CORC

浏览/检索结果: 共21条,第1-10条 帮助

已选(0)清除 条数/页:   排序方式:
The theory and practice in the evolution of trusted computing 期刊论文
CHINESE SCIENCE BULLETIN, 2014, 卷号: 59, 期号: 32, 页码: 4173-4189
Feng, Dengguo; Qin, Yu; Feng, Wei; Shao, Jianxiong
收藏  |  浏览/下载:22/0  |  提交时间:2014/12/16
fully secure attribute-based systems with short ciphertexts/signatures and threshold access structures 会议论文
Cryptographers' Track at the RSA Conference 2013, CT-RSA 2013, San Francisco, CA, United states, February 25, 2013 - March 1, 2013
Chen Cheng; Chen Jie; Lim Hoon Wei; Zhang Zhenfeng; Feng Dengguo; Ling San; Wang Huaxiong
收藏  |  浏览/下载:23/0  |  提交时间:2013/09/22
TEEM: A user-oriented trusted mobile device for multi-platform security applications 会议论文
6th International Conference on Trust and Trustworthy Computing, TRUST 2013, London, United kingdom, June 17, 2013 - June 19, 2013
Feng, Wei (1); Feng, Dengguo (1); Wei, Ge (2); Qin, Yu (1); Zhang, Qianying (1); Chang, Dexian (1)
收藏  |  浏览/下载:9/0  |  提交时间:2014/12/16
combined public-key schemes: the case of abe and abs 会议论文
6th International Conference on Provable Security, ProvSec 2012, Chengdu, China, September 26, 2012 - September 28, 2012
Chen Cheng; Chen Jie; Lim Hoon Wei; Zhang Zhenfeng; Feng Dengguo
收藏  |  浏览/下载:16/0  |  提交时间:2013/09/22
benchmarking for steganography by kernel fisher discriminant criterion 会议论文
7th China International Conference on Information Security and Cryptography, Inscrypt 2011, Beijing, China, November 30, 2011 - December 3, 2011
Huang Wei; Zhao Xianfeng; Feng Dengguo; Sheng Rennong
收藏  |  浏览/下载:24/0  |  提交时间:2013/09/22
daa protocol analysis and verification 会议论文
3rd International Conference on Trusted Systems, INTRUST 2011, Beijing, China, November 27, 2011 - November 29, 2011
Qin Yu; Chu Xiaobo; Feng Dengguo; Feng Wei
收藏  |  浏览/下载:8/0  |  提交时间:2013/09/22
understanding and analyzing network traffic 期刊论文
IEEE Network, 2012, 卷号: 26, 期号: 1, 页码: 41004
Wang Wei; Zhang Xiangliang; Shi Wenchang; Lian Shiguo; Feng Dengguo
收藏  |  浏览/下载:7/0  |  提交时间:2012/11/12
a drtm-based method for trusted network connection 会议论文
10th IEEE Int. Conf. on Trust, Security and Privacy in Computing and Communications, TrustCom 2011, 8th IEEE Int. Conf. on Embedded Software and Systems, ICESS 2011, 6th Int. Conf. on Frontier of Computer Science and Technology, FCST 2011, Changsha, China, November 1
Feng Wei; Qin Yu; Yu Ai-Min; Feng Dengguo
收藏  |  浏览/下载:11/0  |  提交时间:2013/10/08
network traffic monitoring, analysis and anomaly detection [guest editorial] 期刊论文
IEEE Network, 2011, 卷号: 25, 期号: 3, 页码: 4-7
Wang Wei; Zhang Xiangliang; Shi Wenchang; Lian Shiguo; Feng Dengguo
收藏  |  浏览/下载:12/0  |  提交时间:2013/10/08
Binding Energy Landscape Analysis Helps to Discriminate True Hits from High-Scoring Decoys in Virtual Screening 期刊论文
JOURNAL OF CHEMICAL INFORMATION AND MODELING, 2010, 卷号: 50, 期号: 10, 页码: 1855-1864
作者:  Wei, Dengguo;  Zheng, Hao;  Su, Naifang;  Deng, Minghua;  Lai, Luhua
收藏  |  浏览/下载:11/0  |  提交时间:2019/04/09


©版权所有 ©2017 CSpace - Powered by CSpace