Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Wuhan University Journal of Natural Sciences
1007-1202
2006 Issue 6
A New Definition of Virus
HE Hongjun;CAO Sihua;LUO Li;FENG Tao;PAN Li;ZOU Zhiji
..............page:1697-1700
Password-Based Group Key Agreement Protocol for Client-Server Application
LU Rongxing;CAO Zhenfu;DONG Xiaolei;SONG Chao;SUN Congkai
..............page:1701-1703
An Efficient ECDSA-Based Signature Scheme for Wireless Networks
XU Zhong;DAI Guanzhong;YANG Deming
..............page:1707-1710
A Potential Approach of Internet Worm Propagation Based on P2P
YAO Yu;LUO Xingrui;GAO Fuxiang;YU Ge
..............page:1711-1714
Security Analysis of Discrete Logarithm Based Cryptosystems
WANG Yuzhu;LIAO Xiaofeng
..............page:1715-1717
Assessing the Risk Situation of Network Security for Active Defense
ZHANG Xiang;YAO Shuping;TANG Chenghua
..............page:1718-1722
A Scalable Intrusion Detection System for IPv6
LIU Bin;LI Zhitang;LI Zhanchun
..............page:1723-1726
A Forward Integrity and Itinerary Secrecy Protocol for Mobile Agents
GUAN Huanmei;MENG Xuejun;ZHANG Huanguo
..............page:1727-1730
Identity Based Group Key Agreement from Bilinear Pairing
WANG Liming;WU Chuankun
..............page:1731-1735
Context-Aware Usage-Based Grid Authorization Framework
CUI Yongquan;HONG Fan;FU Cai
..............page:1736-1740
A Threshold Scheme under Peer-to-Peer Network
XIE Yumin;SHI Feng;MING Yang;MUHAMMAD Kamran;XU Jianqiang
..............page:1741-1744
Electronic Payment Scheme to Prevent the Treachery
FAN Kai;ZHANG Jun;KOU Weidong;XIAO Guozhen
..............page:1745-1748
A Secure MAKAP for Wireless Communication
LIU Zhimeng;ZHAO Yanli;FAN Hui
..............page:1749-1752
A Method of Eliminating Information Disclosure in View Publishing
LIU Guohua;GAO Shihong
..............page:1753-1756
Probabilistic Analysis on Connectivity for Sensor Grids with Unreliable Nodes
WANG Gaocai;LIN Chuang;CHEN Jianer
..............page:1757-1760
An Identity-Based Scheme of Fair Exchange of Digital Signatures
YU Yong;YANG Bo;YANG Guoqing
..............page:1761-1764
A New Detection Approach Based on the Maximum Entropy Model
DONG Xiaomei;XIANG Guang;YU Ge;LI Xiaohua
..............page:1765-1768
Anomaly Detection System Based on Principal Component Analysis and Support Vector Machine
LI Zhanchun;LI Zhitang;LIU Bin
..............page:1769-1772
Fault Attack on the Balanced Shrinking Generator
GAO Juntao;LI Xuelian;HU Yupu
..............page:1773-1776
A Secure Anonymous Internet Electronic Voting Scheme Based on the Polynomial
CAO Feng;CAO Zhenfu
..............page:1777-1780
A Novel Situation Assessment Method for Network Survivability
WANG Jian;WANG Huiqiang;ZHAO Guosheng
..............page:1785-1788
A Novel Multi-Level Trust Algorithm for Mobile Ad Hoc Networks
YU Genjian;ZHENG Baoyu
..............page:1789-1792
Redundant Multithreading Architecture Overview
YANG Hua;CUI Gang;LIU Hongwei;YANG Xiaozong
..............page:1793-1796
A Framework for an Adaptive Anomaly Detection System with Fuzzy Data Mining
GAO Xiang;WANG Min;ZHAO Rongchun
..............page:1797-1800
