中国科学院软件研究所机构知识库
Advanced  
ISCAS OpenIR

Search Results

Help

Item hits: (Results 1-10 of 15)

Items/Page:    Sort:
practical rebound attack on 12-round cheetah-256 [会议论文]
12th International Conference on Information Security and Cryptology, Seoul, SOUTH KOREA, DEC 02-04,
Wu Shuang; Feng Dengguo; Wu Wenling
  |  
 
separation of duty in trust-based collaboration [会议论文]
4th International Conference on Information Security and Cryptology (Inscript 2008), Beijing, PEOPLES R CHINA, DEC 14-17,
Deng Lingli; He Yeping; Xu Ziyao
  |  
 
an integrity assurance mechanism for run-time programs [会议论文]
4th International Conference on Information Security and Cryptology (Inscript 2008), Beijing, PEOPLES R CHINA, DEC 14-17,
Xu Ziyao; He Yeping; Deng Lingli
  |  
 
extended models for message authentication [会议论文]
11th International Conference on Information Security and Cryptology, Seoul, SOUTH KOREA, DEC 03-05,
Zhang Liting; Wu Wenling; Wang Peng

 
unlinkable randomizable signature and its application in group signature [会议论文]
3rd SKLOIS Conference on Information Security and Cryptology, Xining, PEOPLES R CHINA, AUG 31-SEP
Zhou Sujing; Lin Dongdai
  |  
 
resettable zero knowledge with concurrent soundness in the bare public-key model under standard assumption [会议论文]
3rd SKLOIS Conference on Information Security and Cryptology, Xining, PEOPLES R CHINA, AUG 31-SEP
Deng Yi; Lin Dongdai
  |  
 
a verifiable formal specification for rbac model with constraints of separation of duty [会议论文]
2nd SKLOIS Conference on Information Security and Cryptology, Beijing, PEOPLES R CHINA, NOV 29-DEC
Yuan Chunyang; He Yeping; He Jianbo; Zhou Zhouyi
  |  
 
a practical alternative to domain and type enforcement integrity formal models [会议论文]
2nd SKLOIS Conference on Information Security and Cryptology, Beijing, PEOPLES R CHINA, NOV 29-DEC
Tang Liuying; Qing Sihan
  |  
 
opmac: one-key poly1305 mac [会议论文]
2nd SKLOIS Conference on Information Security and Cryptology, Beijing, PEOPLES R CHINA, NOV 29-DEC
Wang Dayin; Lin Dongdai; Wu Wenling
  |  
 
weaknesses of cosvd (2,128) stream cipher [会议论文]
8th International Conference on Information Security an Cryptology (ICISC 2005), Seoul, SOUTH KOREA, DEC 01-02,
Zhang Bin; Wu Hongjun; Feng Dengguo; Wang Hong
  |  
 

1 2 next

 

Valid XHTML 1.0!
Copyright © 2007-2020  中国科学院软件研究所 - Feedback
Powered by CSpace