×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
软件研究所 [48]
内容类型
会议论文 [48]
发表日期
2014 [2]
2013 [3]
2012 [7]
2011 [7]
2010 [9]
2009 [5]
更多...
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共48条,第1-10条
帮助
限定条件
内容类型:会议论文
专题:软件研究所
第一署名单位
第一作者单位
通讯作者单位
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
ExBLACR: Extending BLACR system
会议论文
19th Australasian Conference on Information Security and Privacy, ACISP 2014, Wollongong, NSW, Australia, July 7, 2014 - July 9, 2014
Wang, Weijin (1)
;
Feng, Dengguo (1)
;
Qin, Yu (1)
;
Shao, Jianxiong (1)
;
Xi, Li (1)
;
Chu, Xiaobo (1)
收藏
  |  
浏览/下载:54/0
  |  
提交时间:2014/12/16
Automated proof for authorization protocols of TPM 2.0 in computational model
会议论文
10th International Conference on Information Security Practice and Experience, ISPEC 2014, Fuzhou, China, May 5, 2014 - May 8, 2014
Wang, Weijin (1)
;
Qin, Yu (1)
;
Feng, Dengguo (1)
收藏
  |  
浏览/下载:17/0
  |  
提交时间:2014/12/16
Cryptanalysis of Helix and Phelix revisited
会议论文
18th Australasian Conference on Information Security and Privacy, ACISP 2013, Brisbane, QLD, Australia, July 1, 2013 - July 3, 2013
Shi, Zhenqing (1)
;
Zhang, Bin (2)
;
Feng, Dengguo (1)
收藏
  |  
浏览/下载:16/0
  |  
提交时间:2014/12/16
Leaked-state-forgery attack against the authenticated encryption algorithm ALE
会议论文
19th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2013, Bengaluru, India, December 1, 2013 - December 5, 2013
Wu, Shengbao (1)
;
Wu, Hongjun (2)
;
Huang, Tao (2)
;
Wang, Mingsheng (4)
;
Wu, Wenling (1)
收藏
  |  
浏览/下载:10/0
  |  
提交时间:2014/12/16
boomerang and slide-rotational analysis of the sm3 hash function
会议论文
19th International Conference on Selected Areas in Cryptography, SAC 2012, Windsor, ON, Canada, August 15, 2012 - August 16, 2012
Kircanski Aleksandar
;
Shen Yanzhao
;
Wang Gaoli
;
Youssef Amr M.
收藏
  |  
浏览/下载:8/0
  |  
提交时间:2013/09/22
Artificial intelligence
quality-optimized authentication of scalable media streams with flexible transcoding over wireless networks
会议论文
2012 3rd FTRA International Conference on Mobile, Ubiquitous, and Intelligent Computing, MUSIC 2012, Vancouver, BC, Canada, June 26, 2012 - June 28, 2012
Yi Xiaowei
;
Li Mingyu
;
Zheng Gang
;
Zheng Changwen
收藏
  |  
浏览/下载:13/0
  |  
提交时间:2013/09/22
Electronic document identification systems
Image coding
Image compression
Intelligent computing
Media streaming
Optimization
cryptanalysis of an efficient three-party key exchange protocol
会议论文
2012 4th International Conference on Intelligent Networking and Collaborative Systems, INCoS 2012, Bucharest, Romania, September 19, 2012 - September 21, 2012
Fu Xiaotong
;
Shi Ruijun
收藏
  |  
浏览/下载:10/0
  |  
提交时间:2013/09/22
an identity-based authentication scheme in cloud computing
会议论文
2012 International Conference on Industrial Control and Electronics Engineering, ICICEE 2012, Xi'an, China, August 23, 2012 - August 25, 2012
Zhang Zhi-Hua
;
Jiang Xue-Feng
;
Li Jian-Jun
;
Jiang Wei
收藏
  |  
浏览/下载:15/0
  |  
提交时间:2013/09/22
Cloud computing
Communication
Electronic commerce
Electronics engineering
toward real-life implementation of signature schemes from the strong rsa assumption
会议论文
15th International Conference on Financial Cryptography and Data Security, FC 2011, St. Lucia, QLD, Australia, February 28, 2011 - March 4, 2011
Yu Ping
;
Xue Rui
收藏
  |  
浏览/下载:11/0
  |  
提交时间:2013/09/22
Authentication
Costs
Cryptography
Efficiency
Electronic document identification systems
an new anonymous authentication scheme for cloud computing
会议论文
2012 7th International Conference on Computer Science and Education, ICCSE 2012, Melbourne, VIC, Australia, July 14, 2012 - July 17, 2012
Zhang Zhi-Hua
;
Li Jian-Jun
;
Jiang Wei
;
Zhao Yong
;
Gong Bei
收藏
  |  
浏览/下载:12/0
  |  
提交时间:2013/09/22
Computer science
Education computing
Engineering education
©版权所有 ©2017 CSpace - Powered by
CSpace