column
    Trusted Network Connect Protocol for Wireless Environment
    MA Zhuo, MA Jian-feng, YANG Chao, YANG Li
    2010, 36(5): 577-581. DOI: 10.3969/j.issn.0254-0037.2010.05.001
    Abstract PDF
    A Mixed Cross-authentication Scheme for Trusted Platform Compatibility
    MA Chao-bin, HUANG Ning-yu, ZHANG Xing
    2010, 36(5): 582-585. DOI: 10.3969/j.issn.0254-0037.2010.05.002
    Abstract PDF
    The Trust Measurement Scheme in Trusted Computing
    ZHANG Li-qiang, ZHANG Huan-guo, ZHANG Fan
    2010, 36(5): 586-591. DOI: 10.3969/j.issn.0254-0037.2010.05.003
    Abstract PDF
    Channel-Based TCB Extension Model
    LIAO Jian-hua, ZHAO Yong, SHEN Chang-xiang
    2010, 36(5): 592-596. DOI: 10.3969/j.issn.0254-0037.2010.05.004
    Abstract PDF
    The Connection Anonymous Scheme of Trusted Network
    ZHUANG Jun-xi, GONG Bei
    2010, 36(5): 597-600. DOI: 10.3969/j.issn.0254-0037.2010.05.005
    Abstract PDF
    A Short Group Signature DAA Scheme Based on l-Modified One More Strong Diffie-Hellman Problem Assumption
    ZHOU Yan-zhou, ZHANG Huan-guo, LI Li-xin, SONG Yang
    2010, 36(5): 601-604. DOI: 10.3969/j.issn.0254-0037.2010.05.006
    Abstract PDF
    Hierarchal Security Architecture of Virtualized Trusted Platform
    SHEN Qing-ni, DU Hong, QING Si-han
    2010, 36(5): 605-610. DOI: 10.3969/j.issn.0254-0037.2010.05.007
    Abstract PDF
    Trustworthy Evaluation Technology of Software Based on Roles
    YUAN Lin, WANG Huai-min, YIN Gang, SHI Dian-xi, MI Hai-bo
    2010, 36(5): 611-615. DOI: 10.3969/j.issn.0254-0037.2010.05.008
    Abstract PDF
    Dynamic Arguments Dependence Analysis Technique for Test-suite Deduction
    CHEN Ya-sha, YE Qing, LIAO Jian-hua
    2010, 36(5): 616-620. DOI: 10.3969/j.issn.0254-0037.2010.05.009
    Abstract PDF
    One Trusted Fix Method of Digital Data Forensics
    SUN Guo-zi, GENG Wei-ming, CHEN Dan-wei, LIN Qing-xiu
    2010, 36(5): 621-626. DOI: 10.3969/j.issn.0254-0037.2010.05.010
    Abstract PDF
    Multivariable Algebra Theory and Its Application in Cryptography
    WANG Hou-zhen, ZHANG Huan-guo, GUAN Hai-ming, WU Qian-hong
    2010, 36(5): 627-634. DOI: 10.3969/j.issn.0254-0037.2010.05.011
    Abstract PDF
    The Nonlinearity Lower Bounds on the Second Order of Cubic Monomial Boolean Functions
    LI Xue-lian, HU Yu-pu, GAO Jun-tao, FANG Yi-qi
    2010, 36(5): 635-639. DOI: 10.3969/j.issn.0254-0037.2010.05.012
    Abstract PDF
    The Fast Implementation of MD6 on GPU
    LI Li-xin, YE Jian, YU Yang
    2010, 36(5): 640-645,650. DOI: 10.3969/j.issn.0254-0037.2010.05.013
    Abstract PDF
    Security Analysis and Improvement of Digital Multi-signature on the Generalized Conic Curve
    DING Li, ZHOU Yuan, QIAN Hai-feng
    2010, 36(5): 646-650. DOI: 10.3969/j.issn.0254-0037.2010.05.014
    Abstract PDF
    Differential Algebraic Attack of Serpent