An Improved Grid Security Infrastructure by Trusted Computing
YAN Fei;ZHANG Huanguo;SUN Qi;SHEN Zhidong;ZHANG Liqiang;QIANG Weizhong
..............page:1805-1808
A Dynamic Active Multicast Group Access Control Framework Based on Trust Management System
YANG Chang;CHEN Xiaolin;ZHANG Huanguo
..............page:1809-1813
Using an Improved Clustering Method to Detect Anomaly Activities
LI Han;ZHANG Nan;BAO Lihui
..............page:1814-1818
A Behavior-Based Remote Trust Attestation Model
ZHANG Huanguo;WANG Fan
..............page:1819-1822
A New Dynamic Group Signature Scheme
HE Yefeng
..............page:1693-1696
Efficient Multi-Resolution Compression Algorithm for Disk-Based Backup and Recovery
WANG Dejun;WANG Lina;WANG Hui
..............page:1951-1954
Centralized Role-Based Access Control for Federated Multi-Domain Environments
YU Guangcan;LU Zhengding;LI Ruixuan;MUDAR Sarem
..............page:1688-1692
An Effective Digital Watermarking Algorithm for Binary Text Image
HU Zhihua;QIN Zhongping
..............page:1683-1687
Using Combinational Logic Function to Watermark IP Based on FPGA
MIAO Sheng;DAI Guanzhong;MU Dejun;LI Meifeng
..............page:1679-1682
Chaos-Based Multipurpose Image Watermarking Algorithm
ZHU Congxu;LIAO Xuefeng;LI Zhihua
..............page:1675-1678
A Cache Considering Role-Based Access Control and Trust in Privilege Management Infrastructure
ZHANG Shaomin;WANG Baoyi;ZHOU Lihua
..............page:1827-1830
An Efficient Multicast Source Authentication Protocol
WANG Weidong;LI Zhitang;LU Chuiwei;ZHANG Yejiang
..............page:1831-1834
Trustworthiness Technologies of DDSS
TIAN Junfeng;XIAO Bing;WANG Zixian;ZHANG Yuzhu
..............page:1853-1856
Analysis and Application of Covert Channels of Internet Control Message Protocol
ZHOU Xueguang;ZHANG Huanguo
..............page:1857-1861
Walsh Spectrum Properties of Rotation Symmetric Boolean Function
WANG Yongjuan;HAN Wenbao;LI Shiqu
..............page:1862-1864
A Novel Forensic Computing Model
XU Yunfeng;LU Yansheng
..............page:1865-1868
Difference Energy Based Blind Image Watermarking Resisting to Geometrical Distortions
YU Yanwei;LU Zhengding;LING Hefei
..............page:1882-1886
Relationship between Multi-Output Partially Bent Functions and Multi-Output Bent Functions
ZHAO Yaqun;JU Guizhi;WANG Jue
..............page:1887-1890
A New Protocol for Multi-Item Electronic Auctions
HUANG Genxun;ZHOU Ran;WEI Fushan;YU Gang
..............page:1891-1894
Two t-out-of-n Oblivious Transfer Schemes with Designated Receiver
ZHANG Jianhong;ZOU Wei
..............page:1903-1906
Design on PKI-Based Anonymous Mobile Agent Security in E-Commerce
MENG Xiangsong;HAN Fengwu
..............page:1907-1910
Transmutation Scheme of Coin Flipping Protocol and Utilization
XIE Yumin;MING Yang;SHI Feng;MUHAMMAD Kamran
..............page:1911-1914
Improved Authenticated Multi-Key Agreement Protocol
ZHANG Hua;YUAN Zheng;WEN Qiaoyan
..............page:1915-1918
The Reliability Design and Availability Analysis of a Distributed Storage System
YANG Xiaohui;DU Ruizhong;TIAN Junfeng
..............page:1919-1922
