Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Beijing Electronic Science and Technology Institute
1672-464X
2012 Issue 2
The Homomorphism Analysis of Public Key Cryptosystem
zuo shi dou ; liu nian ; li zi chen
..............page:55-59
An Analysis of Peer Behavior on P2P- Based Live Streaming Systems
li meng dong ; du fei
..............page:39-42
Design And Management of Classified Electronic Documents Security Level Identification
xu sheng wei ; li man ; fang yong
..............page:81-86
Research on the relationship between Information security management system and classified protection
wang ya dong ; lv li ping ; tang yong li ; wang li hua
..............page:26-31
Research and Analysis of JFK Protocol
feng yan ; li yang ; xu zuo jie ; huang da
..............page:15-20
Decoding Scheme of TFCI in WCDMA Based on IHT
ye zhuo ying ; zhu lin ; feng hai
..............page:87-91
An Analysis of Anti -Differential Cryptanalysis Attack for Chaotic Block Cipher Based on Feistel Structure
zheng zuo ; zhao geng ; zhao er fan ; zheng xiao li
..............page:60-66
The Research of Lattice Reduction Attacks on Public - key Cryptosystem
liu li qiang ; liu nian ; li zi chen
..............page:67-72
A New SHA-1 System to Resist Modular Differential Attack
gao xiao dong ; liu nian ; li zi chen
..............page:43-49
Research on Multi- signature for Electronic Documents
zhang ya chun ; liu xin hai ; ju lei
..............page:50-54
Blind Signature Scheme Based on McEliece Public Key Cryptosystem
zhao cheng cheng ; li zi chen ; liu nian ; yan xiao zuo
..............page:32-38
An Analysis of Peer Behavior on P2P -Based Live Streaming Systems
xue chao ; zhou ya jian ; ping yuan ; zhang sen
..............page:73-80
The Research of Random Jamming on Wireless Network
zhang jun yi ; yang yi xian
..............page:1-8
Research on Choice of Authoring Standards Based on Equipment IETM
hu liang yong ; zhou li ye
..............page:21-25
A Method of Access Control on Electronic Document Based on Multilevel Security
li man ; sui zhi yuan ; fang yong
..............page:9-14