Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Computer Research and Development
1000-1239
2011 Issue 8
TRBAC: Trust Based Access Control Model
Liu Wu;Duan Haixin;Zhang Hong;Ren Ping;Wu Jianping
..............page:1414-1420
Software Integrity Verification Based on VMM-Level System Call AnalysisTechnique
Li Bo;Li Jianxin;Hu Chunming;Wo Tianyu;Huai Jinpeng
..............page:1438-1446
GoodRep Attack and Defense in P2P Reputation Systems
Feng Jingyu;Zhang Yuqing;Chen Shenlong;Fu Anmin
..............page:1473-1480
An Design Approach of Trustworthy Software and Its Trustworthiness Evaluation
Tian Junfeng;Li Zhen;Liu Yuling
..............page:1447-1454
qian yan
..............page:1573-1574
Algorithmic Complexity Attacks Against WuManber
Zhang Yu;Liu Ping;Liu Yanbing;Tan Jianlong;Guo Li
..............page:1381-1389
Histograms Difference and Quantitative Steganalysis of JPEG SteganographyBased on Relative Entropy
Yang Chunfang;Liu Fenlin;Luo Xiangyang
..............page:1563-1569
Multiple-Authority-Key Functional Encryption: A M-KP-ABE Scheme Based onLMSSS
Yang Xiaoyuan;Cai Weiyi;Chen Haibin
..............page:1363-1369
Anomaly Detection Using Multi-Level and Multi-Dimensional Analyzing ofNetwork Traffic
Zheng Liming;Zou Peng;Jia Yan
..............page:1506-1516
A Secure Routing Protocol Based on D-S Evidence Theory in Ad Hoc Networks
Li Xiaoqing;Li Hui;Yang Kai;Ma Jianfeng
..............page:1406-1413
A New Construction of Short Hierarchical Identity-Based Signature in theStandard Model
Wu Qing;Zhang Leyou;Hu Yupu
..............page:1357-1362
An Authorization Model and Implementation for Vector Data in Spatial DBMS
Zhang Desheng;Feng Dengguo;Chen Chi
..............page:1524-1533
Analysis of Attack Graphs Based on Network Flow Method
Wu Jinyu;Jin Shuyuan;Yang Zhi
..............page:1497-1505
Analysis for Probabilistic and Timed Information Flow Security Properties viaptSPA
Li Chao;Yin Lihua;Guo Yunchuan
..............page:1370-1380
Research on Trusted Computing Technology
Feng Dengguo;Qin Yu;Wang Dan;Chu Xiaobo
..............page:1332-1349
An Efficient ID-Based Verifiably Encrypted Signature Scheme
Zhou Yousheng;Sun Yanhin;Qing Sihan;Yang Yixian
..............page:1350-1356
The Research and Application of a Specific Instruction Processor for AES
Xia Hui;Jia Zhiping;Zhang Feng;Li Xin;Chen Renhai;Edwin H.-M. Sha
..............page:1554-1562
Ownership Transfer Protocol for RFID Tag
Jin Yongming;Sun Huiping;Guan Zhi;Chen Zhong
..............page:1400-1405
Trusted Dynamic Measurement Based on Interactive Markov Chains
Zhuang Lu;Cai Mian;Shen Changxiang
..............page:1464-1472
Formal Security Analysis on Trusted Platform Module Based on Applied πCalculus
Xu Shiwei;Zhang Huanguo
..............page:1421-1429
Static Analysis of TOCTTOU Vulnerabilities in Unix-Style File System
Han Wei;He Yeping
..............page:1430-1437
Detecting the Vulnerability Pattern of Writing Tainted Value to Tainted Address
Hu Chaoiian;Li Zhoujun;Guo Tao;Shi Zhiwei
..............page:1455-1463
xin xi dong tai
..............page:1389,1472,1570
Survey of Botnets
Fang Binxing;Cui Xiang;Wang Wei
..............page:1315-1331
Detecion Approach for Covert Channel Based on Concurrency Conflict Interval Time
Wang Yongji;Wu Jingzheng;Ding Liping;Zeng Haitao
..............page:1542-1553
MRRbot: A Multi-Role and Redundancy-Based P2P Botnet Model
Li Shuhao;Yun Xiaochun;Hao Zhiyu;Zhai Lidong
..............page:1488-1496
Detecting and Managing Hidden Process via Hypervisor
Wang Lina;Gao Hanjun;Liu Wei;Peng Yang
..............page:1534-1541