浏览/检索结果:共8条,第1-8条

已选(0)清除 条数/页:   排序方式:
Versatile routing and self-certifying features support for secure mobility in expressive internet architecture 期刊论文
China Communications,2017, 卷号: 14, 期号: 4, 页码: 73-88
作者:  Meng, Hongwei;  Chen, Zhong;  Hu, Jianbin;  Song, Chuck;  Tang, Cong
收藏  |  浏览/下载:8/0  |  提交时间:2025/08/05
面向SaaS云平台的安全漏洞评分方法研究 期刊论文
通信学报,2016, 卷号: 37, 期号: 8, 页码: 157-166
作者:  李舟;  唐聪;  胡建斌;  陈钟
收藏  |  浏览/下载:18/0  |  提交时间:2025/08/05
Making tagging systems resistant to tricky spam attacks 会议论文
Proceedings - 2015 IEEE 12th International Conference on Ubiquitous Intelligence and Computing, 2015 IEEE 12th International Conference on Advanced and Trusted Computing, 2015 IEEE 15th International Conference on Scalable Computing and Communications, 2015 IEEE International Conference on Cloud and Big Data Computing, 2015 IEEE International Conference on Internet of People and Associated Symposia/Workshops, UIC-ATC-ScalCom-CBDCom-IoP 2015, Beijing, China, 10-14 Aug. 2015
作者:  Li, Zhou;  Tang, Cong;  Hu, Jianbin;  Chen, Zhong
收藏  |  浏览/下载:15/0  |  提交时间:2025/08/05
Vulnerabilities scoring approach for cloud saas 会议论文
Proceedings - 2015 IEEE 12th International Conference on Ubiquitous Intelligence and Computing, 2015 IEEE 12th International Conference on Advanced and Trusted Computing, 2015 IEEE 15th International Conference on Scalable Computing and Communications, 2015 IEEE International Conference on Cloud and Big Data Computing, 2015 IEEE International Conference on Internet of People and Associated Symposia/Workshops, UIC-ATC-ScalCom-CBDCom-IoP 2015, Beijing, China, 10-14 Aug. 2015
作者:  Li, Zhou;  Tang, Cong;  Hu, Jianbin;  Chen, Zhong
收藏  |  浏览/下载:25/0  |  提交时间:2025/08/05
基于加权下推系统优化可达性分析的Java安全信息流研究 期刊论文
计算机研究与发展,2012, 卷号: 49, 期号: 5, 页码: 901-912
作者:  孙聪;  唐礼勇;  陈钟;  马建峰
收藏  |  浏览/下载:14/0  |  提交时间:2025/08/05
基于下推系统可达性分析的程序机密消去机制 期刊论文
软件学报,2012, 卷号: 23, 期号: 8, 页码: 2149-2162
作者:  孙聪;  唐礼勇;  陈钟
收藏  |  浏览/下载:20/0  |  提交时间:2025/08/05
Enforcing reactive noninterference with reachability analysis 会议论文
Proceedings - 2011 8th International Conference on Information Technology: New Generations, ITNG 2011, Las Vegas, Nevada, April 11 - 13, 2011
作者:  Sun, Cong;  Tang, Liyong;  Chen, Zhong
收藏  |  浏览/下载:13/0  |  提交时间:2025/08/05
MEED: A memory-efficient distance bounding protocol with error detection 期刊论文
Cryptology and Information Security Series,2011, 卷号: 6, 页码: 129-143
作者:  Xin, Wei;  Tang, Cong;  Xiong, Hu;  Wang, Yonggang;  Sun, Huiping
收藏  |  浏览/下载:15/0  |  提交时间:2025/08/05