Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Chinese Journal of Computers
0254-4164
2012 Issue 9
Graceful Degradation in TSS-BQS Systems
WANG Wen-Tao;LIN Jing-Qiang;JING Ji-Wu;LUO Bo
..............page:1793-1803
A New Space Efficient Secret Sharing Scheme without a Secure Channel
LIU Yan-Hong;ZHANG Fu-Tai
..............page:1816-1822
An Attribute-Based Encryption Scheme for Traitor Tracing and Revocation Together
MA Hai-Ying;ZENG Guo-Sun
..............page:1845-1855
Master-Key Leakage-Resilient and Continue Leakage-Resilient Functional Encryption in Dual Affine Spaces
ZHANG Ming-Wu;YANG Bo;TAKAGI Tsuyoshi
..............page:1856-1867
Password Recovery Attack to Authentication Post Office Protocol
LIU Fan-Bao;XIE Tao;FENG Deng-Guo
..............page:1927-1937
xin xi an quan suan fa yu xie yi zhuan ji qian yan
feng deng guo
..............page:前插1-前插2
Linear Cryptanalysis of Simplified Trivium
SUN Wen-Long;GUAN Jie;LIU Jian-Dong
..............page:1890-1896
A Security Threats Identification and Analysis Method Based on Attack Graph
WU Di;LIAN Yi-Feng;CHEN Kai;LIU Yu-Ling
..............page:1938-1950
Identity-Based Ring Signature Scheme with Constant Size Signatures in the Standard Model
GE Ai-Jun;MA Chuan-Gui;ZHANG Zhen-Feng;CHEN Shao-Zhen
..............page:1874-1880
A Framework for Gateway-Oriented Password-Authenticated Key Exchange in the Standard Model
WEI Fu-Shan;ZHANG Zhen-Feng;MA Chuan-Gui
..............page:1833-1844
Certificateless Multi-receiver Signcryption Scheme Based on Multivariate Public Key Cryptography
LI Hui-Xian;CHEN Xu-Bao;PANG Liao-Jun;WANG Yu-Min
..............page:1881-1889
Black-Box Secret Sharing Scheme for Disjunctive Multi-Level Access Structure
CHEN Qi;PEI Ding-Yi;ZHAO Gan-Sen;JI Qiu-Hua
..............page:1804-1815
Construct Hash Function from Plaintext to C34 Curves
YU Wei;WANG Kun-Peng;LI Bao;TIAN Song
..............page:1868-1873
Another Look at the Integral Attack by the Higher-Order Differential Attack
DONG Le;WU Wen-Ling;WU Shuang;ZOU Jian
..............page:1906-1917
Probabilistic Integral Cryptanalysis
LI Xiao-Qian;WU Wen-Ling;LI Bao;YU Xiao-Li
..............page:1897-1905
Differential Fault Analysis on Piccolo
ZHAO Guang-Yao;LI Rui-Lin;SUN Bing;LI Chao
..............page:1918-1926
Steganalysis Based on Clustering via KFD Index Against Highly Undetectable JPEG Steganography
HUANG Wei;ZHAO Xian-Feng;SHENG Ren-Nong
..............page:1951-1958
Analyzing and Evaluating the Robustness of Natural Language Watermarking
HE Lu;GUI Xiao-Lin;TIAN Feng;WU Rei-Feng;FANG Ding-Yi
..............page:1971-1982