issued Date
2016 [2]
2015 [1]
Language
英语 [31]
Source
lecture no... [8]
lecture no... [5]
ieee trans... [3]
journal of... [2]
chinese jo... [1]
更多...
Project
Indexed
SCI [27]
ISTP [23]
EI [17]
IEEE [8]
ACM [3]
更多...
Spnsorship
nanjing un... [3]
fujian nor... [2]
ieee [2]
korea inst... [2]
chinese in... [1]
更多...
ISCAS OpenIR
Search Results
Help
Item hits:
(Results 1-10 of 34)
Items/Page:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
Sort:
Select
Submitted Time Ascending
Submitted Time Descending
Title Ascending
Title Descending
Author Ascending
Author Descending
Issue Date Ascending
Issue Date Descending
Direct Resource Hijacking in Android
[期刊论文]
IEEE INTERNET COMPUTING, 2016-01-01, 卷号: 20, 期号: 5, 页码: 46-56
Gu, YC
;
Li, Q
;
Zhang, HT
;
Su, PR
;
Zhang, XW
;
Feng, DG
Templates selection in non-overlapping template matching test
[期刊论文]
ELECTRONICS LETTERS, 2016-01-01, 卷号: 52, 期号: 18, 页码: 1533-1534
Chen MeiHui(陈美会)
;
Chen, H
;
Fan, LM
;
Feng, DG
  |  
Practical-time related-key attack on Hummingbird-2
[期刊论文]
IET INFORMATION SECURITY, 2015-01-01, 卷号: 9, 期号: 6, 页码: 321-327
Shi, ZQ
;
Zhang, B
;
Feng, DG
  |  
incomplete exponential sums over galois rings with applications to some binary sequences derived from z(2l)
[期刊论文]
IEEE TRANSACTIONS ON INFORMATION THEORY, 2006-01-01, 卷号: 52, 期号: 5, 页码: 2260-2265
Hu HG
;
Feng DG
;
Wu WL
  |  
incomplete exponential sums over galois rings with applications to some binary sequences derived from z(2l)
[期刊论文]
IEEE TRANSACTIONS ON INFORMATION THEORY, 2006-01-01, 卷号: 52, 期号: 5, 页码: 2260-2265
Hu HG
;
Feng DG
;
Wu WL
  |  
incomplete exponential sums over galois rings with applications to some binary sequences derived from z(2l)
[期刊论文]
IEEE TRANSACTIONS ON INFORMATION THEORY, 2006-01-01, 卷号: 52, 期号: 5, 页码: 2260-2265
Hu HG
;
Feng DG
;
Wu WL
  |  
a ring signature scheme using bilinear pairings
[会议论文]
5th International Workshop on Information Security Applications, Jeju Isl, SOUTH KOREA, AUG 23-25,
Xu J
;
Zhang ZF
;
Feng DG
  |  
a new k-anonymous message transmission protocol
[会议论文]
5th International Workshop on Information Security Applications, Jeju Isl, SOUTH KOREA, AUG 23-25,
Yao G
;
Feng DG
  |  
hctr: a variable-input-length enciphering mode
[会议论文]
1st SKLOIS Conference on Information Security and Cryptology, Beijing, PEOPLES R CHINA, DEC 15-17,
Wang P
;
Feng DG
;
Wu WL
  |  
on the security of tweakable modes of operation: tbc and tae
[会议论文]
8th International Conference on Information Security, Singapore, SINGAPORE, SEP 20-23,
Wang P
;
Feng DG
;
Wu WL
  |  
1
2
3
4
next
Copyright © 2007-2021
中国科学院软件研究所
-
Feedback
Powered by
CSpace