Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Wuhan University Journal of Natural Sciences
1007-1202
2005 Issue 1
A Family of RBAC- Based Workflow Authorization Models
HONG Fan;XING Guang-lin
..............page:324-328
A Geometrical Transformations Resistant Digital Watermarking Based on Quantization
SHI Lei;HONG Fan;LIU Wei-qun;HU Yu-ping;CHEN Zhuo
..............page:319-323
Information- Theoretic Analysis for the Difficulty of Extracting Hidden Information
ZHANG Wei-ming;LI Shi-qu;CAO Jia;LIU Jiu-fen
..............page:315-318
A Novel Digital Audio Watermarking Scheme in the Wavelet Domain
WANG Xiang-yang;YANG Hong-ying;ZHAO Hong
..............page:311-314
Robustness Proof on A United Watermarking Based on CRT Theorem
LIU Li-gang;CHEN Xiao-su;XIAO Dao-ju;HU Lei
..............page:307-310
A New Images Hiding Scheme Based on Chaotic Sequences
LIU Nian-sheng;GUO Dong-hui;WU Bo-xi;Parr G
..............page:303-306
Turbo-Based DNW Algorithm for Compressed Video in VLC Domain
LING He-fei;LU Zheng-ding;ZOU Fu-hao
..............page:297-302
Data Hiding and Security for XML Database: A TRBAC- Based Approach
ZHANG Wan-song;SUN Wei;LIU Da-xin
..............page:293-296
A Secure Public-key Image Authentication Plan
YANG Qing;CHEN Ke-fei
..............page:289-292
Wavelet-Based Denoising Attack on Image Watermarking
XUAN Jian-hui;WANG Li-na;ZHANG Huan-guo
..............page:279-283
A Formal Model for the Security of Proxy Signature Schemes
GU Chun-xiang;ZHU Yue-fei;ZHANG Ya-juan
..............page:275-278
An Anonymous Payment Protocol with Mobile Agents in Hostile Environments
LIU Yi;XIANG Ming-sen;WANG Yu-min
..............page:271-274
Statistical Characteristics of the Complexity for Prime- Periodic Sequences
NIU Zhi-hua;LI Nai-cheng;XIAO Guo-Zhen
..............page:211-213
Robust Threshold Guillou-Quisquater Signature Scheme
WANG Hong;ZHANG Zhen-feng;FENG Deng-guo
..............page:207-210
A Role- Based PMI Security Model for E- Government
WU Li-jun;SU Kai-le;YANG Zhi-hua
..............page:329-332
Fair Electronic Payment Scheme Based on DSA
WANG Shao-bin;HONG Fan;Zhu Xian
..............page:203-206
An Efficient Crash Recovery Technique for Real- Time Main Memory Database
XIAO Ying-yuan;LIU Yun-sheng;LIAO Guo-Qiong;LIANG Ping
..............page:61-64
Model Checking Electronic Commerce Security Protocols Based on CTL
XIAO De-qin;ZHANG Huan-guo
..............page:333-337
A Proxy Signature Scheme as Secure as Decisional Diffie- Hellman Problem
LU Rong-xing;CAO Zhen-fu
..............page:186-190
Extension of Subjective Logic for Time- Related Trust
HUANG Chen-lin;HU Hua-ping
..............page:56-60
TRSTR: A Fault- Tolerant Microprocessor Architecture Based on SMT
YANG Hua;CUI Gang;YANG Xiao-zong
..............page:51-55
Building Intrusion Tolerant Software System
PENG Wen-ling;WANG Li-na;ZHANG Huan-guo;CHEN Wei
..............page:47-50
Formal Verification under Unknown Constraints
LI Guang-hui;LI Xiao-wei
..............page:43-46
SLID: A Secure Lowest- ID Clustering Algorithm
HU Guang-ming;HUANG Zun-guo;HU Hua-ping;GONG Zheng-hu
..............page:39-42
Analysis and Application for Integrity Model on Trusted Platform
TU Guo-qing;ZHANG Huan-guo;WANG Li-na;YU Dan-dan
..............page:35-38
An FPGA Implementation of GF(p) Elliptic Curve Cryptographic Coprocessor
Liu Yu-zhen;QIN Zhong-ping;ZHANG Huan-guo
..............page:31-34
HermitFS: A Secure Storage System in the Open Environment
LONG Qin;ZENG Feng-ping;WU Si-lian;PAN Ai-Min
..............page:26-30
An Adaptive Trust Model of Web Services
SU Jin-dian;Guo He-qing;GAO Yin
..............page:21-25
Simultaneous Multithreading Fault Tolerance Processor
Dong Lan;HU Ming-Zeng;Jl Zhen-zhou;CUI Guang-zuo;TANG Xin-min;HE Feng
..............page:17-20
Investigation on Relationship between Cost and Software Reliability
XU Ren-zuo;HAN Yi-fan;HUANG Can;YAO Jun-feng
..............page:9-12
Fault- Tolerant Design Techniques in A CMP Architecture
YAO Wen-bin;WANG Dong-sheng
..............page:5-8
A New Threshold Signature Scheme Using Self-Certified Public Keys
SHAO Jun;LU Rong-xing;CAO Zhen-fu
..............page:263-266
Algebraic Attack on Filter-Combiner Model Keystream Generators
WU Zhj-ping;YE Ding-feng;MA Wei-ju
..............page:259-262
An Efficient Threshold Blind Signature from Weil Pairing
CHENG Xiang-guo;XU Wei-dong;WANG Xin-mei
..............page:255-258
Distribution of Random Session Key Based on Key-Insulated Public-Key Cryptosystems
LU Hai-jun;SU Yun-xue;ZHU Yun-fei
..............page:251-254
