中国科学院软件研究所机构知识库
Log In
Register
Email:
Passwd
验 证:
换一张
Have you forgotten your password?
Stay signed in
Log In
ALL
Title
Author
Keyword
Sponsors
Type
Publication date
Submitted Time
Subject
Conference Name
Source
Categories
KOS Subject
Advisor
ORCID
Advanced
在结果中检索
Communities
Subjects
All Items
Community
软件所图书馆 [16]
信息安全国家重点实验... [5]
基础软件国家工程研究... [2]
计算机科学国家重点实... [1]
作者
Content Type
会议论文 [23]
学位论文 [1]
Issued Date
Language
英语 [19]
Source
lecture n... [17]
lecture no... [1]
proceeding... [1]
proceeding... [1]
Project
Indexed
EI [19]
SPRINGER [2]
CPCI(ISTP) [1]
ISTP,EI [1]
Spnsorship
national n... [7]
chinese ac... [2]
chinese ac... [2]
china inst... [1]
chinese ac... [1]
更多...
ISCAS OpenIR
Search Results
Help
Item hits:
(Results 1-10 of 24)
Items/Page:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
Sort:
Select
Author Ascending
Author Descending
Title Ascending
Title Descending
Issue Date Ascending
Issue Date Descending
Submitted Time Ascending
Submitted Time Descending
Attacking and fixing the CS mode
[会议论文]
15th International Conference on Information and Communications Security, ICICS 2013, Beijing, China, November 20, 2013 - November 22, 2013
Sui, Han (1)
;
Wu, Wenling (1)
;
Zhang, Liting (1)
;
Wang, Peng (2)
Integral attacks on reduced-round PRESENT
[会议论文]
15th International Conference on Information and Communications Security, ICICS 2013, Beijing, China, November 20, 2013 - November 22, 2013
Wu, Shengbao (1)
;
Wang, Mingsheng (3)
Type-based analysis of protected storage in the TPM
[会议论文]
15th International Conference on Information and Communications Security, ICICS 2013, Beijing, China, November 20, 2013 - November 22, 2013
Shao, Jianxiong (1)
;
Feng, Dengguo (1)
;
Qin, Yu (1)
a new variant of time memory trade-off on the improvement of thing and ying's attack
[会议论文]
14th International Conference on Information and Communications Security, ICICS 2012, Hong Kong, China, October 29, 2012 - October 31, 2012
Li Zhenqi
;
Lu Yao
;
Wang Wenhao
;
Zhang Bin
;
Lin Dongdai
applying time-memory-data trade-off to plaintext recovery attack
[会议论文]
14th International Conference on Information and Communications Security, ICICS 2012, Hong Kong, China, October 29, 2012 - October 31, 2012
Li Zhenqi
;
Zhang Bin
;
Lu Yao
;
Zou Jing
;
Lin Dongdai
efficient attribute proofs in anonymous credential using attribute-based cryptography
[会议论文]
14th International Conference on Information and Communications Security, ICICS 2012, Hong Kong, China, October 29, 2012 - October 31, 2012
Zhang Yan
;
Feng Dengguo
HyperCrop: A Hypervisor-Based Countermeasure for Return Oriented Programming
[会议论文]
International Conference on Information and Communications Security, Friendship Hotel, Haidian District, Beijing, China, 2011/11/23-2011/11/26
Jun Jiang
;
Xiaoqi Jia
;
Dengguo Feng
;
Shengzhi Zhang
;
Peng Liu
  |  
collision attack for the hash function extended md4
[会议论文]
13th International Conference on Information and Communications Security, ICICS 2011, Beijing, China, November 2
Wang Gaoli
a probabilistic secret sharing scheme for a compartmented access structure
[会议论文]
13th International Conference on Information and Communications Security, ICICS 2011, Beijing, China, November 2
Yu Yuyin
;
Wang Mingsheng
a multi-compositional enforcement on information flow security
[会议论文]
13th International Conference on Information and Communications Security, ICICS 2011, Beijing, China, November 2
Sun Cong
;
Zhai Ennan
;
Chen Zhong
;
Ma Jianfeng
1
2
3
next
Copyright © 2007-2022
中国科学院软件研究所
-
Feedback
Powered by
CSpace