中国科学院机构知识库网格
Chinese Academy of Sciences Institutional Repositories Grid
首页
机构
成果
学者
登录
注册
登陆
×
验证码:
换一张
忘记密码?
记住我
×
校外用户登录
CAS IR Grid
机构
软件研究所 [8]
计算技术研究所 [2]
长春光学精密机械与物... [1]
采集方式
OAI收割 [11]
内容类型
期刊论文 [6]
会议论文 [5]
发表日期
2022 [1]
2021 [1]
2012 [1]
2010 [1]
2009 [2]
2007 [1]
更多
学科主题
Computer S... [4]
Informatio... [2]
筛选
浏览/检索结果:
共11条,第1-10条
帮助
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
题名升序
题名降序
提交时间升序
提交时间降序
作者升序
作者降序
发表日期升序
发表日期降序
Making Information Hiding Effective Again
期刊论文
OAI收割
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 卷号: 19, 期号: 4, 页码: 2576-2594
作者:
Wang, Zhe
;
Wu, Chenggang
;
Zhang, Yinqian
;
Tang, Bowen
;
Yew, Pen-Chung
  |  
收藏
  |  
浏览/下载:34/0
  |  
提交时间:2022/12/07
Instruction sets
Registers
Computer crashes
Entropy
Kernel
Security
Probes
Side channel attacks
information hiding
intra-process memory isolation
TLB misses
Exploiting Security Dependence for Conditional Speculation Against Spectre Attacks
期刊论文
OAI收割
IEEE TRANSACTIONS ON COMPUTERS, 2021, 卷号: 70, 期号: 7, 页码: 963-978
作者:
  |  
收藏
  |  
浏览/下载:77/0
  |  
提交时间:2021/12/01
Security
Hazards
Micromechanical devices
Microarchitecture
Out of order
Registers
Spectre vulnerabilities defense
security dependence
speculative execution side-channel vulnerabilities
polar differential power attacks and evaluation
期刊论文
OAI收割
SCIENCE CHINA-INFORMATION SCIENCES, 2012, 卷号: 55, 期号: 7, 页码: 1588-1604
Tang Ming
;
Qiu ZhenLong
;
Gao Si
;
Yi Mu
;
Liu ShuBo
;
Zhang HuanGuo
;
Jin YingZhen
  |  
收藏
  |  
浏览/下载:28/0
  |  
提交时间:2013/09/17
computer security
differential power attack
side channel attack
基于管道的TCB扩展模型
期刊论文
OAI收割
北京工业大学学报, 2010, 卷号: 36, 期号: 5, 页码: 592-596
廖建华
;
赵勇
;
沈昌祥
收藏
  |  
浏览/下载:27/0
  |  
提交时间:2011/05/23
TCB扩展
安全管道
应用安全机制
系统安全机制TCB extension
security channel
application security mechanism
operation system security mechanism
extended models for message authentication
会议论文
OAI收割
11th International Conference on Information Security and Cryptology, Seoul, SOUTH KOREA, DEC 03-05,
Zhang Liting
;
Wu Wenling
;
Wang Peng
  |  
收藏
  |  
浏览/下载:10/0
  |  
提交时间:2011/03/20
Security Model
Message Authentication
Side Channel Attack
Provable Security
using ind-cva for constructing secure communication
期刊论文
OAI收割
SCIENCE IN CHINA SERIES F-INFORMATION SCIENCES, 2009, 卷号: 52, 期号: 10, 页码: 1801-1811
Hu ZhenYu
;
Jiang JianChun
;
Sun FuChun
  |  
收藏
  |  
浏览/下载:29/0
  |  
提交时间:2011/03/18
universally composable security
secure channel
authenticated encryption
semantic security
integrity
design of secure operating systems with high security levels
期刊论文
OAI收割
SCIENCE IN CHINA SERIES F-INFORMATION SCIENCES, 2007, 卷号: 50, 期号: 3, 页码: 399-418
Qing Sihan
;
Shen ChangXiang
  |  
收藏
  |  
浏览/下载:25/0
  |  
提交时间:2011/07/01
核果类果树
病毒
检测
进展secure operating systems with high security levels
architecture
security model
covert channel analysis
Integrated mach-zehnder micro-interferometer for gas trace remote sensing (EI CONFERENCE)
会议论文
OAI收割
ICO20: Remote Sensing and Infrared Devices and Systems, August 21, 2005 - August 26, 2005, Changchun, China
作者:
Wang P.
收藏
  |  
浏览/下载:43/0
  |  
提交时间:2013/03/25
The realisation process and the preliminary tests on the performances of an integrated Mach-Zehnder Interferometer on LiNbO3 (Lithium Niobate) substrate is presented. The microsystem has been obtained by using medium mass Ion Implantation on X-cut Lithium Niobate crystals. The interferometer is formed by integrated optical channel waveguides: the phase shift between the two optical paths has been obtained
1mm 2 cross section and weights a few grams. The power consumption is in the milliwatt range. In the present work results obtained in the spectral window (0.4m-1.1m) will be presented. The performance of the device
without moving parts
evaluated on standard radiation sources
by applying a suitable electric field. The whole device is 60mm long
demonstrates that a spectral resolution better than 0.3nm can be obtained on 400nm spectral windows. The Micro-interferometer has been tested in laboratory with a calibrated cell containing NO2 gas and has demonstrated sensitivity in the ppb range if suitable optical paths are used. Its reduced dimensions and weights make these micro-systems ideal for a wide range of applications
has a 0.57times
spanning from Space Technology
Earth observation for Environment monitoring
to Safety and Security applications.
optimization of covert channel identification
会议论文
OAI收割
3rd International IEEE Security in Storage Workshop, San Francisco, CA, 12-13
Shen Jianjun
;
Qing Sihan
;
Shen Qingni
;
Li Liping
  |  
收藏
  |  
浏览/下载:29/0
  |  
提交时间:2011/07/28
covert channel identification
information flow analysis
information flow sequence
optimization
shared resource matrix method
channel estimation
optimisation
security of data
optimization of covert channel identification
会议论文
OAI收割
3rd International IEEE Security in Storage Workshop, San Francisco, CA, 12-13
Shen Jianjun
;
Qing Sihan
;
Shen Qingni
;
Li Liping
  |  
收藏
  |  
浏览/下载:10/0
  |  
提交时间:2011/07/28
covert channel identification
information flow analysis
information flow sequence
optimization
shared resource matrix method
channel estimation
optimisation
security of data