Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Tsinghua Science and Technology
1007-0214
2016 Issue 3
Providing Location-Aware Location Privacy Protection for Mobile Location-Based Services
Yu Wang;Dingbang Xu;Fan Li;College of Information Engineering;Taiyuan University of Technology;Department of Computer Science;the University of North Carolina at Charlotte;Samsung Research America;School of Computer Science;Beijing Institute of Technology;
..............page:243-259
An Efficient Location Privacy Protection Scheme Based on the Chinese Remainder Theorem
Jingjing Wang;Yiliang Han;Xiaoyuan Yang;Department of Electronic Technology;the Key Laboratory of Network & Information Security of Armed Police Force;Engineering University of Armed Police Force;
..............page:260-269
Private Proximity Detection for Convex Polygons
Bin Mu;Spiridon Bakiras;Department of Computer Science;Graduate Center;City University of New York;Department of Computer Science;Michigan Technological University;
..............page:270-280
An Improved String-Searching Algorithm and Its Application in Component Security Testing
Jinfu Chen;Saihua Cai;Lili Zhu;Yuchi Guo;Rubing Huang;Xiaolei Zhao;Yunqi Sheng;School of Computer Science and Communication Engineering;Jiangsu University;
..............page:281-294
On the Linear Complexity of New Generalized Cyclotomic Binary Sequences of Order Two and Period pqr
Longfei Liu;Xiaoyuan Yang;Xiaoni Du;Bin Wei;Key Laboratory of Network & Information Security of APF;Engineering College of APF;College of Mathematics and Statistics;Northwest Normal University;
..............page:295-301
New Public-Key Cryptosystem Based on the Morphism of Polynomials Problem
Houzhen Wang;Huanguo Zhang;Shaowu Mao;Wanqing Wu;Liqiang Zhang;Computer School of Wuhan University;State Key Laboratory of Cryptology;
..............page:302-311
TPM-Based Remote Attestation for Wireless Sensor Networks
Donglai Fu;Xinguang Peng;Software School of North University of China;School of Computer Science & Technology;Taiyuan University of Technology;
..............page:312-321
An Anomalous Behavior Detection Model in Cloud Computing
Xiaoming Ye;Xingshu Chen;Haizhou Wang;Xuemei Zeng;Guolin Shao;Xueyuan Yin;Chun Xu;College of Computer Science;Cybersecurity Research Institute;Sichuan University;
..............page:322-332
Optimization of Key Predistribution Protocol Based on Supernetworks Theory in Heterogeneous WSN
Qi Yuan;Chunguang Ma;Xiaorui Zhong;Gang Du;Jiansheng Yao;College of Computer Science and Technology;Harbin Engineering University;College of Communication and Electronic Engineering;Qiqihar University;Key Lab of Network Security and Cryptography of Fujian Province;China Academy of Electronics and Information Technology;
..............page:333-343
Cryptanalysis of Public Key Cryptosystems Based on Non-Abelian Factorization Problems
Jinhui Liu;Aiwan Fan;Jianwei Jia;Huanguo Zhang;Houzhen Wang;Shaowu Mao;Computer School of Wuhan University;Computer School of Pingdingshan University;
..............page:344-351
Test Data Generation for Stateful Network Protocol Fuzzing Using a Rule-Based State Machine
Rui Ma;Daguang Wang;Changzhen Hu;Wendong Ji;Jingfeng Xue;Beijing Key Laboratory of Software Security Engineering Technology;School of Software;Beijing Institute of Technology;
..............page:352-360
Information for Contributors
..............page:363