Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Wuhan University Journal of Natural Sciences
1007-1202
2008 Issue 5
an improved simple power attack against camellia s key schedule
LIU Shuanggen1;2;NI Haiying2;HU Yupu1;LIAO Yunyan2 1. Key Laboratory of Computer Network and Information Security of Ministry of Education;Xidian University;Xi’an 710071;Shaanxi;China; 2. College of Computer Information Engineering;Jiangxi Normal University;Nanchang 330022;Jiangxi;China
..............page:591-594
A Binary Images Watermarking Algorithm Based on Adaptable Matrix
ZHANG Fan;ZHANG Junliang Institute of Advanced Control and Intelligent Information Processing;Henan University;Kaifeng 475001;Henan;China
..............page:595-599
A Mobile Accessible Closed Multi-Part Group Communication Scheme in IPv6 Network
CHEN Yue;KOU Hongzhao;GUO Yuanbo College of Electronic Technology;Information Engineering University;Zhengzhou 450004;Henan;China
..............page:600-604
BBACIMA:A Trustworthy Integrity Measurement Architecture through Behavior-Based TPM Access Control
YU Aimin;FENG Dengguo Institute of Software;Chinese Academy of Sciences/ State Key Laboratory of Information Security;Beijing 100190;China
..............page:513-518
Formal Analysis on an Extended Security Model for Database Systems
ZHU Hong;ZHU Yi;LI Chenyang;SHI Jie;FU Ge;WANG Yuanzhen Database and Multimedia Technology Research Institute;Huazhong University of Science and Technology;Wuhan 430074;Hubei;China
..............page:519-522
A Peer-to-Peer Resource Sharing Scheme Using Trusted Computing Technology
CHEN Lu1;ZHANG Huanguo1;2;ZHANG Liqiang1;LI Song1;CAI Liang3 1. School of Computer;Wuhan University/Key Laboratory of Aerospace Information Security and Trusted Computing of Ministry of Education;Wuhan 430072;Hubei;China; 2. State Key Laboratory of Software Engineering;Wuhan University;Wuhan 430072;Hubei;China; 3. Department of Information Security;Information Engineering University;Zhengzhou 450004;Henan;China
..............page:523-527
A Novel Trust Enhanced Grid Authentication Mechanism
WANG Haiyan;WANG Ruchuan College of Computer Science;Nanjing University of Posts and Telecommunications;Nanjing 210003;Jiangsu;China
..............page:528-532
Survivability of Components Assembly in Architecture
GUO Wei ;ZHENG Yanyan;XU Renzuo School of Computer;Wuhan University;Wuhan 430072;Wuhan;China
..............page:533-538
TPM Context Manager and Dynamic Configuration Management for Trusted Virtualization Platform
QIN Yu1;FENG Dengguo1;LIU Chunyong2 1. Institute of Software;Chinese Academy of Science/State Key Laboratory of Information Security;Beijing 100080;China; 2. College of Computer Science and Technology;Chongqing University;Chongqing 400030;China
..............page:539-546
Trustworthy Metrics Models for Internetware
ZHANG Yang;FANG Bin;XU Chuanyun College of Computer Science;Chongqing University;Chongqing 400044;China
..............page:547-552
Privacy-Preserving Trust Negotiation with Hidden Credentials and Hidden Policies in a Multi-Party Environment
GUO Shanqing;WEI Juan;ZHANG Chunhua;XU Qiuliang School of Computer Science and Technology;Shandong University;Jinan 250101;Shandong;China
..............page:553-556
A New Chaotic Function and Its Cryptographic Usage
ZHOU Xueguang1;ZHANG Huanguo2 1. College of Electronic Engineering;Naval University of Engineering;Wuhan 430033;Hubei;China; 2. School of Computer;Wuhan University;Wuhan 430072;Hubei;China
..............page:557-561
Breaking and Repairing the Certificateless Key Agreement Protocol from ASIAN 2006
