Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Chinese Journal of Computers
0254-4164
2006 Issue 9
Design and Analysis of Digital Image Copyright Protection Security Protocol in Internet Environment
CHEN Xiao-Su;LIU Li-Gang;LU Zheng-Ding
..............page:1722-1728
A Novel Robust Audio Watermarking Scheme Based on Nonuniform Discrete Fourier Transform
XIE Ling;ZHANG Jia-Shu;HE Hong-Jie
..............page:1711-1721
Steganalysis of JPEG2000 Steganography Based on Hilbert-Huang Transform
TAN Shun-Quan;HUANG Ji-Wu;YANG Zhi-Hua
..............page:1702-1710
k-Error 2-Adic Complexity Algorithm for the Binary Sequences with Period 2n
DONG Li-Hua;HU Yu-Pu;ZENG Yong
..............page:1590-1595
Verifiable Partial Key Escrow for PKI
ZHUANG Yong
..............page:1584-1589
On Boolean Functions with Highest Algebraic Immune Degree
HE Liang-Sheng
..............page:1579-1583
Intrusion Detection Model Based on Executable Static Analysis
SU Pu-Rui;YANG Yi
..............page:1572-1578
Macroscopical Quantitative Balance of TCP Packets
GONG Jian;PENG Yan-Bing;YANG Wang;LIU Wei-Jiang
..............page:1561-1571
An Anomaly Detection Model Based on Dynamic Behavior and Character Patterns
lin guo yuan ; guo shan qing ; huang zuo ; cao tian jie
..............page:1553-1560
Identify Abnormal Packet Loss in Selective Forwarding Attacks
YU Bo;YANG Min;WANG Zhi;GAO Chuan-Shan
..............page:1542-1552
Automatic Generation of Attack Signatures Based on Multi-Sequence Alignment
TANG Yong;LU Xi-Cheng;HU Hua-Ping;ZHU Pei-Dong
..............page:1533-1541
An Online Rule Generation Model for Intrusion Detection
GUO Shan-Qing;XIE Li;ZENG Ying-Pei
..............page:1523-1532
An Immune Based Model for Network Monitoring
LI Tao
..............page:1515-1522
xin xi an quan zhuan ji qian yan
feng deng guo
..............page:前插1-前插2
Research on Formal Design of ESIKE Based on Authentication Tests
JIANG Rui;HU Ai-un;LI Jian-Hua
..............page:1694-1701
A New Chosen Ciphertext Secure ID-Based Threshold Decryption Scheme from Pairing
LONG Yu;CHEN Ke-Fei;HONG Xuan
..............page:1679-1687
Security Protocol's Extended Horn Logic Model and Its Verification Method
LI Meng-Jun;LI Zhou-Jun;CHEN Huo-Wang
..............page:1666-1678
Instantiation Space: A New Model for Security Protocol Logic
SU Kai-Le;YUE Wei-Ya;CHEN Qing-Liang;ZHENG Xi-Zhong
..............page:1657-1665
A Secure Grid Routing Protocol in Ad Hoc Networks
CHEN Jing;CUI Guo-Hua;YANG Mu-Xiang;SU Li
..............page:1648-1656
An Efficient Identity-Based Signcryption Scheme
LI Fa-Gen;HU Yu-Pu;LI Gang
..............page:1641-1647
Formal Model of Proxy Multi-Signature and a Construction
WANG Qin;CAO Zhen-Fu
..............page:1628-1635
Identity-Based Signature Scheme with Partial Message Recovery
CHEN Hui-Yan;LU Shu-Wang;LIU Zhen-Hua
..............page:1622-1627
Improvement of a Signature Scheme Based on Strong RSA
CAO Zheng-Jun;LIU Mu-Lan
..............page:1617-1621
Domain-Based Key Management for Wireless Sensor Networks
LIU Zhi-Hong;MA Jian-Feng;HUANG Qi-Ping
..............page:1608-1616
Universal Inverting Algorithms for Bounded One-Way Functions
XUE Rui;LIU Ji-Qiang
..............page:1603-1607
Differential Fault Analysis on SMS4
ZHANG Lei;WU Wen-Ling
..............page:1596-1602