Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Geomatics and Information Science of Wunan University
1671-8860
2008 Issue 10
ke ji xin xi
..............page:998,994,1033,1037,1087,1099
Research on TPM Based on State Machine Theory
ZHAN Jing;ZHANG Huanguo;XU Shiwei;XIANG Shuang
..............page:1067-1069
Software Download Framework Based on Trust Measurement
LI Jian;HE Yongzhong;XU Kaiyong
..............page:1062-1066
Active Steganalysis for Stego-image Based on HMT and ICA
LIU Xiaoqin;WANG Jiazhen;XU Bo;DENG Gaoming
..............page:1059-1061,1066
Active Defense Model for Network Intrusion Based on Immune Multi-Agent
LIU Sunjun;WANG Diangang;YANG Pin;ZHANG Jianhua
..............page:1055-1058
A Universal Provable Security Authentication Protocol for Multi-Domain
ZHU Hui;LI Hui;YANG Jiaxi;WANG Yumin
..............page:1051-1054
SmartMK. TPM-based Trusted Multi-Kernel Operating System Architecture
CHEN Wenzhi;HUANG Wei
..............page:1034-1037
Blind Detection of Image Splicing Based on Image Quality Metrics and Hidden Markov Model
ZHANG Zhen;REN Yuan;PING Xijian;KANG Jiquan
..............page:1030-1033
Study of Watermarking Nonnumeric Data in Relational Databases
DONG Xiaomei;TIAN Yueping;LI Xiaohua;YU Ge
..............page:1026-1029
A Key Predistribution Scheme Based on Polynomial for HWSN
MA Chunguang;GENG Guining;WANG Huiqiang;SHANG Zhiguo
..............page:1022-1025
A Study of Software Fault Tolerance System Evaluation Strategy
LIU Xin;YIN Qian;GUO Ping
..............page:1018-1021
A Network Connection and Routing Model Based on Trust Theory
WANG Lina;ZHAO Lei;GUO Chi;FANG Zhejun
..............page:999-1002
Research on Key Technologies for Implementing Network Security Situation awareness
WANG Huiqiang;LAI Jibao;HU Mingming;LIANG Ying
..............page:995-998
A New Type Trusted Platform Module (TPM)
ZHANG Huanguo;QIN Zhongping;LIU Yi;HAN Yongqiao
..............page:991-994
Quantitative Evaluation Model for Survivability in MANETs
PENG Sancheng;JIA Weijia;WANG Guojun
..............page:1095-1098
Research of Terminal Security Model Based on Noninterference
WANG Fei;LIU Yi;LI Yong
..............page:1092-1094
Difference Timing Attack Against AES Based on Cache Timing Character
DENG Gaoming;ZHANG Peng;ZHAO Qiang;LIU Xiaoqin
..............page:1088-1091
Subjective Trust Control in Attribute Based Delegation Authorization Logical System
CHEN Bo;ZENG Guosun;LI Li
..............page:1080-1083
Provable Secure Identity Based Signature Scheme in the Standard Model
ZHANG Leyou;HU Yupu
..............page:1076-1079
A Secure Mutual Password Authentication Scheme with User Anonymity
WANG Bangju;ZHANG Huanguo;WANG Zhangyi;WANG Yuhua
..............page:1073-1075
Security Digital Watermarking Schemes Based on Structured Code
HAO Yanjun;WANG Lina;ZHANG Huanguo
..............page:1070-1072
An Efficient and Scalable Fault Detection Algorithm for Grid Systems
JI Xiaobo;CHEN Shuyu;TIAN Dong;WANG Rongbin
..............page:1046-1050
Energy-efficient Secure Topology Control Protocol for Wireless Sensor Networks
WANG Xinsheng;ZHAN Yongzhao;WANG Liangmin
..............page:1042-1045,1050
Multi-Pattern Matching Algorithm for Web Resource Access Control Decision
SHAN Dibin;CHEN Xingyuan;ZHANG Bin
..............page:1038-1041
Research of SMS4's Implementation in Hardware Based on Embedded System
ZHAO Bo;XIONG Quan;HAN Bixia
..............page:1015-1017
A Novel Design of Trusted Platform Control Module
ZHANG Xing;SHEN Changxiang
..............page:1011-1014
Steganalysis Based on R-Farid High Order Statistic Model
TANG Guangming;ZHANG Shishu
..............page:1007-1010
A Compressible Threshold Image Sharing Scheme Based on Matrix Projection
HOU Zhengfeng;GAO Hanjun;HAN Jianghong;HU Donghui
..............page:1003-1006