    HU Zhi-hua
    2010, 36(5): 651-653. DOI: 10.3969/j.issn.0254-0037.2010.05.015
    Abstract PDF
    Identity-based Signature Scheme with Partial Message Recovery in the Standard Model
    LIU Zhen-hua, ZHANG Xiang-song, TIAN Xu-an, HU Yu-pu
    2010, 36(5): 654-658. DOI: 10.3969/j.issn.0254-0037.2010.05.016
    Abstract PDF
    Design of AES on Time Randomization and Power Randomization Based Differential Power Analysis Resist Countermeasure
    YAN Ying-jian, LIU Kai, REN Fang, ZHU Wei-wei
    2010, 36(5): 659-663. DOI: 10.3969/j.issn.0254-0037.2010.05.017
    Abstract PDF
    A Formal Model of Secure Electronic Transaction Based on Term Rewriting
    CHEN Chen, LIU Nan, CHEN Wei-hong, ZHU Yue-fei
    2010, 36(5): 664-668. DOI: 10.3969/j.issn.0254-0037.2010.05.018
    Abstract PDF
    Online Public Opinion Hotspot Detection and Analysis Based on Short Text Clustering Using String Distance
    YANG Zhen, DUAN Li-juan, LAI Ying-xu
    2010, 36(5): 669-673. DOI: 10.3969/j.issn.0254-0037.2010.05.019
    Abstract PDF
    P2P Access Control Research Based on Interest Classification,Trust and Security Grade
    LIU Yi-he
    2010, 36(5): 674-678. DOI: 10.3969/j.issn.0254-0037.2010.05.020
    Abstract PDF
    An Algorithm for Finding the Most Trsted Path Between Entities Based on Selected Mechanism
    ZHOU Guo-qiang, ZENG Qing-kai
    2010, 36(5): 679-684. DOI: 10.3969/j.issn.0254-0037.2010.05.021
    Abstract PDF
    ID-based Chameleon Hash Scheme and Signature Without Key Escrow
    ZHAN Yang, TIAN Hai-bo, CHEN Xiao-feng, WANG Yu-min
    2010, 36(5): 685-688. DOI: 10.3969/j.issn.0254-0037.2010.05.022
    Abstract PDF
    Optimal Steganography Based on Fisher Information
    SUN Yi-feng, LIU Fen-lin, WANG Fei, ZENG Ying
    2010, 36(5): 689-693. DOI: 10.3969/j.issn.0254-0037.2010.05.023
    Abstract PDF
    The Mandatory Access Control Model for Document Flow
    FAN Yan-fang, HAN Zhen, ZHAO Yong, GENG Xiu-hua
    2010, 36(5): 694-697. DOI: 10.3969/j.issn.0254-0037.2010.05.024
    Abstract PDF
    Process-Consistent Access Control System
    HAN Pei-sheng, ZHAO Yong, LI Yu
    2010, 36(5): 698-702. DOI: 10.3969/j.issn.0254-0037.2010.05.025
    Abstract PDF
    Query Verification Technique Preserving Privacy for Outsourced Databases
    WANG Xiao-ming, YUAN Duo-bao
    2010, 36(5): 703-709. DOI: 10.3969/j.issn.0254-0037.2010.05.026
    Abstract PDF
    A Dynamic Self-reflection Model Based on Fluid Flow Approximation of PEPA
    LÜ Hong-wu, WANG Hui-qiang, MA Chun-guang, LIN Xiang-jun, ZHAO Qian
    2010, 36(5): 710-715. DOI: 10.3969/j.issn.0254-0037.2010.05.027
    Abstract PDF
    Analysis of the Infeasible Path Based on Key Branch
    PAN Li-li, ZOU Bei-ji, WANG Tian-e, CHEN Hao
    2010, 36(5): 716-720. DOI: 10.3969/j.issn.0254-0037.2010.05.028
    Abstract PDF