

Author: Liu Qian
Publisher: Edp Sciences
E-ISSN: 2271-2097|11|issue|01001-01001
ISSN: 2271-2097
Source: ITM Web of conferences, Vol.11, Iss.issue, 2017-05, pp. : 01001-01001
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content


A Container-based Trusted Multi-level Security Mechanism
By Li Xiao-Yong
ITM Web of conferences, Vol. 11, Iss. issue, 2017-05 ,pp. :


Isolation and lattice embeddings
The Journal of Symbolic Logic, Vol. 67, Iss. 3, 2002-09 ,pp. :


ITM Web of conferences, Vol. 15, Iss. issue, 2017-12 ,pp. :


The Security of the IAPM and IACBC Modes
By Hastad Johan
Journal of Cryptology, Vol. 20, Iss. 2, 2007-04 ,pp. :


Formal Proofs for the Security of Signcryption
Journal of Cryptology, Vol. 20, Iss. 2, 2007-04 ,pp. :