Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal on Communications
1000-436X
2013 Issue S1
Lightweight authentication protocol for RFID
CHEN Bing;ZHENG Jia-qi;Institute of Computer Science and Technology;Nanjing University of Aeronautics and Astronautics;
..............page:1-7
Efficient fuzzy attribute-based signcryption scheme
YANG Xiao-yuan;LIN Zhi-qiang;HAN Yi-liang;Key Laboratory of the Chinese Armed Police Force for Cryptology and Information Security;Department of Electronic Technology;Engineering University of the Chinese Armed Police Force;Institute of Network and Information Security Under the Chinese Armed Police Force;Department of Electronic Technology;Engineering University of the Chinese Armed Police Force;
..............page:8-13+20
Scheme of node identify authentication in distributed file interaction system
HE Wen-cai;DU Min;CHEN Zhi-wei;LIU Pei-he;HAN Yan-yan;Department of Telecommunications Engineering;Beijing Electronic Science & Technology Institute;School of Telecommunications Engineering;Xidian University;
..............page:14-20
Model of runtime memory leak detection based on the virtual machine introspection
XIAO Ru-liang;JIANG Jun;NI You-cong;DU Xin;XIE Guo-qing;CAI Sheng-zhen;Faculty of Software;Fujian Normal University;
..............page:21-30
Dynamic trust evaluation model based on evaluation credibility in cloud computing
ZHANG Lin;RAO Kai-li;WANG Ru-chuan;College of Computer;Nanjing University of Posts and Telecommunications;High Technology Research Key Laboratory for Wireless Sensor Networks of Jiangsu Province;Key Lab of Broadband Wireless Communication and Sensor Network Technology;Ministry of Education;Nanjing University of Posts and Telecommunications;
..............page:31-37
Oblivious transfer based on physical unclonable function system
GUO Yuan-bo;ZHANG Zi-nan;YANG Kui-wu;Institute of Cyberspace Security;the;PLA Information Engineering University;
..............page:38-43
Cooperative routing algorithm based on game theory
XIE Kun;DUAN Shen-lin;WEN Ji-gang;HE Shi-ming;School of Information Science and Engineering;Hunan University;Institute of Computing Technology;Chinese Academy of Sciences;
..............page:44-57
Analysis and improvement for authentication protocols of mobile ad hoc network with CSP approach
LIU Li-cai;YIN Li-hua;GUO Yun-chuan;SUN Yan;School of Computer Science;Beijing University of Posts and Telecommunications;Institute of Information Engineering;Chinese Academy of Sciences;
..............page:58-66
Data distribution strategy based on the X-RDP array codes
WAN Wu-nan;SUO Wang;CHEN Yun;WANG Tuo;Network Engineering Department;Chengdu University of Information Technology;Institute of Applied Cryptograph;Chengdu University of Information Technology;
..............page:67-75
Power analysis-resistant based on NCL path balance
LUO Fang;OU Qing-yu;WU Xiao-ping;Department of Information Security;Naval University of Engineering;
..............page:76-83
Microblog burst topic diffusion prediction algorithm based on the users and node scale
WANG Wei;LI Rui-guang;ZHOU Yuan;YANG Wu;Information Security Research Center;Harbin Engineering University;National Computer Network Emergency Response Technical Team/Coordination Center;
..............page:84-91
Secure hidden keyword searchable encryption schemewith fine-grained and flexible access control
YANG Yang;LIN Bo-gang;MA Mao-de;College of Mathematics and Computer Science;Fuzhou University;Key Lab of Information Security of Networks Systems of Fujian Province;Fuzhou University;School of Electrical & Electronic Engineering;Nanyang Technological University;
..............page:92-100
Blind signature scheme based on trusted platform computation module
HUANG Wen-ting;TONG Ling-ling;WANG Yong-jian;National Computer Network Emergency Response Technical Team Coordination Centre;
..............page:101-105
Android malware detection method based on permission sequential pattern mining algorithm
YANG Huan;ZHANG Yu-qing;HU Yu-pu;LIU Qi-xu;State Key Laboratory of Integrated Services Networks;Xidian University;National Computer Network Intrusion Protection Center;University of Chinese Academy of Sciences;
..............page:106-115
SIM: a secure IP protocol for MANET
LI Rong-sen;DOU Wen-hua;School of Computer Science;National University of Defense Technology;72946 Troops;People’s Liberation Army;
..............page:116-125
Risk assessment model based on fuzzy Petri nets
GAO Xiang;ZHU Yue-fei;LIU Sheng-li;FEI Jin-long;LIU Long;State Key Laboratory of Mathematical Engineering and Advanced Computing;PLA Information Engineering University;
..............page:126-132
Enhanced-throughput multipath routing algorithm based on network coding in IoVs
FAN Cun-qun;WANG Shang-guang;GU Wen-zhe;SUN Qi-bo;YANG Fang-chun;State Key Laboratory of Networking and Switching Technology;Beijing University of Posts and Telecommunications;
..............page:133-141
Dynamic situation gateway based system cooperation access gatel model
GUO Shu-hang;ZHANG Yu;School of Information;Central University of Finance and Economics;
..............page:142-147
Attribute based sanitizable signature scheme
LIU Xi-meng;MA Jian-feng;XIONG Jin-bo;MA Jun;LI Qi;School of Telecommunication Engineering;Xidian University;School of Computer Science and Technology;Xidian University;
..............page:148-155
Simple power analysis attack against cryptosystems based on Montgomery algorithm
GAN Gang;WANG Min;DU Zhi-bo;WU Zhen;Network Engineering Department;Chengdu University of Information Technology;
..............page:156-161
UWSP: sleeping algorithms for underwater sensor network
