浏览/检索结果:共8条,第1-8条

已选(0)清除 条数/页:   排序方式:
Versatile routing and self-certifying features support for secure mobility in expressive internet architecture 期刊论文
China Communications,2017, 卷号: 14, 期号: 4, 页码: 73-88
作者:  Meng, Hongwei;  Chen, Zhong;  Hu, Jianbin;  Song, Chuck;  Tang, Cong
收藏  |  浏览/下载:4/0  |  提交时间:2025/08/05
面向SaaS云平台的安全漏洞评分方法研究 期刊论文
通信学报,2016, 卷号: 37, 期号: 8, 页码: 157-166
作者:  李舟;  唐聪;  胡建斌;  陈钟
收藏  |  浏览/下载:4/0  |  提交时间:2025/08/05
Vulnerabilities scoring approach for cloud saas 会议论文
Proceedings - 2015 IEEE 12th International Conference on Ubiquitous Intelligence and Computing, 2015 IEEE 12th International Conference on Advanced and Trusted Computing, 2015 IEEE 15th International Conference on Scalable Computing and Communications, 2015 IEEE International Conference on Cloud and Big Data Computing, 2015 IEEE International Conference on Internet of People and Associated Symposia/Workshops, UIC-ATC-ScalCom-CBDCom-IoP 2015, Beijing, China, 10-14 Aug. 2015
作者:  Li, Zhou;  Tang, Cong;  Hu, Jianbin;  Chen, Zhong
收藏  |  浏览/下载:6/0  |  提交时间:2025/08/05
Making tagging systems resistant to tricky spam attacks 会议论文
Proceedings - 2015 IEEE 12th International Conference on Ubiquitous Intelligence and Computing, 2015 IEEE 12th International Conference on Advanced and Trusted Computing, 2015 IEEE 15th International Conference on Scalable Computing and Communications, 2015 IEEE International Conference on Cloud and Big Data Computing, 2015 IEEE International Conference on Internet of People and Associated Symposia/Workshops, UIC-ATC-ScalCom-CBDCom-IoP 2015, Beijing, China, 10-14 Aug. 2015
作者:  Li, Zhou;  Tang, Cong;  Hu, Jianbin;  Chen, Zhong
收藏  |  浏览/下载:6/0  |  提交时间:2025/08/05
Secure information flow in Java by optimized reachability analysis of weighted pushdown system 期刊论文
Jisuanji Yanjiu yu Fazhan/Computer Research and Development,2012, 卷号: 49, 期号: 5, 页码: 901-912
作者:  Sun,Cong;  Tang,Liyong;  Chen,Zhong;  Ma,Jianfeng
收藏  |  浏览/下载:2/0  |  提交时间:2025/08/05
Declassification enforcement on program with reachability analysis of pushdown system 期刊论文
Ruan Jian Xue Bao/Journal of Software,2012, 卷号: 23, 期号: 8, 页码: 2149-2162
作者:  Sun,Cong;  Tang,Li Yong;  Chen,Zhong
收藏  |  浏览/下载:1/0  |  提交时间:2025/08/05
Enforcing reactive noninterference with reachability analysis 会议论文
Proceedings - 2011 8th International Conference on Information Technology: New Generations, ITNG 2011
作者:  Sun,Cong;  Tang,Liyong;  Chen,Zhong
收藏  |  浏览/下载:1/0  |  提交时间:2025/08/05
MEED: A memory-efficient distance bounding protocol with error detection 期刊论文
Cryptology and Information Security Series,2011, 卷号: 6, 页码: 129-143
作者:  Xin,Wei;  Tang,Cong;  Xiong,Hu;  Wang,Yonggang;  Sun,Huiping
收藏  |  浏览/下载:2/0  |  提交时间:2025/08/05