中国科学院软件研究所机构知识库
Log In
Register
Email:
Passwd
验 证:
换一张
Have you forgotten your password?
Stay signed in
Log In
ALL
Title
Author
Keyword
Sponsors
Type
Publication date
Submitted Time
Subject
Conference Name
Source
Categories
KOS Subject
Advisor
ORCID
Advanced
在结果中检索
Communities
Subjects
All Items
Community
软件所图书馆 [17]
信息安全国家重点实验... [2]
作者
Content Type
会议论文 [13]
期刊论文 [6]
Issued Date
Language
英语 [16]
中文 [1]
Source
chinese sc... [2]
lecture no... [2]
proc. 10th... [2]
proc. of t... [2]
2011 ieee ... [1]
更多...
Project
Indexed
EI [15]
SCI [4]
Spnsorship
ieee tcsc;... [2]
university... [2]
beijing in... [1]
national n... [1]
university... [1]
更多...
ISCAS OpenIR
Search Results
Help
Item hits:
(Results 1-10 of 19)
Items/Page:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
Sort:
Select
Submitted Time Ascending
Submitted Time Descending
Title Ascending
Title Descending
Author Ascending
Author Descending
Issue Date Ascending
Issue Date Descending
Formal analysis of TPM2.0 key management APIs
[期刊论文]
CHINESE SCIENCE BULLETIN, 2014-01-01, 卷号: 59, 期号: 32, 页码: 4210-4224
Zhang, Qianying
;
Zhao, Shijun
;
Qin, Yu
;
Feng, Dengguo
The theory and practice in the evolution of trusted computing
[期刊论文]
CHINESE SCIENCE BULLETIN, 2014-01-01, 卷号: 59, 期号: 32, 页码: 4173-4189
Feng, Dengguo
;
Qin, Yu
;
Feng, Wei
;
Shao, Jianxiong
Automated proof for authorization protocols of TPM 2.0 in computational model
[会议论文]
10th International Conference on Information Security Practice and Experience, ISPEC 2014, Fuzhou, China, May 5, 2014 - May 8, 2014
Wang, Weijin (1)
;
Qin, Yu (1)
;
Feng, Dengguo (1)
ExBLACR: Extending BLACR system
[会议论文]
19th Australasian Conference on Information Security and Privacy, ACISP 2014, Wollongong, NSW, Australia, July 7, 2014 - July 9, 2014
Wang, Weijin (1)
;
Feng, Dengguo (1)
;
Qin, Yu (1)
;
Shao, Jianxiong (1)
;
Xi, Li (1)
;
Chu, Xiaobo (1)
TEEM: A user-oriented trusted mobile device for multi-platform security applications
[会议论文]
6th International Conference on Trust and Trustworthy Computing, TRUST 2013, London, United kingdom, June 17, 2013 - June 19, 2013
Feng, Wei (1)
;
Feng, Dengguo (1)
;
Wei, Ge (2)
;
Qin, Yu (1)
;
Zhang, Qianying (1)
;
Chang, Dexian (1)
Type-based analysis of protected storage in the TPM
[会议论文]
15th International Conference on Information and Communications Security, ICICS 2013, Beijing, China, November 20, 2013 - November 22, 2013
Shao, Jianxiong (1)
;
Feng, Dengguo (1)
;
Qin, Yu (1)
analyzing the trust chain of trusted virtualization platform based on the extended ls2
[期刊论文]
Tongxin Xuebao/Journal on Communications, 2013-01-01, 卷号: 34, 期号: 5, 页码: 31-41
Chang De-Xian
;
Feng Deng-Guo
;
Qin Yu
;
Zhang Qian-Ying
tsd: a flexible root of trust for the cloud
[会议论文]
11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012, Liverpool, United kingdom, June 25, 2012 - June 27, 2012
Chang Dexian
;
Chu Xiaobo
;
Qin Yu
;
Feng Dengguo
a new efficient property-based attestation protocol based on elliptic curves
[会议论文]
11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012, Liverpool, United kingdom, June 25, 2012 - June 27, 2012
Chu Xiaobo
;
Yu Qin
daa protocol analysis and verification
[会议论文]
3rd International Conference on Trusted Systems, INTRUST 2011, Beijing, China, November 27, 2011 - November 29, 2011
Qin Yu
;
Chu Xiaobo
;
Feng Dengguo
;
Feng Wei
1
2
next
Copyright © 2007-2021
中国科学院软件研究所
-
Feedback
Powered by
CSpace