×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
软件研究所 [24]
内容类型
会议论文 [24]
发表日期
2014 [2]
2013 [1]
2012 [9]
2011 [3]
2010 [4]
2009 [4]
更多...
学科主题
计算机软件::软件工... [1]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共24条,第1-10条
帮助
限定条件
内容类型:会议论文
专题:软件研究所
第一署名单位
第一作者单位
通讯作者单位
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
发表日期升序
发表日期降序
提交时间升序
提交时间降序
题名升序
题名降序
作者升序
作者降序
High performance two-dimensional phase unwrapping on gpus
会议论文
11th ACM International Conference on Computing Frontiers, CF 2014, Cagliari, Italy, May 20, 2014 - May 22, 2014
Wu, Zhenhua (1)
;
Ma, Wenjing (1)
;
Long, Guoping (1)
;
Li, Yucheng (1)
;
Tang, Qiuyan (2)
;
Wang, Zhongjie (2)
收藏
  |  
浏览/下载:19/0
  |  
提交时间:2014/12/16
Bisimulations and logical characterizations on continuous-time markov decision processes
会议论文
15th International Conference on Verification, Model Checking, and Abstract Interpretation, VMCAI 2014, San Diego, CA, United states, January 20, 2014 - January 21, 2014
Song, Lei (1)
;
Zhang, Lijun (2)
;
Godskesen, Jens Chr. (3)
收藏
  |  
浏览/下载:15/0
  |  
提交时间:2014/12/16
标准模型下增强的基于属性的认证密钥协商协议
会议论文
2013中国计算机大会, 长沙, 2013
李强
;
冯登国
;
张立武
;
高志刚
收藏
  |  
浏览/下载:10/0
  |  
提交时间:2014/12/16
认证
密钥协商
基于属性
CK+模型
标准模型
deterministic public key encryption and identity-based encryption from lattices in the auxiliary-input setting
会议论文
8th International Conference on Security and Cryptography for Networks, SCN 2012, Amalfi, Italy, September 5, 2012 - September 7, 2012
Xie Xiang
;
Xue Rui
;
Zhang Rui
收藏
  |  
浏览/下载:9/0
  |  
提交时间:2013/09/22
Crystal lattices
Quantum theory
Security of data
combined public-key schemes: the case of abe and abs
会议论文
6th International Conference on Provable Security, ProvSec 2012, Chengdu, China, September 26, 2012 - September 28, 2012
Chen Cheng
;
Chen Jie
;
Lim Hoon Wei
;
Zhang Zhenfeng
;
Feng Dengguo
收藏
  |  
浏览/下载:16/0
  |  
提交时间:2013/09/22
Concrete construction
exploiting ontology reasoning in e-learning
会议论文
2012 2nd International Conference on Electric and Electronics, EEIC 2012, Sanya, China, April 21, 2012 - April 22, 2012
Du Jianfeng
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2013/09/22
Data description
Semantic Web
constructing a data accessing layer for in-memory data grid
会议论文
4th Asia-Pacific Symposium on Internetware, Internetware 2012, Qingdao, China, October 30, 2012 - October 31, 2012
Ji Shuping
;
Wang Wei
;
Ye Chunyang
;
Wei Jun
;
Liu Zhaohui
收藏
  |  
浏览/下载:58/0
  |  
提交时间:2013/09/22
Data processing
Middleware
Product design
an attribute based encryption scheme with fine-grained attribute revocation
会议论文
2012 IEEE Global Communications Conference, GLOBECOM 2012, Anaheim, CA, United states, December 3, 2012 - December 7, 2012
Li Qiang
;
Feng Dengguo
;
Zhang Liwu
收藏
  |  
浏览/下载:13/0
  |  
提交时间:2013/09/22
Access control
Communication
toward real-life implementation of signature schemes from the strong rsa assumption
会议论文
15th International Conference on Financial Cryptography and Data Security, FC 2011, St. Lucia, QLD, Australia, February 28, 2011 - March 4, 2011
Yu Ping
;
Xue Rui
收藏
  |  
浏览/下载:11/0
  |  
提交时间:2013/09/22
Authentication
Costs
Cryptography
Efficiency
Electronic document identification systems
fully secure doubly-spatial encryption under simple assumptions
会议论文
6th International Conference on Provable Security, ProvSec 2012, Chengdu, China, September 26, 2012 - September 28, 2012
Chen Cheng
;
Zhang Zhenfeng
;
Feng Dengguo
收藏
  |  
浏览/下载:12/0
  |  
提交时间:2013/09/22
Artificial intelligence
©版权所有 ©2017 CSpace - Powered by
CSpace