Reversible data hiding in encrypted images using recompression
LIU Jiu-fen;HAN Tao;TIAN Yu-guo;LIU Wen-bin;Information Engineering University;State Key Laboratory of Mathematical Engineering and Advanced Computing;State Key Laboratory of Information Security;Institute of Information Engineering;Chinese Academy of Sciences;
..............page:13-25
Dynamic trust model based on recommendation chain classification in complex network environment
ZHANG Lin;XING Huan;WANG Ru-chuan;WU Chao-jie;College of Computer;Nanjing University of Posts and Telecommunications;Institute of Computer Technology;Nanjing University of Posts and Telecommunication;Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks;Key Lab of Broadband Wireless Communication and Sensor Network Technology;Nanjing University of Posts and Telecommunications;Ministry of Education Jiangsu Province;
..............page:55-64
New affiliation-hiding authenticated key exchange protocol
WEN Ya-min;GONG Zheng;School of Mathematics and Statistics;Guangdong University of Finance and Economics;Shanghai Key Laboratory of Integrated Administration Technologies for Information Security;School of Computer Science;South China Normal University;State Key Laboratory of Information Security;Institute of Information Engineering;Chinese Academy of Sciences;
..............page:82-90
..............page:98-108
..............page:109-118
..............page:119-126
Loopback matching algorithm with support set protection
TIAN Shu-juan;FAN Xiao-ping;PEI Ting-rui;YANG Shu;LI Zhe-tao;School of Information Science and Engineering;Central South University;College of Information Engineering;Xiangtan University;Laboratory of Networked Systems;Hunan University of Finance and Economics;
..............page:127-134
..............page:135-144
..............page:145-159
..............page:160-168
..............page:169-180
..............page:181-187
..............page:188-192
Formal modeling and analyzing method for database security policy
WANG Rong;ZHANG Min;FENG Deng-guo;LI Hao;Trusted Computing and Information Assurance Laboratory;Institute of Software;Chinese Academy of Sciences;University of Chinese Academy of Sciences;State Key Laboratory of Computer Science;Institute of Software;Chinese Academy of Sciences;
..............page:193-203
..............page:204-214
..............page:215-221
..............page:222-229
..............page:230-243
..............page:244-251
..............page:252-258
..............page:259-266