CORC

浏览/检索结果: 共79条,第1-10条 帮助

限定条件                
已选(0)清除 条数/页:   排序方式:
基于 TPM 2.0 的协议设计与分析研究 学位论文
博士, 北京: 中国科学院研究生院, 2019
作者:  王微谨
收藏  |  浏览/下载:192/0  |  提交时间:2019/07/03
Security analysis of a privacy-preserving decentralized ciphertext-policy attribute-based encryption scheme 期刊论文
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2016, 卷号: 28, 期号: 4, 页码: 1237-1245
Wang, MQ; Zhang, ZF; Chen, C
收藏  |  浏览/下载:28/0  |  提交时间:2016/12/09
基于有向信息流的Android 隐私泄露类恶意应用检测方法 期刊论文
中国科学院大学学报, 2015, 卷号: 32, 期号: 6, 页码: 807-815
吴敬征; 武延军; 武志飞; 杨牧天; 罗天悦; 王永吉
收藏  |  浏览/下载:20/0  |  提交时间:2016/12/09
Generalized bisimulation metrics 会议论文
25th International Conference on Concurrency Theory, CONCUR 2014, Rome, Italy, September 2, 2014 - September 5, 2014
Chatzikokolakis, Konstantinos (1); Gebler, Daniel (3); Palamidessi, Catuscia (2); Xu, Lili (2)
收藏  |  浏览/下载:14/0  |  提交时间:2014/12/16
COMPARS: Toward an empirical approach for comparing the resilience of reputation systems 会议论文
4th ACM Conference on Data and Application Security and Privacy, CODASPY 2014, San Antonio, TX, United states, March 3, 2014 - March 5, 2014
Choo, Euijin (1); Jiang, Jianchun (2); Yu, Ting (3)
收藏  |  浏览/下载:25/0  |  提交时间:2014/12/16
Improved multidimensional zero-correlation linear cryptanalysis and applications to LBlock and TWINE 会议论文
19th Australasian Conference on Information Security and Privacy, ACISP 2014, Wollongong, NSW, Australia, July 7, 2014 - July 9, 2014
Wang, Yanfeng (1); Wu, Wenling (1)
收藏  |  浏览/下载:18/0  |  提交时间:2014/12/16
基于平滑投影散列函数的匿名凭证系统 期刊论文
计算机应用与软件, 2014, 期号: 10, 页码: 295-299
刘世超; 张立武
收藏  |  浏览/下载:23/0  |  提交时间:2014/12/16
大数据安全与隐私保护 期刊论文
计算机学报, 2014, 卷号: 37, 期号: 1, 页码: 246-258
冯登国; 张敏; 李昊
收藏  |  浏览/下载:123/0  |  提交时间:2014/12/16
ExBLACR: Extending BLACR system 会议论文
19th Australasian Conference on Information Security and Privacy, ACISP 2014, Wollongong, NSW, Australia, July 7, 2014 - July 9, 2014
Wang, Weijin (1); Feng, Dengguo (1); Qin, Yu (1); Shao, Jianxiong (1); Xi, Li (1); Chu, Xiaobo (1)
收藏  |  浏览/下载:54/0  |  提交时间:2014/12/16
Low data complexity inversion attacks on stream ciphers via truncated compressed preimage sets 会议论文
19th Australasian Conference on Information Security and Privacy, ACISP 2014, Wollongong, NSW, Australia, July 7, 2014 - July 9, 2014
Zhong, Xiao (1); Wang, Mingsheng (3); Zhang, Bin (1); Wu, Shengbao (1)
收藏  |  浏览/下载:10/0  |  提交时间:2014/12/16


©版权所有 ©2017 CSpace - Powered by CSpace