浏览/检索结果:共21条,第1-10条

已选(0)清除 条数/页:   排序方式:
Understanding and Detecting Privacy Leakage Vulnerabilities in Hyperledger Fabric Chaincodes 会议论文
Proceedings - International Symposium on Software Reliability Engineering, ISSRE, jpn,Tsukuba, 2024-10-28——2024-10-28
作者:  Chen,Ziming;  Li,Yue;  Gao,Jianbo;  Zhang,Jiashuo;  Wang,Ke
收藏  |  浏览/下载:4/0  |  提交时间:2025/08/05
Versatile routing and self-certifying features support for secure mobility in expressive internet architecture 期刊论文
China Communications,2017, 卷号: 14, 期号: 4, 页码: 73-88
作者:  Meng,Hongwei;  Chen,Zhong;  Hu,Jianbin;  Song,Chuck;  Tang,Cong
收藏  |  浏览/下载:0/0  |  提交时间:2025/08/05
Making tagging systems resistant to tricky spam attacks 会议论文
Proceedings - 2015 IEEE 12th International Conference on Ubiquitous Intelligence and Computing, 2015 IEEE 12th International Conference on Advanced and Trusted Computing, 2015 IEEE 15th International Conference on Scalable Computing and Communications, 2015 IEEE International Conference on Cloud and Big Data Computing, 2015 IEEE International Conference on Internet of People and Associated Symposia/Workshops, UIC-ATC-ScalCom-CBDCom-IoP 2015, chn,Beijing, 2015-08-10——2015-08-10
作者:  Li,Zhou;  Tang,Cong;  Hu,Jianbin;  Chen,Zhong
收藏  |  浏览/下载:0/0  |  提交时间:2025/08/05
Vulnerabilities scoring approach for cloud saas 会议论文
Proceedings - 2015 IEEE 12th International Conference on Ubiquitous Intelligence and Computing, 2015 IEEE 12th International Conference on Advanced and Trusted Computing, 2015 IEEE 15th International Conference on Scalable Computing and Communications, 2015 IEEE International Conference on Cloud and Big Data Computing, 2015 IEEE International Conference on Internet of People and Associated Symposia/Workshops, UIC-ATC-ScalCom-CBDCom-IoP 2015, chn,Beijing, 2015-08-10——2015-08-10
作者:  Li,Zhou;  Tang,Cong;  Hu,Jianbin;  Chen,Zhong
收藏  |  浏览/下载:0/0  |  提交时间:2025/08/05
Establish the intrinsic binding in naming space for future internet using combined public key 会议论文
ACM International Conference Proceeding Series, chn,Nanjing, 2016-06-15——2016-06-15
作者:  Meng,Hongwei;  Chen,Zhong;  Hu,Jianbin;  Guan,Zhi
收藏  |  浏览/下载:1/0  |  提交时间:2025/08/05
A practical dynamic integrity protection model 期刊论文
Jisuanji Yanjiu yu Fazhan/Computer Research and Development,2013, 卷号: 50, 期号: 10, 页码: 2082-2091
作者:  Yang,Tao;  Wang,Yonggang;  Tang,Liyong;  Kong,Lingbo;  Hu,Jianbin
收藏  |  浏览/下载:1/0  |  提交时间:2025/08/05
Research on countermeasures against tag spam 期刊论文
Jisuanji Yanjiu yu Fazhan/Computer Research and Development,2013, 卷号: 50, 期号: 10, 页码: 2029-2043
作者:  Wang,Yonggang;  Yan,Hanbing;  Xu,Junfeng;  Hu,Jianbin;  Chen,Zhong
收藏  |  浏览/下载:1/0  |  提交时间:2025/08/05
Security flaw of an ECC-based signcryption scheme with anonymity 期刊论文
International Journal of Network Security,2013, 卷号: 15, 期号: 4, 页码: 317-320
作者:  Xiong,Hu;  Hu,Jianbin;  Chen,Zhong
收藏  |  浏览/下载:0/0  |  提交时间:2025/08/05
Further improvement of an authentication scheme with user anonymity for wireless communications 期刊论文
International Journal of Network Security,2012, 卷号: 14, 期号: 5, 页码: 297-300
作者:  Hu,Jianbin;  Xiong,Hu;  Chen,Zhong
收藏  |  浏览/下载:1/0  |  提交时间:2025/08/05
On the security of an identity based multi-proxy signature scheme 期刊论文
Computers and Electrical Engineering,2011, 卷号: 37, 期号: 2, 页码: 129-135
作者:  Xiong,Hu;  Hu,Jianbin;  Chen,Zhong;  Li,Fagen
收藏  |  浏览/下载:0/0  |  提交时间:2025/08/05