Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Geomatics and Information Science of Wunan University
1671-8860
2010 Issue 5
Design of Trust Base in Operating Systems
SHI Wenchang1;2
..............page:505-508
Application KCFM to Detect New P2P Botnet Based on Multi-Observed Sequence
KANG Jian1 SONG Yuanzhang1
..............page:520-523
Design of Cross-Correlation Test Algorithm on S-Box
GAO Sheng1 MA Wenping1 GUO Na1 CHEN Qiuli1
..............page:558-561
A QoS Based Fault-Tolerant Topology Control Algorithm for Ad Hoc Network
WANG Dong1 LI Fa1 LI Xiaohong1
..............page:512-515,549
A Standardized Method of Security Protocol Design
DENG Fan1 LI Yifa1 ZHANG Wenzheng2
..............page:603-606
Analysis and Implementation of Trusted Node and Trusted Routing in Vehicular Ad-Hoc Network
DENG Junyi1;2 LIU Yanheng1;2 WANG Jian1;2
..............page:607-609,631
Quantitative Assignment of the Grid Behavior Trust Model Based on Trusted Computing
LIU Lizhao1 WEI Peng2 WANG Ying1 LI Maoqing 1
..............page:587-590
Chosen-plaintext Attack on a Chaotic Image Cipher
LIU Ting1 MIN Lequan1;2
..............page:546-549
Employment of Program Annotations in Trusted Code and Their Type Verification
ZHAO Yang1;2 XU Xiaogang2 ZHANG Gongxuan1 ZHANG Rong1
..............page:570-573
An Epidemic Model of Mobile Phone Bluetooth Virus with Mobile Nodes
QIU Guoli1 JIANG Guoping2 SONG Yurong3
..............page:610-613
A Data Dispersal Algorithm Based on Key Policies
YANG Xiaoyuan1;2 ZHU Shuaishuai1 ZHANG Wei1
..............page:516-519
A Botnet Migration Analyzer Based on the C-F Model
ZANG Tianning1;2;3 YUN Xiaochun1;2;3 ZHANG Yongzheng2;3 MEN Chaoguang1
..............page:622-625
Impossible Differential Cryptanalysis on 8-round AES-256
DONG Xiaoli1 HU Yupu1 CHEN Jie1;2
..............page:595-598
Analysis and Improvement of Delegation Mechanism in a Trusted Computing Platform
HUANG Ningyu1 ZHANG Xing1
..............page:599-602
A DTE-based Security Domain Model for the Attestation System
SHI Guangyuan1 GONG Bei1 FENG Yumeng1 YUE Shaoyuan2
..............page:537-541
A Embedded System-based Computing Platform for Tolerating Untrusted Component
GAO Li1 QIN Xi1 CHANG Chaowen1 CHEN Xin1
..............page:626-629
A Dynamic Monitoring Approach for Component Security Testing
CHEN Jinfu1 WEN Xianxin2 YANG Hebiao1
..............page:554-557,586
Design of Compatibility Scheme on TCM Software Stack
ZHANG Xing1;2 HUANG Ningyu2 ZHU Lu2;3
..............page:618-621
Lattice-based Blind Signature Schemes
WANG Fenghe1;2 HU Yupu1 WANG Chunxiao3
..............page:550-553
Certificateless Authentication Protocol Without Pairing
ZHU Hui1 LI Hui1 TAN Shichong1 WANG Yumin1
..............page:574-577
Online Botnet Detection Techniques
YU Xiaocong1;2 DONG Xiaomei1 YU Ge1 QIN Yuhai2
..............page:578-581
A Trust Evaluation Model Based on Multiple Services Attributes
DU Ruizhong1 YANG Xiaohui1 TIAN Junfeng 1
..............page:524-527
An Identity-based Authenticated Key Agreement Sheme for Heterogeneous Sensor Networks
FU Xiaojing1;2 ZHANG Guoyin1 MA Chunguang1;2
..............page:582-586
A New Image Encryption Algorithm Based on Multiple Chaotic Maps and Output-Feedback
ZHU Congxu1 HUANG Dazu1;2 GUO Ying1
..............page:528-531
Fault-proneness Prediction of Software Modules
LUO Yunfeng1 PU Jie1 BEN Kerong1
..............page:562-565
Two Efficient CPK-based Group Key Transfer Protocols
DENG Shaofeng1 DENG Fan1 ZHANG Wenzheng2 LI Yifa1
..............page:591-594
Trust Valuation Based Anonymous Authenticated Routing Protocol
LI Xiaoqing1 LI Hui1 ZHU Hui1 MA Janfeng1
..............page:614-617
A Framework for Key Management in Heterogeneous Sensor Networks
MA Chunguang1;2 CHU Zhenjiang1 WANG Jiuru1 WANG Huiqiang1
..............page:509-511,502
Multi-output LFSR Based Uniform Pseudo Random Number Generator
GU Xiaochen1 ZHANG Minxuan1
..............page:566-569
A Trustworthiness Self-Adaptive Evaluation Model Oriented to Software Evolution
DING Shuai1;2 YANG Shanlin1;2 MA Xijun1;2 KAN Hongxing1
..............page:542-545