Load-Balance Policy in Two Level-Cluster File System
LIU Yuling;SONG Weiwei;MA Xiaoxue
..............page:1935-1938
Design and Implementation of Two-Level Metadata Server in Small-Scale Cluster File System
LIU Yuling;YU Hongfen;SONG Weiwei
..............page:1939-1942
A New Method for the Detections of Multiple Faults Using Binary Decision Diagrams
PAN Zhongliang;CHEN Ling;ZHANG Guangzhao
..............page:1943-1946
A Fingerprinting Method Based on Module Extraction Used to Protect Intellectual Property
MIAO Sheng;DAI Guanzhong;LIU Hang;LI Meifeng
..............page:1947-1950
DDoS Defense Algorithm Based on Multi-Segment Timeout Technology
DU Ruizhong;YANG Xiaohui;MA Xiaoxue;HE Xinfeng
..............page:1823-1826
A New Watermarking Protocol against Conspiracy
ZHANG Jun;KOU Weidong;FAN Kai;CAO Xuefei
..............page:1671-1674
Digital Watermarking Algorithm Based on Wavelet Transform and Neural Network
WANG Zhenfei;ZHAI Guangqun;WANG Nengchao
..............page:1667-1670
A New Fragile Watermarking Scheme for Text Documents Authentication
XIANG Huazheng;SUN Xingming;TANG Chengliang
..............page:1661-1666
Adaptive Image Digital Watermarking with DCT and FCM
SU Liyun;MA Hong;TANG Shifu
..............page:1657-1660
Improvement of Identity-Based Threshold Proxy Signature Scheme with Known Signers
LI Fagen;HU Yupu;CHEN Jie
..............page:1653-1656
An Efficient and Secure Multi-Secret Sharing Scheme with General Access Structures
PANG Liaojun;LI Huixian;WANG Yumin
..............page:1649-1652
A New Fast Modular Arithmetic Method in Public Key Cryptography
WANG Bangju;ZHANG Huanguo
..............page:1645-1648
The Mechanism about Key and Credential on Trusted Computing Platform and the Application Study
SHEN Zhidong;ZHANG Huanguo;ZHANG Miao;YAN Fei;ZHANG Liqiang
..............page:1641-1644
Transparent System for Digital Media Copyright Protection in Mobile Business
YANG Cheng;ZHANG Lihe;WANG Yongbin;LIU Jianbo
..............page:1923-1926
An Efficient Key Management Protocol for Wireless Sensor Networks
ZENG Qingguang;CUI Yanling;LUO Juan
..............page:1927-1930
An Identity-Based Strong Designated Verifier Proxy Signature Scheme
WANG Qin;CAO Zhenfu
..............page:1633-1635
Further Analysis of Block Ciphers against Timing Attacks
LI Wei;GU Dawu
..............page:1629-1632
The New Concept of Path Contributing to the Cryptographic Strength Exceeding 2N
WU Jinmu;FU Guiqin;LIU Yi;GUO Lina
..............page:1585-1588
Public Key Cryptography Based on Ergodic Matrices over Finite Field
PEI Shihui;ZHAO Hongwei;ZHAO Yongzhe
..............page:1525-1528
A Chaotic Block Encryption Scheme Based on the Piecewise Nonlinear Map
WEI Pengcheng;LIAO Xiaofeng;ZHANG Wei;YANG Huaqian
..............page:1521-1524
Permutation Code Encryption-New Achievement Based on Path Encryption
WU Jinmu;LIU Maohua;FU Guiqin;GUO Lina
..............page:1581-1584
Security Analysis of Broadcaster Group Key Exchange Protocols
LI Li;ZHANG Huanguo
..............page:1577-1580
A New Honeynet Model
TIAN Junfeng;LIU Yongli
..............page:1835-1838
Immune Recognition Method Based on Analogy Reasoning in Intrusion Detection System
