×
验证码:
换一张
忘记密码?
记住我
×
登录
中文
|
English
学校主页
|
图书馆
登录
注册
首页
学术成果
学院
学者
数据分析
检索
ALL
ORCID
题名
作者
发表日期
关键词
文献类型
原始文献类型
收录类别
出版者
状态
学院
个人在本单位外知识产出
8
作者
陈钟
4
文献类型
期刊论文
5
会议论文
3
发表日期
2017
1
2016
3
2012
2
2011
2
语种
英语English
7
中文Chinese
1
收录类别
CPCI-S
2
SCIE
1
资助机构
关键词
Automated verification
1
CVSS
1
Declassification
1
Information flow
1
Information flow security
1
Noninterference
1
更多...
出处
Proceedings - 2015 IEEE 12t...
2
China Communications
1
Cryptology and Information ...
1
Jisuanji Yanjiu yu Fazhan/C...
1
Proceedings - 2011 8th Inte...
1
Ruan Jian Xue Bao/Journal o...
1
更多...
资助项目
×
知识图谱
反馈留言
浏览/检索结果:共8条,第1-8条
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
题名升序
题名降序
作者升序
作者降序
WOS被引频次升序
WOS被引频次降序
发表日期升序
发表日期降序
期刊影响因子升序
期刊影响因子降序
提交时间升序
提交时间降序
Versatile routing and self-certifying features support for secure mobility in expressive internet architecture
期刊论文
China Communications,2017, 卷号: 14, 期号: 4, 页码: 73-88
作者:
Meng, Hongwei
;
Chen, Zhong
;
Hu, Jianbin
;
Song, Chuck
;
Tang, Cong
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2025/08/05
expressive Internet architecture
future Internet architecture
mobility
security
self-certifying
面向SaaS云平台的安全漏洞评分方法研究
期刊论文
通信学报,2016, 卷号: 37, 期号: 8, 页码: 157-166
作者:
李舟
;
唐聪
;
胡建斌
;
陈钟
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2025/08/05
云服务
CVSS
SaaS
漏洞评分系统
Vulnerabilities scoring approach for cloud saas
会议论文
Proceedings - 2015 IEEE 12th International Conference on Ubiquitous Intelligence and Computing, 2015 IEEE 12th International Conference on Advanced and Trusted Computing, 2015 IEEE 15th International Conference on Scalable Computing and Communications, 2015 IEEE International Conference on Cloud and Big Data Computing, 2015 IEEE International Conference on Internet of People and Associated Symposia/Workshops, UIC-ATC-ScalCom-CBDCom-IoP 2015, Beijing, China, 10-14 Aug. 2015
作者:
Li, Zhou
;
Tang, Cong
;
Hu, Jianbin
;
Chen, Zhong
收藏
  |  
浏览/下载:6/0
  |  
提交时间:2025/08/05
Making tagging systems resistant to tricky spam attacks
会议论文
Proceedings - 2015 IEEE 12th International Conference on Ubiquitous Intelligence and Computing, 2015 IEEE 12th International Conference on Advanced and Trusted Computing, 2015 IEEE 15th International Conference on Scalable Computing and Communications, 2015 IEEE International Conference on Cloud and Big Data Computing, 2015 IEEE International Conference on Internet of People and Associated Symposia/Workshops, UIC-ATC-ScalCom-CBDCom-IoP 2015, Beijing, China, 10-14 Aug. 2015
作者:
Li, Zhou
;
Tang, Cong
;
Hu, Jianbin
;
Chen, Zhong
收藏
  |  
浏览/下载:6/0
  |  
提交时间:2025/08/05
Secure information flow in Java by optimized reachability analysis of weighted pushdown system
期刊论文
Jisuanji Yanjiu yu Fazhan/Computer Research and Development,2012, 卷号: 49, 期号: 5, 页码: 901-912
作者:
Sun,Cong
;
Tang,Liyong
;
Chen,Zhong
;
Ma,Jianfeng
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2025/08/05
Information flow
Noninterference
Reachability analysis
Self-composition
Weighted pushdown system
Declassification enforcement on program with reachability analysis of pushdown system
期刊论文
Ruan Jian Xue Bao/Journal of Software,2012, 卷号: 23, 期号: 8, 页码: 2149-2162
作者:
Sun,Cong
;
Tang,Li Yong
;
Chen,Zhong
收藏
  |  
浏览/下载:1/0
  |  
提交时间:2025/08/05
Automated verification
Declassification
Information flow security
Program analysis
Pushdown system
Enforcing reactive noninterference with reachability analysis
会议论文
Proceedings - 2011 8th International Conference on Information Technology: New Generations, ITNG 2011
作者:
Sun,Cong
;
Tang,Liyong
;
Chen,Zhong
收藏
  |  
浏览/下载:1/0
  |  
提交时间:2025/08/05
information flow
noninterference
program analysis
pushdown system
reactive program
MEED: A memory-efficient distance bounding protocol with error detection
期刊论文
Cryptology and Information Security Series,2011, 卷号: 6, 页码: 129-143
作者:
Xin,Wei
;
Tang,Cong
;
Xiong,Hu
;
Wang,Yonggang
;
Sun,Huiping
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2025/08/05
distance bounding protocol
relay attack
RFID