中国科学院软件研究所机构知识库
Advanced  
ISCAS OpenIR

Search Results

Help

Item hits: (Results 1-10 of 20)

Items/Page:    Sort:
fast verification of memory consistency for chip multi-processor [会议论文]
2011 7th International Conference on Computational Intelligence and Security, CIS 2011, Sanya, Hainan, China, December 3, 2011 - December 4, 2011
Zheng Lv; Chen Hao; Chen Feng; Yi Lv

 
improved differential cryptanalysis of serpent [会议论文]
2010 International Conference on Computational Intelligence and Security, CIS 2010, Nanning, China, 40878
Wang Gaoli; Wang Shaohui
  |  
 
differential fault analysis on present key schedule [会议论文]
2010 International Conference on Computational Intelligence and Security, CIS 2010, Nanning, China, 40878
Wang Gaoli; Wang Shaohui
  |  
 
exploring malware behaviors based on environment constitution [会议论文]
International Conference on Computational-Intelligence and Security, Suzhou, PEOPLES R CHINA, DEC 13-17,
Su Purui; Ying Lingyun; Feng Dengguo
  |  
 
linkability analysis of some blind signature schemes [会议论文]
International Conference on Computational Intelligence and Security, CIS 2006, Guangzhou, China, 40850
Zhang Jianhong; Mao Jian
  |  
 
a schema of automated design security protocols [会议论文]
2007 International Conference on Computational Intelligence and Security Workshops, CIS 2007, Harbin, Heilongjiang, China, 40878
Xue Haifeng; Zhang Huanguo; Qing Sihan
  |  
 
an efficient one-key carter-wegman message authentication code [会议论文]
2006 International Conference on Computational Intelligence and Security, ICCIAS 2006, Guangzhou, China, October 3,
Xu Jin; Wang Dayin; Lin Dongdai; Wu Wenling
  |  
 
an effective genetic algorithm for self-inverse s-boxes [会议论文]
International Conference on Computational Intelligence and Security, Harbin, PEOPLES R CHINA, DEC 15-19,
Chen Hua; Feng Dengguo
  |  
 
a single key mac based on hash127 [会议论文]
2007 International Conference on Computational Intelligence and Security, CIS07, Harbin, Heilongjiang, China, 40878
Jin Xu; Dayin Wang
  |  
 
improvement on a generalized scheme of proxy signature based on elliptic curves [会议论文]
2007 International Conference on Computational Intelligence and Security, CIS07, Harbin, Heilongjiang, China, 40878
Zuowen Tan
  |  
 

1 2 next

 

Valid XHTML 1.0!
Copyright © 2007-2019  中国科学院软件研究所 - Feedback
Powered by CSpace