ZHANG Changyou;CAO Yuanda;YANG Minghua;YU Jiong;ZHU Dongfeng
..............page:1839-1843
Evaluation Model of System Survivability
LIU Yuling;PAN Shiying;TIAN Junfeng
..............page:1844-1848
Information-Theoretic Secure Verifiable Secret Sharing over RSA Modulus
QIU Gang;WANG Hong;WEI Shimin;XIAO Guozhen
..............page:1849-1852
An Efficient Method against Side-Channel Attacks on ECC
LIU Shuanggen;HU Yupu;XU Wensheng
..............page:1573-1576
Dynamically Reconfigurable Encryption System of the AES
WANG Youren;WANG Li;YAO Rui;ZHANG Zhai;CUI Jiang
..............page:1569-1572
A Power Efficient Aggregation of Encrypted Data in Wireless Sensor Network
HUANG Xingyang;YANG Ming
..............page:1563-1568
A New Method for Impossible Differential Cryptanalysis of 8-Round Advanced Encryption Standard
CHEN Jie;HU Yupu;WEI Yongzhuang
..............page:1559-1562
Simulation on Peak-to-Average Power Ratio for Orthogonal Frequency Division Multiplexing
SHAN Weifeng;MENG Baohong;LIU Ningning;LI Hui;ZHANG Hongwei
..............page:1873-1876
A Digital Right Management Model for Distribution of Digital Audiovisual Content
FAN Kefeng;PEI Qingqi;WANG Meihua;MO Wei;CAO Ling
..............page:1877-1881
Implementing Broadcast Encryption Scheme Using Bilinear Map and Group Characteristic
ZHANG Yichun;LIU Jianbo;JIN Libiao;LI Jianzeng
..............page:1554-1558
Enhance Confidentiality of Threshold Signature for MANET
GUO Wei;XIONG Zhongwei
..............page:1533-1536
New Weak Keys in RSA
WANG Baocang;LIU Shuanggen;HU Yupu
..............page:1529-1532
An Efficient Secure Real-Time Concurrency Control Protocol
XIAO Yingyuan;LIU Yunsheng;CHEN Xiangyang
..............page:1899-1902
Comment Fail-Stop Blind Signature Scheme Design Based on Pairings
HU Xiaoming;HUANG Shangteng
..............page:1545-1548
Subliminal Channels in the NTRU and the Subliminal-Free Methods
CAI Qingjun;ZHANG Yuli
..............page:1541-1544
A New Forward-Secure Authenticated Encryption Scheme with Message Linkages
LI Yanping;SI Guangdong;WANG Yumin
..............page:1537-1540
A Practical Approach to Attaining Chosen Ciphertext Security
LI Jun;CUI Guohua;YANG Muxiang
..............page:1601-1604
A Model of Hierarchical Key Assignment Scheme
ZHANG Zhigang;ZHAO Jing;XU Maozhi
..............page:1597-1600
Eavesdropping on the Orderly-Encrypting Multiparty Quantum Secret Sharing Protocols
QIN Sujuan;WEN Qiaoyan;ZHU Fuchen
..............page:1593-1596
A Generic Solution to Realize Public Verifiability of Signcryption
LEI Feiyu;CHEN Wen;CHEN Kefei
..............page:1589-1592
An Extended Hierarchical Trusted Model for Wireless Sensor Networks
DU Ruiying;XU Mingdi;ZHANG Huanguo
..............page:1489-1492
Threshold Subliminal Channel Based on Designated Verifier Signature
SU Li;CUI Guohua;YANG Muxiang;CHEN Jing
..............page:1485-1488
Probability Simulation Optimization Approach Using Orthogonal Genetic Algorithm
WANG Yinling;XING Lining;YAN Shiliang
..............page:1481-1484
A Fault Detection Mechanism in Erasure-Code Byzantine Fault-Tolerance Quorum
LIU Gang;ZHOU Jingli;SUN Yufen;QIN Leihua
