浏览/检索结果:共22条,第1-10条

已选(0)清除 条数/页:   排序方式:
Understanding and Detecting Privacy Leakage Vulnerabilities in Hyperledger Fabric Chaincodes 会议论文
Proceedings - International Symposium on Software Reliability Engineering, ISSRE, jpn,Tsukuba, 2024-10-28——2024-10-28
作者:  Chen,Ziming;  Li,Yue;  Gao,Jianbo;  Zhang,Jiashuo;  Wang,Ke
收藏  |  浏览/下载:4/0  |  提交时间:2025/08/05
Versatile routing and self-certifying features support for secure mobility in expressive internet architecture 期刊论文
China Communications,2017, 卷号: 14, 期号: 4, 页码: 73-88
作者:  Meng, Hongwei;  Chen, Zhong;  Hu, Jianbin;  Song, Chuck;  Tang, Cong
收藏  |  浏览/下载:4/0  |  提交时间:2025/08/05
面向SaaS云平台的安全漏洞评分方法研究 期刊论文
通信学报,2016, 卷号: 37, 期号: 8, 页码: 157-166
作者:  李舟;  唐聪;  胡建斌;  陈钟
收藏  |  浏览/下载:3/0  |  提交时间:2025/08/05
Vulnerabilities scoring approach for cloud saas 会议论文
Proceedings - 2015 IEEE 12th International Conference on Ubiquitous Intelligence and Computing, 2015 IEEE 12th International Conference on Advanced and Trusted Computing, 2015 IEEE 15th International Conference on Scalable Computing and Communications, 2015 IEEE International Conference on Cloud and Big Data Computing, 2015 IEEE International Conference on Internet of People and Associated Symposia/Workshops, UIC-ATC-ScalCom-CBDCom-IoP 2015, Beijing, China, 10-14 Aug. 2015
作者:  Li, Zhou;  Tang, Cong;  Hu, Jianbin
收藏  |  浏览/下载:6/0  |  提交时间:2025/08/05
Making tagging systems resistant to tricky spam attacks 会议论文
Proceedings - 2015 IEEE 12th International Conference on Ubiquitous Intelligence and Computing, 2015 IEEE 12th International Conference on Advanced and Trusted Computing, 2015 IEEE 15th International Conference on Scalable Computing and Communications, 2015 IEEE International Conference on Cloud and Big Data Computing, 2015 IEEE International Conference on Internet of People and Associated Symposia/Workshops, UIC-ATC-ScalCom-CBDCom-IoP 2015, Beijing, China, 10-14 Aug. 2015
作者:  Li, Zhou;  Tang, Cong;  Hu, Jianbin;  Chen, Zhong
收藏  |  浏览/下载:6/0  |  提交时间:2025/08/05
Establish the intrinsic binding in naming space for future internet using combined public key 会议论文
CFI '16: Proceedings of the 11th International Conference on Future Internet Technologies, Nanjing, China, 2016-06-15——2016-06-15
作者:  Meng, Hongwei;  Chen, Zhong;  Hu, Jianbin;  Guan, Zhi
收藏  |  浏览/下载:6/0  |  提交时间:2025/08/05
Research on countermeasures against tag spam 期刊论文
Jisuanji Yanjiu yu Fazhan/Computer Research and Development,2013, 卷号: 50, 期号: 10, 页码: 2029-2043
作者:  Wang,Yonggang;  Yan,Hanbing;  Xu,Junfeng;  Hu,Jianbin;  Chen,Zhong
收藏  |  浏览/下载:3/0  |  提交时间:2025/08/05
Security flaw of an ECC-based signcryption scheme with anonymity 期刊论文
International Journal of Network Security,2013, 卷号: 15, 期号: 4, 页码: 317-320
作者:  Xiong,Hu;  Hu,Jianbin;  Chen,Zhong
收藏  |  浏览/下载:2/0  |  提交时间:2025/08/05
A practical dynamic integrity protection model 期刊论文
Jisuanji Yanjiu yu Fazhan/Computer Research and Development,2013, 卷号: 50, 期号: 10, 页码: 2082-2091
作者:  Yang,Tao;  Wang,Yonggang;  Tang,Liyong;  Kong,Lingbo;  Hu,Jianbin
收藏  |  浏览/下载:3/0  |  提交时间:2025/08/05
Further improvement of an authentication scheme with user anonymity for wireless communications 期刊论文
International Journal of Network Security,2012, 卷号: 14, 期号: 5, 页码: 297-300
作者:  Hu,Jianbin;  Xiong,Hu;  Chen,Zhong
收藏  |  浏览/下载:2/0  |  提交时间:2025/08/05