HONG Lu;HONG Feng;Department of Computer Engineering;Weifang University;College of Information Science & Engineering;Ocean University of China;
..............page:162-169
Development of dependable embedded computer systems
KONG De-qi;LI Ya-hui;GUO Peng;Airborne and Missile-borne Aviation Key Lab;Aeronautical Computing Technique Research Institute;
..............page:170-175
Research on relay related handover security in LTE-A
WU Hao;WANG Tao;WU Shao-bo;State Key Laboratory of Rail Traffic Control and Safety;Beijing Jiaotong University;
..............page:176-181
Period dividing opportunistic networks mobility model based on human realistic scenarios
CHENG Gang;ZHANG Yun-yong;ZHANG Yong;SONG Mei;Beijing Key Laboratory of Work Safety Intelligent Monitoring;Beijing University of Posts and Telecommunications;Department of Platform and Cloud Computing;China Unicom Research Institute;
..............page:182-189
Privacy leakage in online social networks based on public information
LV Shao-qing;ZHANG Yu-qing;NI Ping;Information Security Research Center of State Key Laboratory of Integrated Services Networks;Xidian University;National Computer Network Intrusion Protection Center;University of Chinese Academy of Sciences;
..............page:190-196
Active-probing based distributed malware master detection system
SI Cheng-xiang;SUN Bo;YANG Wen-han;ZHANG Hui-lin;XUE Xiao-nan;CNCERT/CC;Institute of Computer Science and Technology;Peking University;
..............page:197-206
On access to trusted virtual group under cloud computing
LIANG Peng;SHEN Chang-xiang;NING Zhen-hu;Beijing Key Laboratory on Trusted Computing;College of Computer Science;Beijing University of Technology;
..............page:207-215
Research on intelligent optimization of cryptogram service scheduling for service composition
LI Jian-jun;YU Bin;CHEN Wu-ping;Institute of Cryptographic Engineering;Information Engineering University;Science and Technology on Information Assurance Laboratory;
..............page:216-222
Fine-grained description model and implementation of hypermedia document
SU Mang;SHI Guo-zhen;LI Feng-hua;SHEN Ying;HUANG Qiong;WANG Miao-miao;National Key Laboratory of Integrated Services Network;Xidian University;Department of Electronic Engineering;Beijing Electronic Science and Technology Institute;State Key Laboratory of Information Security;Institute of Information Engineering;Chinese Academy of Sciences;
..............page:223-229
Survey of the context-aware location privacy-preserving techniques
MAO Dian-hui;CAO Jian;CAI Qiang;LI Hai-sheng;School of Computer and Information Engineering;Beijing Technology and Business University;
..............page:230-234
Provable security EPC information service communication scheme for EPC network
LI Jing-feng;PAN Heng;GUO Wei-feng;Institute of Cryptographic Engineering;PLA Information Engineering University;Computer Science College;Zhongyuan University of Technology;
..............page:235-239+245
Attack-defense game model of node traces privacy preserving for vehicle ad hoc networks
YANG Wei-dong;HE Yun-hua;SUN Li-min;College of Information Science and Engineering;Henan University of Technology;SKLOIS;Institute of Information Engineering;Chinese Academy of Sciences;School of Computer Science and Technology;Xidian University;
..............page:240-245
Secure resource metering and accounting with hash chain in cloud storage
LIU Mei;FU Ge;LI Yi-xi;ZHANG Hong;LIU Xin-ran;DU Cui-lan;Institute of Information Engineering;Chinese Academy of Sciences;National Computer Network Emergency Response Technical Team/Coordination Center of China;
..............page:246-255
Microblog hot topic detection method based on meaningful string clustering
HE Min;WANG Li-hong;DU Pan;ZHANG Jin;CHENG Xue-qi;Institute of Computing Technology;Chinese Academy of Sciences;National Computer network Emergency Response Technical Team/Coordination Center of China;
..............page:256-262
Fast access authentication scheme for mobile IPv6 hierarchical network
SONG Shan-shan;SHANG Tao;LIU Jian-wei;School of Electronic and Information Engineering;Beihang University;
..............page:263-267
Routing algorithm based on location optimization of sink node in hybrid wireless sensor networks
ZOU Sai;WANG Wen-yong;TANG Yong;ZHANG Jun;School of Computer Science and Engineering;University of Electronic Science and Technology;School of Software Engineering;Chongqing College of Electronic Engineering;
..............page:268-275
Enhanced cloud storage access control scheme based on attribute
NIU De-hua;MA Jian-feng;MA Zhuo;LI Chen-nan;WANG Lei;School of Computer Science and Technology;Xidian University;
..............page:276-284
SYN flood attack defense strategy for asymmetric routing
TAO Jian-xi;ZHOU Li;ZHOU Zhou;YANG Wei;LIU Qing-yun;YANG Rong;Institute of Information Engineering;Chinese Academy of Sciences;College of Computer Science and Technology;Beijing University of Posts and Telecommunications;National Engineering Laboratory for Information Security Technology;National Computer Network Emergency Response Technical Team/Coordination Center;
..............page:285-291
RFID-sensor based multi-reader cooperation mechanism information collecting protocol in IOT
LI Wen-xiu;GUO Ya-hong;LI Jin-bao;GUO Long-jiang;ZHANG Shao-bin;School of Computer Science and Technology;Heilongjiang University;Key Laboratory of Database and Parallel Computing of Heilongjiang Province;Information Science and Technology of Heilongjiang University College;Strategy Development Department of China Mobile Communications Group;
..............page:292-302