XIA Liang1;WANG Shengbao1;2;SHEN Jiajun1;XU Guoming1 1. Computing Center;Artillery Academy of PLA;Hefei 230031;Anhui;China; 2. Department of Computer Science and Engineering;Shanghai Jiao Tong University;Shanghai 200030;China
..............page:562-566
An Efficient Certificateless Ring Signature Scheme
ZHU Lijun;ZHANG Futai College of Mathematics and Computer Science;Nanjing Normal University;Nanjing 210097;Jiangsu;China
..............page:567-571
Analysis and Improvement of Cross-Realm Client-to-Client Password Authenticated Key Exchange Protocols
DING Xiaofei;MA Chuangui;CHENG Qingfeng Information Engineering College;Zhengzhou Information Science and Technology Institute;Zhengzhou 450002;Henan;China
..............page:572-576
On k-Error Linear Complexity of Some Explicit Nonlinear Pseudorandom Sequences
CHEN Zhixiong1;2;WU Chenhuang1 1. Key Laboratory of Applied Mathematics;Putian University;Putian 351100;Fujian;China; 2. Key Laboratory of Network Security and Cryptology;Fujian Normal University;Fuzhou 350007;Fujian;China
..............page:577-581
A New Provably-Secure Key Agreement Protocol for Roaming in Mobile Networks
LI Guangsong;WANG Penghai Department of Information Research;Information Engineering University;Zhengzhou 450002;Henan China
..............page:605-608
A Protocol for Fair Electronic Purchase Based on Concurrent Signatures
LI Xiangdong1;2;WANG Qingxian1;CHEN Li1 1. Information Engineering College;Information Engineering University;Zhengzhou 450002;Henan;China; 2. Sias International College;Zhengzhou University;Xinzheng 451150;Henan;China
..............page:609-614
Static Extracting Method of Software Intended Behavior Based on API Functions Invoking
PENG Guojun;PAN Xuanchen;FU Jianming;ZHANG Huanguo School of Computer;Wuhan University;Wuhan 430072;Hubei;China
..............page:615-620
Attribute-Based Re-Encryption Scheme in the Standard Model
GUO Shanqing1;ZENG Yingpei2;WEI Juan1;XU Qiuliang1 1. School of Computer Science and Technology;Shandong University;Jinan 250101;Shandong;China; 2. State Key Laboratory of Novel Software Technology;Nanjing University;Nanjing 210093;Jiangsu;China
..............page:621-625
An Approach for Handling Conflicts in Authorization
ZHANG Mingsheng1;ZHANG Mingyi2 1. School of Economics and Management;Guizhou Nationalities University;Guiyang 550025;Guizhou;China; 2. Guizhou Academy of Sciences;Guiyang 550001;Guizhou;China
..............page:626-630
Preventing Dropping Packets Attack in Sensor Networks:A Game Theory Approach
YANG Libin;MU Dejun;CAI Xiaoyan College of Automation;Northwestern Polytechnical University;Xi’an 710072;Shaanxi;China
..............page:631-635
Secure Localization Algorithm Based on Node Cooperative for Sensor Networks
MA Jianguo;PENG Bao School of Information Engineering;Southwest University of Science and Technology;Mianyang 621002;Sichuan;China
..............page:636-640
Forward-Secure Digital Signature Scheme with Tamper Evidence
JIANG Han;XU Qiuliang;LIN Fengbo School of Computer Science and Technology;Shandong University;Jinan 250061;Shandong;China
..............page:582-586
Chrestenson Spectrum and Auto-Correlation Function of Inverse Permutations of Quick Trickle Permutations
WANG Jue1;LI Zhengchao2;ZHAO Yaqun1;3 1. Information Engineering College;Information Engineering University;Zhengzhou 450002;Henan;China; 2. Institute of Luoyang Foreign Language;Luoyang 471000;Henan;China; 3. State Key Laboratory of Information Security;Chinese Academy of Science;Beijing 100039;China
..............page:587-590