中国科学院软件研究所机构知识库
Advanced  
ISCAS OpenIR

Search Results

Help

Item hits: (Results 1-10 of 15)

Items/Page:    Sort:
an new anonymous authentication scheme for cloud computing [会议论文]
2012 7th International Conference on Computer Science and Education, ICCSE 2012, Melbourne, VIC, Australia, July 14, 2012 - July 17, 2012
Zhang Zhi-Hua; Li Jian-Jun; Jiang Wei; Zhao Yong; Gong Bei

 
meet-in-the-middle attack on 10-round reduced 3d block cipher [期刊论文]
Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2012-01-01, 卷号: 34, 期号: 3, 页码: 694-697
Su Chong-Mao; Wei Yong-Zhuang; Ma Chun-Bo

 
a novel multi-stage (t,n)-threshold secret sharing scheme [期刊论文]
International Journal of Advancements in Computing Technology, 2012-01-01, 卷号: 4, 期号: 5, 页码: 141-147
Yousheng Zhou; Mingzhi Cheng; Sihan Qing; Yong Jiang; Wei Cui
  |  
 
web service schema matching based on characteristic vector [会议论文]
2011 IEEE 2nd International Conference on Software Engineering and Service Science, ICSESS 2011, Beijing, China, July 15, 2011 - July 17, 2011
Wang Ke; Ou Wei-Jie; Zeng Cheng; Li De-Yi; Peng Zhi-Yong

 
web service schema matching based on invocation instance duplicates [会议论文]
2011 7th International Conference on Next Generation Web Services Practices, NWeSP 2011, Salamanca, Spain, October 19, 2011 - October 21, 2011
Wang Ke; Ou Wei-Jie; Zeng Cheng; Li De-Yi; Peng Zhi-Yong

 
multi-link cooperative data forwarding protocol based on fine-grain gradient strategy [期刊论文]
Ruan Jian Xue Bao/Journal of Software, 2009-01-01, 卷号: 20, 期号: 11, 页码: 3045-3059
Zhu Hong-Song; Zhao Lei; Xu Yong-Jun; Li Xiao-Wei; Sun Li-Min

 
groupability in security policy models [期刊论文]
Ruan Jian Xue Bao/Journal of Software, 2009-01-01, 卷号: 20, 期号: 7, 页码: 1953-1966
Cai Jia-Yong; Qing Si-Han; Liu Wei
  |  
 
implicit authorization analysis of role-based administrative model [期刊论文]
Ruan Jian Xue Bao/Journal of Software, 2009-01-01, 卷号: 20, 期号: 4, 页码: 1048-1057
Liu Wei; Cai Jia-Yong; He Ye-Ping
  |  
 
new definition of small message criterion and its application in transaction covert channel mitigating [期刊论文]
Ruan Jian Xue Bao/Journal of Software, 2009-01-01, 卷号: 20, 期号: 4, 页码: 985-996
Zeng Hai-Tao; Wang Yong-Ji; Zu Wei; Cai Jia-Yong; Ruan Li
  |  
 
a network security situational awareness model based on information fusion [期刊论文]
Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2009-01-01, 卷号: 46, 期号: 3, 页码: 353-362
Wei Yong; Lian Yifeng; Feng Dengguo
  |  
 

1 2 next

 

Valid XHTML 1.0!
Copyright © 2007-2019  中国科学院软件研究所 - Feedback
Powered by CSpace