Security analysis in SPKI/SDSI2.0
GENG Xiuhua;HE Yongzhong;Department of Software Engineering;Beijing Information Technology College;School of Computer and Information Technology;Beijing Jiaotong University;
..............page:23-28
..............page:100-104
Randomization of soft keyboard layout based on cellular automata
LI Pengwei;FU Jianming;SHA Letian;DING Shuang;School of Computer Science;Wuhan University;State Key Laboratory of Aerospace Information Security and Trusted Computing;Ministry of Education;Wuhan University;State Key Lab of Software Engineering;Wuhan University;
..............page:105-111+131
..............page:112-117
..............page:118-122
..............page:123-127
..............page:128-131
..............page:132-137
..............page:138-142
..............page:143-150
..............page:151-156
..............page:157-161
..............page:162-167