CORC

浏览/检索结果: 共25条,第1-10条 帮助

已选(0)清除 条数/页:   排序方式:
基于 TPM 2.0 的协议设计与分析研究 学位论文
博士, 北京: 中国科学院研究生院, 2019
作者:  王微谨
收藏  |  浏览/下载:194/0  |  提交时间:2019/07/03
a new efficient property-based attestation protocol based on elliptic curves 会议论文
11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012, Liverpool, United kingdom, June 25, 2012 - June 27, 2012
Chu Xiaobo; Yu Qin
收藏  |  浏览/下载:13/0  |  提交时间:2013/09/22
基于可信计算的策略标签保护架构 期刊论文
计算机研究与发展, 2011, 卷号: 48, 期号: 12, 页码: 2219-2226
刘孜文; 冯登国; 于爱民
收藏  |  浏览/下载:8/0  |  提交时间:2013/10/08
a variant of boyen-waters anonymous ibe scheme 会议论文
13th International Conference on Information and Communications Security, ICICS 2011, Beijing, China, November 2
Luo Song; Shen Qingni; Jin Yongming; Chen Yu; Chen Zhong; Qing Sihan
收藏  |  浏览/下载:15/0  |  提交时间:2013/10/08
a drtm-based method for trusted network connection 会议论文
10th IEEE Int. Conf. on Trust, Security and Privacy in Computing and Communications, TrustCom 2011, 8th IEEE Int. Conf. on Embedded Software and Systems, ICESS 2011, 6th Int. Conf. on Frontier of Computer Science and Technology, FCST 2011, Changsha, China, November 1
Feng Wei; Qin Yu; Yu Ai-Min; Feng Dengguo
收藏  |  浏览/下载:12/0  |  提交时间:2013/10/08
computational soundness about formal encryption in the presence of secret shares and key cycles 会议论文
13th International Conference on Information and Communications Security, ICICS 2011, Beijing, China, November 2
Lei Xinfeng; Xue Rui; Yu Ting
收藏  |  浏览/下载:7/0  |  提交时间:2013/10/08
a multi-compositional enforcement on information flow security 会议论文
13th International Conference on Information and Communications Security, ICICS 2011, Beijing, China, November 2
Sun Cong; Zhai Ennan; Chen Zhong; Ma Jianfeng
收藏  |  浏览/下载:15/0  |  提交时间:2013/10/08
obtaining the integrity of your virtual machine in the cloud 会议论文
2011 3rd IEEE International Conference on Cloud Computing Technology and Science, CloudCom 2011, Athens, Greece, November 29, 2011 - December 1, 2011
Yu Aimin; Qin Yu; Wang Dan
收藏  |  浏览/下载:12/0  |  提交时间:2013/10/08
a property-based attestation scheme with the variable privacy 会议论文
10th IEEE Int. Conf. on Trust, Security and Privacy in Computing and Communications, TrustCom 2011, 8th IEEE Int. Conf. on Embedded Software and Systems, ICESS 2011, 6th Int. Conf. on Frontier of Computer Science and Technology, FCST 2011, Changsha, China, November 1
Qin Yu; Chang Dexian; Zhao Shijun; Zhang Qianying
收藏  |  浏览/下载:12/0  |  提交时间:2013/10/08
improvement and analysis of vdp method in time/memory tradeoff applications 会议论文
13th International Conference on Information and Communications Security, ICICS 2011, Beijing, China, November 2
Wang Wenhao; Lin Dongdai; Li Zhenqi; Wang Tianze
收藏  |  浏览/下载:7/0  |  提交时间:2013/10/08


©版权所有 ©2017 CSpace - Powered by CSpace