CORC

浏览/检索结果: 共138条,第1-10条 帮助

已选(0)清除 条数/页:   排序方式:
The theory and practice in the evolution of trusted computing 期刊论文
CHINESE SCIENCE BULLETIN, 2014, 卷号: 59, 期号: 32, 页码: 4173-4189
Feng, Dengguo; Qin, Yu; Feng, Wei; Shao, Jianxiong
收藏  |  浏览/下载:22/0  |  提交时间:2014/12/16
Formal analysis of TPM2.0 key management APIs 期刊论文
CHINESE SCIENCE BULLETIN, 2014, 卷号: 59, 期号: 32, 页码: 4210-4224
Zhang, Qianying; Zhao, Shijun; Qin, Yu; Feng, Dengguo
收藏  |  浏览/下载:24/0  |  提交时间:2014/12/16
Constant-round zero-knowledge proofs of knowledge with strict polynomial-time extractors for NP 期刊论文
Science China Information Sciences, 2014, 卷号: 57, 期号: 1, 页码: 1-14
Li, HongDa (1); Feng, DengGuo (2)
收藏  |  浏览/下载:14/0  |  提交时间:2014/12/16
ExBLACR: Extending BLACR system 会议论文
19th Australasian Conference on Information Security and Privacy, ACISP 2014, Wollongong, NSW, Australia, July 7, 2014 - July 9, 2014
Wang, Weijin (1); Feng, Dengguo (1); Qin, Yu (1); Shao, Jianxiong (1); Xi, Li (1); Chu, Xiaobo (1)
收藏  |  浏览/下载:54/0  |  提交时间:2014/12/16
A Novel privacy-preserving group matching scheme in social networks 会议论文
15th International Conference on Web-Age Information Management, WAIM 2014, Macau, China, June 16, 2014 - June 18, 2014
Chi, Jialin (1); Lv, Zhiquan (1); Zhang, Min (1); Li, Hao (1); Hong, Cheng (1); Feng, Dengguo (1)
收藏  |  浏览/下载:22/0  |  提交时间:2014/12/16
DAA-related APIs in TPM 2.0 revisited 会议论文
7th International Conference on Trust and Trustworthy Computing, TRUST 2014, Heraklion, Crete, Greece, June 30, 2014 - July 2, 2014
Xi, Li (1); Yang, Kang (1); Zhang, Zhenfeng (1); Feng, Dengguo (1)
收藏  |  浏览/下载:19/0  |  提交时间:2014/12/16
Automated proof for authorization protocols of TPM 2.0 in computational model 会议论文
10th International Conference on Information Security Practice and Experience, ISPEC 2014, Fuzhou, China, May 5, 2014 - May 8, 2014
Wang, Weijin (1); Qin, Yu (1); Feng, Dengguo (1)
收藏  |  浏览/下载:17/0  |  提交时间:2014/12/16
SPECIAL TOPIC: Network and Information Security Preface 期刊论文
CHINESE SCIENCE BULLETIN, 2014, 卷号: 59, 期号: 32, 页码: 4161-4162
Feng, Dengguo
收藏  |  浏览/下载:9/0  |  提交时间:2014/12/16
bind your phone number with caution: automated user profiling through address book matching on smartphone 会议论文
8th ACM SIGSAC Symposium on Information, Computer and Communications Security, ASIA CCS 2013, Hangzhou, China, May 8, 2013 - May 10, 2013
Cheng Yao; Ying Lingyun; Jiao Sibei; Su Purui; Feng Dengguo
收藏  |  浏览/下载:14/0  |  提交时间:2013/09/22
fully secure attribute-based systems with short ciphertexts/signatures and threshold access structures 会议论文
Cryptographers' Track at the RSA Conference 2013, CT-RSA 2013, San Francisco, CA, United states, February 25, 2013 - March 1, 2013
Chen Cheng; Chen Jie; Lim Hoon Wei; Zhang Zhenfeng; Feng Dengguo; Ling San; Wang Huaxiong
收藏  |  浏览/下载:23/0  |  提交时间:2013/09/22


©版权所有 ©2017 CSpace - Powered by CSpace