Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Computer Research and Development
1000-1239
2016 Issue 10
qian yan
cao zhen fu ;, xu qiu liang ;, zhang yu qing ;, dong xiao lei ;
..............page:2133-2136
Research Advances on Big Data Security and Privacy Preserving
Cao Zhenfu;,Dong Xiaolei;,Zhou Jun;,Shen Jiachen;,Ning Jianting;,Gong Junqing;
..............page:2137-2151
Secure Multiparty Computation in Cloud Computing
Jiang Han;,Xu Qiuliang;
..............page:2151-2161
Survey of HTML5 New Features Security
Zhang Yuqing;,Jia Yan;,Lei Kenan;,L Shaoqing;,Yue Hongzhou;
..............page:2162-2171
Advances in Password Security
Wang Ping;,Wang Ding;,Huang Xinyi;
..............page:2172-2187
Study of Botnets Trends
Li Ke;,Fang Binxing;,Cui Xiang;,Liu Qixu;
..............page:2188-2205
Decentralized Attribute-Based Encryption Scheme with Constant-Size Ciphertexts
Xiao Siyu;,Ge Aijun;,Ma Chuangui;
..............page:2206-2214
A Multi-Bit Fully Homomorphic Encryption with Better Key Size from LWE
Chen Zhigang;,Song Xinxia;,Zhao Xiufeng;
..............page:2215-2222
Multi-Point Joint Power Analysis Attack Against SM4
Du Zhibo;,Wu Zhen;,Wang Min;,Rao Jintao;
..............page:2223-2228
Verifier-Based Three-Party Password Authenticated Key Exchange Protocol
Yang Xiaoyan;,Hou Mengbo;,Wei Xiaochao;
..............page:2229-2237
An Efficient and Expressive Attribute-Based Encryption Scheme with Chosen Ciphertext Security
Zhang Kai;,Wei Lifei;,Li Xiangxue;,Chen Jie;,Qian Haifeng;
..............page:2238-2246
Security Analysis and Evaluation for the Usage of Settings Mechanism in Android
Lu Yemian;,Ying Lingyun;,Su Purui;,Feng Dengguo;,Jing Erxia;,Gu Yacong;
..............page:2247-2260
SQL Injection Prevention Based on Sensitive Characters
zhang hui lin ;, ding yu ;, zhang li hua ;, duan lei ;, zhang chao ;, wei zuo ;, li guan cheng ;, han xin hui ;
..............page:2261-2275
A Code Reuse Attack Protection Technique Based on Code Anti-Leakage
Wang Ye;,Li Qingbao;,Zeng Guangyu;,Chen Zhifeng;
..............page:2276-2286
VDNS:An Algorithm for Cross-Platform Vulnerability Searching in Binary Firmware
Chang Qing;,Liu Zhongjin;,Wang Mengtao;,Chen Yu;,Shi Zhiqiang;,Sun Limin;
..............page:2287-2297
Maldetect:An Android Malware Detection System Based on Abstraction of Dalvik Instructions
Chen Tieming;,Yang Yimin;,Chen Bo;
..............page:2298-2305
A Novel Multiple Bits Reversible Data Hiding in Encrypted Domain Based on R-LWE
Ke Yan;,Zhang Minqing;,Su Tingting;
..............page:2306-2321
Anonymous Mutual Authentication and Key Agreement Protocol in Multi-Server Architecture for VANETs
Xie Yong;,Wu Libing;,Zhang Yubo;,Ye Luyao;
..............page:2322-2332
Privacy-Preserving Public Auditing for Dynamic Group Based on Hierarchical Tree
Huang Longxia;,Zhang Gongxuan;,Fu Anmin;
..............page:2333-2341
Privacy Preserving Data Publishing via Weighted Bayesian Networks
Wang Liang;,Wang Weiping;,M eng Dan;
..............page:2342-2352
A Graph-Clustering Anonymity Method Implemented by Genetic Algorithm for Privacy-Preserving
Jiang Huowen;,Zeng Guosun;,Hu Kekun;
..............page:2353-2363
Online/Offline Ciphertext-Policy Attribute-Based Searchable Encryption
Chen Dongdong;,Cao Zhenfu;,Dong Xiaolei;
..............page:2364-2374
TSNP:A Novel PCL-Secure and Efficient Group Authentication Protocol in Space Information Network
Li Xuefeng;,Zhang Junw ei;,Ma Jianfeng;,Liu Hai;
..............page:2375-2391
Multi-Authority CP-ABE with Policy Update in Cloud Storage
Wu Guangqiang;
..............page:2392-2398
A New Password Authentication Method Based on Fingerprint and Mobile Phone Assistance
An Di;,Yang Chao;,Jiang Qi;,Ma Jianfeng;
..............page:2399-2410
Improved Endorsed E-Cash System with DAA-A
Liu Xin;,Zhang Bo;
..............page:2411-2428
xin xi an quan yan jiu qi kan jian jie
..............page:2428-2428