×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
软件研究所 [10]
北京大学 [6]
化学研究所 [4]
大连化学物理研究所 [1]
内容类型
期刊论文 [13]
会议论文 [6]
其他 [2]
发表日期
2014 [1]
2013 [2]
2012 [4]
2011 [2]
2010 [4]
2009 [1]
更多...
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共21条,第1-10条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
The theory and practice in the evolution of trusted computing
期刊论文
CHINESE SCIENCE BULLETIN, 2014, 卷号: 59, 期号: 32, 页码: 4173-4189
Feng, Dengguo
;
Qin, Yu
;
Feng, Wei
;
Shao, Jianxiong
收藏
  |  
浏览/下载:22/0
  |  
提交时间:2014/12/16
Trusted computing
TPM
TCM
Direct anonymous attestation
Trusted network connection
Trust chain
fully secure attribute-based systems with short ciphertexts/signatures and threshold access structures
会议论文
Cryptographers' Track at the RSA Conference 2013, CT-RSA 2013, San Francisco, CA, United states, February 25, 2013 - March 1, 2013
Chen Cheng
;
Chen Jie
;
Lim Hoon Wei
;
Zhang Zhenfeng
;
Feng Dengguo
;
Ling San
;
Wang Huaxiong
收藏
  |  
浏览/下载:23/0
  |  
提交时间:2013/09/22
Concrete construction
Concretes
Network security
TEEM: A user-oriented trusted mobile device for multi-platform security applications
会议论文
6th International Conference on Trust and Trustworthy Computing, TRUST 2013, London, United kingdom, June 17, 2013 - June 19, 2013
Feng, Wei (1)
;
Feng, Dengguo (1)
;
Wei, Ge (2)
;
Qin, Yu (1)
;
Zhang, Qianying (1)
;
Chang, Dexian (1)
收藏
  |  
浏览/下载:9/0
  |  
提交时间:2014/12/16
combined public-key schemes: the case of abe and abs
会议论文
6th International Conference on Provable Security, ProvSec 2012, Chengdu, China, September 26, 2012 - September 28, 2012
Chen Cheng
;
Chen Jie
;
Lim Hoon Wei
;
Zhang Zhenfeng
;
Feng Dengguo
收藏
  |  
浏览/下载:16/0
  |  
提交时间:2013/09/22
Concrete construction
benchmarking for steganography by kernel fisher discriminant criterion
会议论文
7th China International Conference on Information Security and Cryptography, Inscrypt 2011, Beijing, China, November 30, 2011 - December 3, 2011
Huang Wei
;
Zhao Xianfeng
;
Feng Dengguo
;
Sheng Rennong
收藏
  |  
浏览/下载:24/0
  |  
提交时间:2013/09/22
Algorithms
Cryptography
Steganography
daa protocol analysis and verification
会议论文
3rd International Conference on Trusted Systems, INTRUST 2011, Beijing, China, November 27, 2011 - November 29, 2011
Qin Yu
;
Chu Xiaobo
;
Feng Dengguo
;
Feng Wei
收藏
  |  
浏览/下载:8/0
  |  
提交时间:2013/09/22
Artificial intelligence
understanding and analyzing network traffic
期刊论文
IEEE Network, 2012, 卷号: 26, 期号: 1, 页码: 41004
Wang Wei
;
Zhang Xiangliang
;
Shi Wenchang
;
Lian Shiguo
;
Feng Dengguo
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2012/11/12
a drtm-based method for trusted network connection
会议论文
10th IEEE Int. Conf. on Trust, Security and Privacy in Computing and Communications, TrustCom 2011, 8th IEEE Int. Conf. on Embedded Software and Systems, ICESS 2011, 6th Int. Conf. on Frontier of Computer Science and Technology, FCST 2011, Changsha, China, November 1
Feng Wei
;
Qin Yu
;
Yu Ai-Min
;
Feng Dengguo
收藏
  |  
浏览/下载:11/0
  |  
提交时间:2013/10/08
Access control
Computer privacy
Software agents
Software reliability
network traffic monitoring, analysis and anomaly detection [guest editorial]
期刊论文
IEEE Network, 2011, 卷号: 25, 期号: 3, 页码: 4-7
Wang Wei
;
Zhang Xiangliang
;
Shi Wenchang
;
Lian Shiguo
;
Feng Dengguo
收藏
  |  
浏览/下载:12/0
  |  
提交时间:2013/10/08
Binding Energy Landscape Analysis Helps to Discriminate True Hits from High-Scoring Decoys in Virtual Screening
期刊论文
JOURNAL OF CHEMICAL INFORMATION AND MODELING, 2010, 卷号: 50, 期号: 10, 页码: 1855-1864
作者:
Wei, Dengguo
;
Zheng, Hao
;
Su, Naifang
;
Deng, Minghua
;
Lai, Luhua
收藏
  |  
浏览/下载:11/0
  |  
提交时间:2019/04/09
©版权所有 ©2017 CSpace - Powered by
CSpace