Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Wuhan University Journal of Natural Sciences
1007-1202
2010 Issue 3
a message digest disposing algorithm based on rc4
LIU Yabin;CHEN Jing;DU Ruiying;ZHANG Huanguo
..............page:251-254
a security patch for a three-party key exchange protocol
ZHAO Jianjie;GU Dawu
..............page:242-246
new constructions of identity-based threshold decryption
ZHANG Leyou;HU Yupu;TIAN Xu\'an;YANG Yang
..............page:222-226
a usable selection range standard based on test suite reduction algorithms
MA Yanjun;ZHAO Zhigang;LIANG Yuchen;YUN Maojin
..............page:261-266
generation algorithm of a sort of p-permutations
HAN Haiqing;ZHANG Huanguo;LI Qin;TONG Yan
..............page:237-241
efficient broadcast encryption scheme based on number theory research unit
ZHANG Weidong;L(U) Xixiang;LI Hui
..............page:247-250
trust asymmetry in grid authentication
WANG Haiyan;WANG Ruchuan
..............page:201-204
remote attestation-based access control on trusted computing platform
LIU Xian\'gang;ZHANG Xing;FU Yingfang;SHEN Changxiang
..............page:190-194
an efficient two-party key exchange protocol with strong security
DENG Shaofeng;LI Yifa;DENG Yiqun
..............page:267-271
a biometric-based user authentication for wireless sensor networks
YUAN Jianjun;JIANG Changjun;JIANG Zuowen
..............page:272-276
construction of high dependable distributed access control architecture based on quorum system
XIONG Tinggang;LU Zhengding;ZHANG Jiahong;MA Zhong
..............page:210-216
massive data covert transmission scheme based on shamir threshold
ZHANG Tao;WANG Yadi;RONG Xing
..............page:227-231
a trustworthiness-based distribution model for data leakage prevention
YIN Fan;WANG Yu;WANG Lina;YU Rongwei
..............page:205-209
vcerberus: a drtm system based on virtualization technology
CHEN Wenzhi;ZHANG Zhipeng;YANG Jianhua;HE Qinming
..............page:185-189