Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Computer Research and Development
1000-1239
2014 Issue 7
qian yan
cheng xue qi ;, du yue jin ;, li zuo ;, xue rui ;, zhang yu qing ;, zhang zhen feng ;
..............page:1383-1384
Survey of Android OS Security
Cao Chen;,Fang Zhejun;,Wang Kai;,Wang Zhiqiang;,Yang Huan;,Zhang Yuqing;
..............page:1385-1396
Secure and Privacy-Preserving Data Storage Service in Public Cloud
Li Fenghua;,Li Hui;,Sun Wenhai;,Wang Boyang;
..............page:1397-1409
Proofs of Data Possession of Multiple Copies
Chen Kaiqu;,Feng Dengguo;,Fu Yanyan;,Zhang Min;
..............page:1410-1416
A Secure Electronic Document Self-Destructing Scheme in Cloud Computing
Li Qi;,Liu Ximeng;,Ma Jianfeng;,Xiong Jinbo;,Yao Zhiqiang;
..............page:1417-1423
CACDP: A Cryptographic Access Control for Dynamic Policy in Cloud Storage
Feng Bo;,Liu Weijie;,Yu Rongwei;,Zhang Hao;,Zhao Lei;
..............page:1424-1435
Research on Direct Anonymous Attestation Scheme Based on Trusted Mobile Platform
Feng Dengguo;,Qin Yu;,Xi Li;,Yang Bo;,Zhang Qianying;,Zheng Changwen;
..............page:1436-1445
An Anti-Obfuscation Method for Detecting Similarity Among Android Applications in Large Scale
Cheng Yao;,Feng Dengguo;,Jiao Sibei;,Su Purui;,Yang Yi;,Ying Lingyun;
..............page:1446-1457
Description of Android Malware Feature Based on Dalvik Instructions
Dong Hang;,Du Yuejin;,Li Ting;,Xu Guo'ai;,Yuan Chunyang;
..............page:1458-1466
Modified Matrix Encoding Based on the Spatial Distortion Model and Its Improvement
Han Tao;,Lin Sisi;,Wu Yang;,Zhu Yuefei;
..............page:1467-1475
A Distributed Rational Secret Sharing Scheme with Hybrid Preference Model
Liu Hai;,Liu Rongfei;,Lü Zhen;,Peng Changgen;,Tian Youliang;
..............page:1476-1485
A Secure Routing Protocol for MWNs Based on Cross-Layer Dynamic Reputation Mechanism
Lin Hui;,Ma Jianfeng;,Xu Li;
..............page:1486-1496
RFID Lightweight Authentication Protocol Based on PRF
Jin Yongming;,Lu Xiang;,Shi Zhiqiang;,Sun Limin;,Wu Qiying;
..............page:1506-1514
LWE Problem with Uniform Secret and Errors and Its Application
Li Bao;,Lu Xianhui;,Sun Xiaochao;
..............page:1515-1519
Related-Key Impossible Differential Cryptanalysis on LBlock
Wei Hongru;,Yin Guangli;
..............page:1520-1526
Rational Fair Computation with Computational Sequential Equilibrium
Wang Hao;,Wang Yilei;,Xu Qiuliang;,Zheng Zhihua;
..............page:1527-1537
A Tor Anonymous Communication System with Security Enhancements
Wu Zhenqiang;,Yang Bo;,Yang Qiliang;,Zhou Yanwei;
..............page:1538-1546
Plaintext Recovery Based on Memory Dependence Measurement
Wang Qingxian;,Wei Qiang;,Wu Zehui;
..............page:1547-1554
Towards Analysis of Security in I2P's Path Selection
Liu Peipeng;,Shi Jinqiao;,Tan Qingfeng;,Wang Lihong;
..............page:1555-1564
Algorithm of Optimal Security Hardening Measures Against Insider Threat
Chen Xiaojun;,Guo Li;,Pu Yiguo;,Shi Jinqiao;,Xu Fei;
..............page:1565-1577
UML-Based Modeling Method of Network Security Infrastructure
Bu Ning;,Huang Liang;,Lian Yifeng;,Liu Yuling;
..............page:1578-1593
Multi-Addresses Amplification DoS Attacks by Native IPv6 and IPv6Tunnels
Cui Yu;,Fang Binxing;,Tian Zhihong;,Zhang Hongli;
..............page:1594-1603
Action-Based Multi-level Access Control Model
Li Fenghua;,Shi Guozhen;,Su Mang;
..............page:1604-1613
Sybil Group Attack Detection in Kad Network
Li Qiang;,Li Zhoujun;,Yu Jie;,Zhou Changbin;
..............page:1614-1623
Detection of XSS Vulnerabilities in Online Flash
Liu Qixu;,Wen Guanxing;,Wen Tao;
..............page:1624-1632
Security Architecture to Deal with APT Attacks: Abnormal Discovery
Du Yuejin;,Jia Zhaopeng;,Li Yue;,Zhai Lidong;
..............page:1633-1645
xin xi dong tai
..............page:1646