Search - Information and Communication Technology Access content directly

Filter your results

4 results
Image document

Provably Secure and Subliminal-Free Variant of Schnorr Signature

Yinghui Zhang , Hui Li , Xiaoqing Li , Hui Zhu
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.383-391, ⟨10.1007/978-3-642-36818-9_42⟩
Conference papers hal-01480197v1
Image document

Secure and Verifiable Outsourcing of Sequence Comparisons

Yansheng Feng , Hua Ma , Xiaofeng Chen , Hui Zhu
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.243-252, ⟨10.1007/978-3-642-36818-9_25⟩
Conference papers hal-01480179v1
Image document

UVHM: Model Checking Based Formal Analysis Scheme for Hypervisors

Yuchao She , Hui Li , Hui Zhu
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.300-305, ⟨10.1007/978-3-642-36818-9_31⟩
Conference papers hal-01480185v1
Image document

CSP-Based General Detection Model of Network Covert Storage Channels

Hui Zhu , Tingting Liu , Guanghui Wei , Beishui Liu , Hui Li
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.459-468, ⟨10.1007/978-3-642-36818-9_51⟩
Conference papers hal-01480205v1