Efficient fuzzy attribute-based signcryption scheme
YANG Xiao-yuan;LIN Zhi-qiang;HAN Yi-liang;Key Laboratory of the Chinese Armed Police Force for Cryptology and Information Security;Department of Electronic Technology;Engineering University of the Chinese Armed Police Force;Institute of Network and Information Security Under the Chinese Armed Police Force;Department of Electronic Technology;Engineering University of the Chinese Armed Police Force;
..............page:8-13+20
Dynamic trust evaluation model based on evaluation credibility in cloud computing
ZHANG Lin;RAO Kai-li;WANG Ru-chuan;College of Computer;Nanjing University of Posts and Telecommunications;High Technology Research Key Laboratory for Wireless Sensor Networks of Jiangsu Province;Key Lab of Broadband Wireless Communication and Sensor Network Technology;Ministry of Education;Nanjing University of Posts and Telecommunications;
..............page:31-37
..............page:92-100
..............page:101-105
..............page:106-115
..............page:116-125
..............page:126-132
..............page:133-141
..............page:142-147
..............page:148-155
..............page:156-161
..............page:162-169
..............page:170-175
..............page:176-181
..............page:182-189
..............page:190-196
..............page:197-206
..............page:207-215
..............page:216-222
Fine-grained description model and implementation of hypermedia document
SU Mang;SHI Guo-zhen;LI Feng-hua;SHEN Ying;HUANG Qiong;WANG Miao-miao;National Key Laboratory of Integrated Services Network;Xidian University;Department of Electronic Engineering;Beijing Electronic Science and Technology Institute;State Key Laboratory of Information Security;Institute of Information Engineering;Chinese Academy of Sciences;
..............page:223-229
..............page:230-234
..............page:235-239+245
..............page:240-245
..............page:246-255
..............page:256-262
..............page:263-267
..............page:268-275
..............page:276-284
SYN flood attack defense strategy for asymmetric routing
TAO Jian-xi;ZHOU Li;ZHOU Zhou;YANG Wei;LIU Qing-yun;YANG Rong;Institute of Information Engineering;Chinese Academy of Sciences;College of Computer Science and Technology;Beijing University of Posts and Telecommunications;National Engineering Laboratory for Information Security Technology;National Computer Network Emergency Response Technical Team/Coordination Center;
..............page:285-291
..............page:292-302