中国科学院软件研究所机构知识库
Advanced  
ISCAS OpenIR

Search Results

Help

Item hits: (Results 1-10 of 61)

Filters        
Items/Page:    Sort:
depsim: a dependency-based malware similarity comparison system [会议论文]
6th China International Conference on Information Security and Cryptology, Inscrypt 2010, Shanghai, China, 20-Oct
Yi Yang; Lingyun Ying; Rui Wang; Purui Su; Dengguo Feng
  |  
 
bcbc: a more efficient mac algorithm [会议论文]
7th International Conference on Information Security Practice and Experience, ISPEC 2011, Guangzhou, China, 30-May-20
Liang Bo; Wu Wenling; Zhang Liting
  |  
 
collusion attack on a self-healing key distribution with revocation in wireless sensor networks [会议论文]
11th International Workshop on Information Security Applications, WISA 2010, Jeju Island, Korea, Republic of, August 24,
Bao Kehua; Zhang Zhenfeng
  |  
 
a short signature scheme from the rsa family [会议论文]
13th Information Security Conference, ISC 2010, Boca Raton, FL, United states, 25-Oct
Yu Ping; Xue Rui
  |  
 
acquiring key privacy from data privacy [会议论文]
6th China International Conference on Information Security and Cryptology, Inscrypt 2010, Shanghai, China, 20-Oct
Zhang Rui
  |  
 
an efficient group-based secret sharing scheme [会议论文]
7th International Conference on Information Security Practice and Experience, ISPEC 2011, Guangzhou, China, 30-May-20
Lv Chunli; Jia Xiaoqi; Lin Jingqiang; Jing Jiwu; Tian Lijun
  |  
 
attacking bivium and trivium with the characteristic set method [会议论文]
4th International Conference on the Theory and Application of Cryptographic Techniques, AFRICACRYPT 2011, Dakar, Senegal, 5-Jul-20
Huang Zhenyu; Lin Dongdai
  |  
 
gateway-oriented password-authenticated key exchange protocol with stronger security [会议论文]
5th International Conference on Provable Security, ProvSec 2011, Xi'an, China, 16-Oct
Wei Fushan; Ma Chuangui; Zhang Zhenfeng
  |  
 
general construction of chameleon all-but-one trapdoor functions [会议论文]
5th International Conference on Provable Security, ProvSec 2011, Xi'an, China, 16-Oct
Liu Shengli; Lai Junzuo; Deng Robert H.
  |  
 
polye+ctr: a swiss-army-knife mode for block ciphers [会议论文]
5th International Conference on Provable Security, ProvSec 2011, Xi'an, China, 16-Oct
Zhang Liting; Wu Wenling; Wang Peng
  |  
 

1 2 3 4 5 6 7 next

 

Valid XHTML 1.0!
Copyright © 2007-2020  中国科学院软件研究所 - Feedback
Powered by CSpace