..............page:1453-1456
Design and Implementation of a Bootstrap Trust Chain
YU Fajiang;ZHANG Huanguo
..............page:1449-1452
Testing Cross-Talk Induced Delay Faults in Digital Circuit Based on Transient Current Analysis
WANG Youren;DENG Xiaoqian;CUI Jiang;YAO Rui;ZHANG Zhai
..............page:1445-1448
Mechanical Proofs about BW Multi-Party Contract Signing Protocol
ZHANG Ningrong;ZHANG Xingyuan;WANG Yuanyuan
..............page:1516-1520
Binary Sequences from a Pair of Elliptic Curves
CHEN Zhixiong;ZHANG Ning;XIAO Guozhen
..............page:1511-1515
Modeling Trusted Computing
CHEN Shuyi;WEN Yingyou;ZHAO Hong
..............page:1507-1510
Building Hot Snapshot Copy Based on Windows File System
WANG Lina;GUO Chi;WANG Dejun;ZHU Qin
..............page:1503-1506
An Improved Model of Attack Probability Prediction System
WANG Hui;LIU Shufen;ZHANG Xinjia
..............page:1498-1502
Practical Encrypted Key Agreement Using Passwords
WU Shuhua;ZHU Yuefei
..............page:1625-1628
Signcryption-Based Key Management for MANETs Applications in Mobile Commerce
LI Jingfeng;ZHU Yuefei;ZHANG Yajuan;PAN Heng
..............page:1621-1624
Efficient and Robust Two-Party RSA Key Generation
YANG Muxiang;HONG Fan;ZHENG Minghui;LI Jun
..............page:1617-1620
Secure Order-Specified Multisignature Scheme Based on DSA
YANG Muxiang;SU Li;LI Jun;HONG Fan
..............page:1613-1616
Homomorphism Key Agreement Based on RSA
XIANG Guangli;ZHU Ping;ZHANG Junhong;MA Jie
..............page:1609-1612
Identity Based Group Key Agreement in Multiple PKG Environment
WANG Liming;WU Chuankun
..............page:1605-1608
Trust Based Pervasive Computing
LI Shiqun;Shane Balfe;ZHOU Jianying;CHEN Kefei
..............page:1477-1480
Kernel Rootkits Implement and Detection
LI Xianghe;ZHANG Liancheng;LI Shuo
..............page:1473-1476
Merkle Tree Digital Signature and Trusted Computing Platform
WANG Xiaofei;HONG Fan;TANG Xueming;CUI Guohua
..............page:1467-1472
Time-Based Dynamic Trust Model Using Ant Colony Algorithm
TANG Zhuo;LU Zhengding;LI Kai
..............page:1462-1466
A New Kind of Subjective Trust Model
ZHANG Guangwei;KANG Jianchu;LUO Ziqiang;MENG Xiangyi;FANG Peici;LI Deyi
..............page:1457-1461
Protecting Terminals by Security Domain Mechanism Based on Trusted Computing
ZHOU Zheng;ZHANG Jun;LI Jian;LIU Yi
..............page:1437-1440
Architecture of Trusted PC
WU Shuhua;ZHU Yuefei
..............page:1433-1436
A Trusted Host's Authentication Access and Control Model Faced on User Action
ZHANG Miao;XU Guoai;HU Zhengming;YANG Yixian
..............page:1429-1432
A Separated Domain-Based Kernel Model for Trusted Computing
FANG Yanxiang;SHEN Changxiang;XU Jingdong;WU Gongyi
..............page:1424-1428
A Method to Defend File-Attacking
HE Hongjun;LUO Li;CAO Sihua;FENG Tao;PAN Li;ZOU Zhiji
..............page:1419-1423
Security Considerations Based on PKI/CA in Manufacturing Grid
YIN Yong;LI Yu
..............page:1414-1418
Development of Trusted Computing Research
ZHANG Huanguo;LUO Jie;JIN Gang;ZHU Zhiqiang;YU Fajiang;YAN Fei
..............page:1407-1413
Preface
..............page:插1