Access Statistics

    Total visits:

    Today's visit:

    Online:

    column
    Trusted Network Connect Protocol for Wireless Environment
    MA Zhuo, MA Jian-feng, YANG Chao, YANG Li
    2010, 36(5): 577-581.
    Abstract PDF
    A Mixed Cross-authentication Scheme for Trusted Platform Compatibility
    MA Chao-bin, HUANG Ning-yu, ZHANG Xing
    2010, 36(5): 582-585.
    Abstract PDF
    The Trust Measurement Scheme in Trusted Computing
    ZHANG Li-qiang, ZHANG Huan-guo, ZHANG Fan
    2010, 36(5): 586-591.
    Abstract PDF
    Channel-Based TCB Extension Model
    LIAO Jian-hua, ZHAO Yong, SHEN Chang-xiang
    2010, 36(5): 592-596.
    Abstract PDF
    The Connection Anonymous Scheme of Trusted Network
    ZHUANG Jun-xi, GONG Bei
    2010, 36(5): 597-600.
    Abstract PDF
    A Short Group Signature DAA Scheme Based on l-Modified One More Strong Diffie-Hellman Problem Assumption
    ZHOU Yan-zhou, ZHANG Huan-guo, LI Li-xin, SONG Yang
    2010, 36(5): 601-604.
    Abstract PDF
    Hierarchal Security Architecture of Virtualized Trusted Platform
    SHEN Qing-ni, DU Hong, QING Si-han
    2010, 36(5): 605-610.
    Abstract PDF
    Trustworthy Evaluation Technology of Software Based on Roles
    YUAN Lin, WANG Huai-min, YIN Gang, SHI Dian-xi, MI Hai-bo
    2010, 36(5): 611-615.
    Abstract PDF
    Dynamic Arguments Dependence Analysis Technique for Test-suite Deduction
    CHEN Ya-sha, YE Qing, LIAO Jian-hua
    2010, 36(5): 616-620.
    Abstract PDF
    One Trusted Fix Method of Digital Data Forensics
    SUN Guo-zi, GENG Wei-ming, CHEN Dan-wei, LIN Qing-xiu
    2010, 36(5): 621-626.
    Abstract PDF
    Multivariable Algebra Theory and Its Application in Cryptography
    WANG Hou-zhen, ZHANG Huan-guo, GUAN Hai-ming, WU Qian-hong
    2010, 36(5): 627-634.
    Abstract PDF
    The Nonlinearity Lower Bounds on the Second Order of Cubic Monomial Boolean Functions
    LI Xue-lian, HU Yu-pu, GAO Jun-tao, FANG Yi-qi
    2010, 36(5): 635-639.
    Abstract PDF
    The Fast Implementation of MD6 on GPU
    LI Li-xin, YE Jian, YU Yang
    2010, 36(5): 640-645,650.
    Abstract PDF
    Security Analysis and Improvement of Digital Multi-signature on the Generalized Conic Curve
    DING Li, ZHOU Yuan, QIAN Hai-feng
    2010, 36(5): 646-650.
    Abstract PDF
    Differential Algebraic Attack of Serpent
    HU Zhi-hua
    2010, 36(5): 651-653.
    Abstract PDF
    Identity-based Signature Scheme with Partial Message Recovery in the Standard Model
    LIU Zhen-hua, ZHANG Xiang-song, TIAN Xu-an, HU Yu-pu
    2010, 36(5): 654-658.
    Abstract PDF
    Design of AES on Time Randomization and Power Randomization Based Differential Power Analysis Resist Countermeasure
    YAN Ying-jian, LIU Kai, REN Fang, ZHU Wei-wei
    2010, 36(5): 659-663.
    Abstract PDF
    A Formal Model of Secure Electronic Transaction Based on Term Rewriting
    CHEN Chen, LIU Nan, CHEN Wei-hong, ZHU Yue-fei
    2010, 36(5): 664-668.
    Abstract PDF
    Online Public Opinion Hotspot Detection and Analysis Based on Short Text Clustering Using String Distance
    YANG Zhen, DUAN Li-juan, LAI Ying-xu
    2010, 36(5): 669-673.
    Abstract PDF
    P2P Access Control Research Based on Interest Classification,Trust and Security Grade
    LIU Yi-he
    2010, 36(5): 674-678.
    Abstract PDF
    An Algorithm for Finding the Most Trsted Path Between Entities Based on Selected Mechanism
    ZHOU Guo-qiang, ZENG Qing-kai
    2010, 36(5): 679-684.
    Abstract PDF
    ID-based Chameleon Hash Scheme and Signature Without Key Escrow
    ZHAN Yang, TIAN Hai-bo, CHEN Xiao-feng, WANG Yu-min
    2010, 36(5): 685-688.
    Abstract PDF
    Optimal Steganography Based on Fisher Information
    SUN Yi-feng, LIU Fen-lin, WANG Fei, ZENG Ying
    2010, 36(5): 689-693.
    Abstract PDF
    The Mandatory Access Control Model for Document Flow
    FAN Yan-fang, HAN Zhen, ZHAO Yong, GENG Xiu-hua
    2010, 36(5): 694-697.
    Abstract PDF
    Process-Consistent Access Control System
    HAN Pei-sheng, ZHAO Yong, LI Yu
    2010, 36(5): 698-702.
    Abstract PDF
    Query Verification Technique Preserving Privacy for Outsourced Databases
    WANG Xiao-ming, YUAN Duo-bao
    2010, 36(5): 703-709.
    Abstract PDF
    A Dynamic Self-reflection Model Based on Fluid Flow Approximation of PEPA
    LÜ Hong-wu, WANG Hui-qiang, MA Chun-guang, LIN Xiang-jun, ZHAO Qian
    2010, 36(5): 710-715.
    Abstract PDF
    Analysis of the Infeasible Path Based on Key Branch
    PAN Li-li, ZOU Bei-ji, WANG Tian-e, CHEN Hao
    2010, 36(5): 716-720.
    Abstract PDF

    Top ViewMore