Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Northern Jiaotong University
1000-1506
2013 Issue 5
Formal analysis of power separation mechanism based on Biba model
LI Lin;LU Kai;GUO Qiang;CHEN Yonggang;FAN Xiubin;School of Computer and Information Technology;Beijing Jiaotong University;State of Information Center;Institute of Software Chinese Academy of Sciences;
..............page:1-7
Fuzzing technology for private network protocol testing
PENG Yong;WANG Ting;XIONG Qi;DAI Zhonghua;YI Shengwei;GAO Haihui;China Information Technology Evaluation Center;
..............page:8-12
A k-anonymous algorithm in location privacy protection based on circular zoning
ZHAO Zemao;HU Huidong;ZHANG Fan;ZHANG Pin;ZHOU Jianqin;School of communication engineering;Hangzhou Dianzi University;School of Mathematics and Computer Science;Wuhan Polytechnic University;
..............page:13-18
SDKEY-based partition data protection of mobile terminal
LI Meihong;DU Ye;LIU Jiqiang;School of Computer and Information Technology;Beijing Jiaotong University;
..............page:19-22
Security analysis in SPKI/SDSI2.0
GENG Xiuhua;HE Yongzhong;Department of Software Engineering;Beijing Information Technology College;School of Computer and Information Technology;Beijing Jiaotong University;
..............page:23-28
Supervision system for P2P traffic based on NDIS intermediate driver
DU Ye;LI Meihong;LIJieyuan;School of Computer and Information Technology;Beijing Jiaotong University;
..............page:29-34
Research on Chord6 model with topology matching inter-domains
GUO Fangfang;WANG Shuaishuai;LIU Yunxia;College of Computer Science and Technology;Harbin Engineering University;
..............page:35-40
Game-based efficient and reliable routing algorithm in wireless Mesh networks
DU Ruiying;CHENJing;HE Kun;YAO Shixiong;School of Computer;Wuhan University;
..............page:41-47
Design and implementation of fine-grained RBAC module based on AOP
SHAO Qifeng;HAN Yumin;School of Software;Zhongyuan University of Technology;
..............page:48-52
Mobile node inter-domain Pre-HandOver method based on MP2P
GUO Fangfang;LIU Yunxia;WANG Shuaishuai;XING Yangyang;College of Computer Science and Technology;Harbin Engineering University;
..............page:53-57
Network intrusion detection based on simultaneous optimization of features selection and parameters of support vector machine
FAN Aiwan;SHI Hesheng;School of Software;Pingdingshan University;School of Computer Science and Technology;Pingdingshan University;
..............page:58-61
Network traffic prediction based on SVM optimized by multi-subpopulation particle swarm optimization algorithm
ZENG Wei;School of Information Engineering;East China Jiaotong University;
..............page:62-66
A scheme of trusted virtualization platform based on PTM
JIANG Yichen;HAN Zhen;ZHANG Dawei;School of Computer and Information Technology;Beijing Jiaotong University;
..............page:67-74
A virtual computing resource allocation modal of cloud computing based on evolutionary game theory
XIE Bin;YANG Yang;ZHONG Zewei;School of Computer and Communication Engineering;University of Science and Technology Beijing;
..............page:75-79
SLA-based dynamic trust evaluation for cloud computing
ZHAO Pingting;HAN Zhen;HE Yongzhong;School of Computer and Information Technology;Beijing Jiaotong University;
..............page:80-87
Evaluation algorithm of digital evidence based on triage methodology
WU Tong;HAN Zhen;School of Computer and Information Technology;Beijing Jiaotong University;
..............page:88-92
Trusted generation method for event logs based on TCM
WANG Jian;CHENG Shuaishuai;School of Computer and Information Technology;Beijing Jiaotong University;
..............page:93-99
Design and implementation of a context-based Android mobile terminal trusted running control system
QU Haipeng;AO Yingge;YAN Min;YU Aimin;ZHAO Baohua;College of Information Science and Engineering;Ocean University of China;State Key Laboratory of Information Security;Institute of Information Engineering;CAS;China Electric Power Research Institute;
..............page:100-104
Randomization of soft keyboard layout based on cellular automata
LI Pengwei;FU Jianming;SHA Letian;DING Shuang;School of Computer Science;Wuhan University;State Key Laboratory of Aerospace Information Security and Trusted Computing;Ministry of Education;Wuhan University;State Key Lab of Software Engineering;Wuhan University;
..............page:105-111+131
Survey on techniques of passive-blind image forensics based on JPEG features
SUN Guozi;LIU Liying;YANG Yitao;College of Computer;Nanjing University of Posts& Telecommunications;
..............page:112-117
A ranked method of ciphertext retrieval based on history
LIU Wenzhuo;CAO Tianjie;School of Computer Science and Technology;China University of Mining and Technology;
..............page:118-122
Numeration of generalized linear orthomorphisms over the galois field F_q~n
HAN Haiqing;ZHANG Huanguo;School of Mathematics and Physics;Hubei Polytechnic University;School of Computer;Wuhan University;
..............page:123-127
Lee weight MacWilliams identity of the linear codes over F2 + uF2 + vF2 + uvF2
XU Xiaofang;HAN Haiqing;School of Mathematics and Physics;Hubei Polytechnic University;
..............page:128-131
Fast scalar multiplication algorithm of conic curve over GF(p~m)
LIU Duo;School of Software Engineering;Beijing Jiaotong University;
..............page:132-137
Feasibility study on unequal error protection fountain codes with applications to telegram coding
JIANG Daming;HOU Xiaobin;SHANDong;FENG Xisheng;School of Electronics and Information Engineering;Beijing Jiaotong University;
..............page:138-142
High speed train transmission noise and structural noise separation
NA Yueyue;XIE Chong;Key Lab of Transportation Data Analysis and Mining of Beijing;Beijing Jiaotong University;Institute of Mechanics;Chinese Academy of Sciences;
..............page:143-150
Analysis of potential difference of mechanical insulating joint in high-speed railway station
BI Hongjun;ZHAO Xing;ZHANG Minhui;School of Electronics and Information Engineering;Beijing Jiaotong University;China Railway Si Yuan Survey and Design Group Co.;Ltd.;
..............page:151-156
Digital image processing array circuit based on multi-core technology
LUO Li;LI Ruijing;SHEN Hong;School of Electronics and Information Engineering;Beijing Jiaotong University;
..............page:157-161
Software design and optimization of video processing based on DM6467
YAO Chunlian;GUO Keyou;RUAN Qiuqi;WAN Lili;School of Computer and Information Engineering;Beijing Technology and Business University;Key Laboratory of Advanced Information Science and Network Technology of Beijing;Beijing Jiaotong University;
..............page:162-167