中国科学院软件研究所机构知识库
Advanced  
ISCAS OpenIR

Search Results

Help

Item hits: (Results 1-10 of 24)

Items/Page:    Sort:
Attacking and fixing the CS mode [会议论文]
15th International Conference on Information and Communications Security, ICICS 2013, Beijing, China, November 20, 2013 - November 22, 2013
Sui, Han (1); Wu, Wenling (1); Zhang, Liting (1); Wang, Peng (2)

 
Integral attacks on reduced-round PRESENT [会议论文]
15th International Conference on Information and Communications Security, ICICS 2013, Beijing, China, November 20, 2013 - November 22, 2013
Wu, Shengbao (1); Wang, Mingsheng (3)

 
Type-based analysis of protected storage in the TPM [会议论文]
15th International Conference on Information and Communications Security, ICICS 2013, Beijing, China, November 20, 2013 - November 22, 2013
Shao, Jianxiong (1); Feng, Dengguo (1); Qin, Yu (1)

 
a new variant of time memory trade-off on the improvement of thing and ying's attack [会议论文]
14th International Conference on Information and Communications Security, ICICS 2012, Hong Kong, China, October 29, 2012 - October 31, 2012
Li Zhenqi; Lu Yao; Wang Wenhao; Zhang Bin; Lin Dongdai

 
applying time-memory-data trade-off to plaintext recovery attack [会议论文]
14th International Conference on Information and Communications Security, ICICS 2012, Hong Kong, China, October 29, 2012 - October 31, 2012
Li Zhenqi; Zhang Bin; Lu Yao; Zou Jing; Lin Dongdai

 
efficient attribute proofs in anonymous credential using attribute-based cryptography [会议论文]
14th International Conference on Information and Communications Security, ICICS 2012, Hong Kong, China, October 29, 2012 - October 31, 2012
Zhang Yan; Feng Dengguo

 
HyperCrop: A Hypervisor-Based Countermeasure for Return Oriented Programming [会议论文]
International Conference on Information and Communications Security, Friendship Hotel, Haidian District, Beijing, China, 2011/11/23-2011/11/26
Jun Jiang; Xiaoqi Jia; Dengguo Feng; Shengzhi Zhang; Peng Liu
  |  
 
collision attack for the hash function extended md4 [会议论文]
13th International Conference on Information and Communications Security, ICICS 2011, Beijing, China, November 2
Wang Gaoli

 
a probabilistic secret sharing scheme for a compartmented access structure [会议论文]
13th International Conference on Information and Communications Security, ICICS 2011, Beijing, China, November 2
Yu Yuyin; Wang Mingsheng

 
a multi-compositional enforcement on information flow security [会议论文]
13th International Conference on Information and Communications Security, ICICS 2011, Beijing, China, November 2
Sun Cong; Zhai Ennan; Chen Zhong; Ma Jianfeng

 

1 2 3 next

 

Valid XHTML 1.0!
Copyright © 2007-2022  中国科学院软件研究所 - Feedback
Powered by CSpace