Efficient Identity Based Signcryption Scheme with Public Verifiability and Forward Security
LEI Fei-yu;CHEN Wen;CHEN Ke-fei;MA Chang-she
..............page:248-250
Implementation and Performance Evaluation of IPSec VPN Based on Netfilter
ZHAO Da-yuan;JIANG Yi-xin;LIN Chuang;Li Yan-xi
..............page:98-102
A Micro- Payment Based Isolation of Misbehavior Secure Routing for Sensor Network
LI Hui;WEI Wei;CHEN Ke-fei
..............page:93-97
Two-Stage Algorithm for Correlating the Intrusion Alerts
WANG Liang-min;MA Jian-feng
..............page:89-92
Mechanism and Defense on Malicious Code
WEN Wei-ping;QING Si-han
..............page:83-88
Research on Fault Tolerant Scheduling Algorithms of Web Cluster Based on Probability
LIU An-Feng;CHEN Zhi-gang;LONG Guo-ping
..............page:70-74
Access Request Trustworthiness in Weighted Access Control Framework
WANG Lun-wei;LIAO Xiang-ke;Wang Huai-min
..............page:65-69
Threshold Decryption Scheme with Multiple Policies
FEI Ru-chun;WANG Li-na
..............page:243-247
Polynomial Analysis of DH Secrete Key and Bit Security
JIANG Zheng-tao;XU Wen-li;WANG Yu-min
..............page:239-242
An Identity- Based Key- Exchange Protocol
ZHANG Ya-juan;ZHU Yue-fei;HUANG Qiu-sheng
..............page:235-238
Cryptanalysis and Improvement of Signcryption Schemes on Elliptic Curves
LI Xiang-xue;CHEN Ke-fei;LI Shi-qun
..............page:231-234
Atomic Electronic Contract Protocol Based on Convertible Signature
LIU Yi-chun;WANG Li-na;ZHANG Huan-guo
..............page:227-230
A Nominative Multi- Proxy Signature Scheme Based on ECC
MA Chuan-gui;GAO Feng-xiu;WANG Yan
..............page:223-226
A New Proxy Signature Scheme with Message Recovery Using Self-Certified Public Key
LI Ji-guo;Zhang Yi-chen;ZHU Yue-long
..............page:219-222
Towards the Idealization Procedure of BAN- Like Logics
CAO Li-li;CHEN Ke-fei
..............page:214-218
A Security Kernel Architecture Based Trusted Computing Platform
CHEN You-lei;SHEN Chang-xiang
..............page:1-4
Cryptanalysis of the One- Time Proxy Signature Scheme Used in Mobile Agents
FU Xiao-tong;XIAO Hong;XIAO Guo-Zhen
..............page:183-185
Correlation Degree and Correlation Coefficient of Multi- Output Functions
JU Gui-zhi;ZHAO Ya-Qun
..............page:195-198
Construction of Resilient Functions
ZHANG Jie;WEN Qiao-yan
..............page:199-202
A Secure and Efficient (t, n) Multi- Secret Sharing Scheme
PANG Liao-Jun;WANG Yu-min
..............page:191-194
Evolutionary Design of Boolean Functions
WANG Zhang-yi;ZHANG Huan-guo;QIN Zhong-ping;MENG Qing-Shu
..............page:179-182
An Intrusion Alarming System Based on Self- Similarity of Network Traffic
YU Fei;ZHU Miao-liang;CHEN Yu-feng;LI Ren-fa;XU Cheng
..............page:169-173
Verifiable (t, n) Threshold Signature Scheme Based on Elliptic Curve
WANG Hua-qun;ZHAO Jun-xi;ZHANG Li-jun
..............page:165-168
A Network- Based VPN Architecture Using Virtual Routing
ZHANG Bao-liang;HU Han-ping;WU Xiao-gang;Kong Tao
..............page:161-164
A Novel Model of IDS Based on Fuzzy Cluster and Immune Principle
TAO Xin-min;LIU Fu-rong
..............page:157-160
Security Communication Model of Wireless Trade System
ZHANG Wen-kai;ZHANG Si-yu
..............page:152-156
Immune Based Intrusion Detector Generating Algorithm
DONG Xiao-mei;YU Ge;XIANG Guang
..............page:147-151
A Cluster- Based Secure Active Network Environment
CHEN Xiao-lin;ZHOU Jing-yang;DAI Han;LU Sang-Lu;Chen Gui-hai
..............page:142-146
Privilege Flow Oriented Intrusion Detection Based on Hidden Semi- Markov Model
ZHONG An-ming;JIA Chun-fu
..............page:137-141
Complex Threshold Key Management for Ad Hoc Network
GUO Wei;Xiong Zhong-wei;Li Zhi-tang
..............page:132-136
SLEACH: Secure Low- Energy Adaptive Clustering Hierarchy Protocol for Wireless Sensor Networks
WANG Xiao-yun;YANG Li-zhen;CHEN Ke-fei
..............page:127-131
A New Communication Scheme for Threshold Certificate Authority in Ad Hoc Networks
LI Guang-song;LI Hong;HAN Wen-bao
..............page:123-126
Intelligent Intrusion Detection System Model Using Rough Neural Network
YAN Huai-zhi;HU Chang-zhen;TAN Hui-min
..............page:119-122
A Neural Network Approach for Misuse and Anomaly Intrusion Detection
YAO Yu;YU Ge;GAO Fu-xiang
..............page:115-118
MA- IDS: A Distributed Intrusion Detection System Based on Data Mining
SUN Jian-hua;JIN Hai;CHEN Hao;HAN Zong-Fen
..............page:111-114
Masquerade Detection Using Support Vector Machine
YANG Min;WANG Li-na;ZHANG Huan-guo;CHEN Wei
..............page:103-106