Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Wuhan University Journal of Natural Sciences
1007-1202
2011 Issue 5
an ideal lattice based ibe scheme in the standard model
YANG Xiaoyuan;WU Liqiang;ZHANG Minging;WEI Ping;WEI Lixian
..............page:439-446
research of session initial protocol security mechanism on public key technique
HU Jian;LI Yuxiang;FENG Jiuchao
..............page:419-422
a broadcast signcryption protocol for ad hoc networks
WANG Xiaoming;YAO Guoqing;LIAO Zhiwei
..............page:423-429
construction of k-ary pseudorandom elliptic curve sequences
WU Chenhuang;WENG Xin;CHEN Zhixiong
..............page:452-456
a complete set of addition laws for twisted jacobi intersection curves
WU Hongfeng;FENG Rongquan
..............page:435-438
on the structure of cyclic codes over fq+ufq+vfq+uvfq
XU Xiaofang;LIU Xiusheng
..............page:457-460
one-time rational secret sharing scheme based on bayesian game
TIAN Youliang;MA Jianfeng;PENG Changgen;CHEN Xi;JI Wenjiang
..............page:430-434
a novel intrusion detection method based on improved svm by combining pca and pso
WANG Hui;ZHANG Guiling;E Mingjie;SUN Na
..............page:409-413
improved verifiability scheme for data storage in cloud computing
YANG Xiaoyuan;ZHU Shuaishuai;PAN Xiaozhong
..............page:399-404
a trusted environment construction method for security-sensitive software
LI Jing;ZHANG Huanguo;ZHAO Bo;FANG Lingling
..............page:383-390
high-order bit independence criterion test for the s-boxes
GAO Sheng;MA Wenping;ZHU Jiwei
..............page:447-451
a mechanism based on reputation in p2p networks to counter malicious packet dropping
PENG Hao;LU Songnian;LI Jianhua;ZHANG Aixin;ZHAO Dandan
..............page:405-408
using new fusion operations to improve trust expressiveness of subjective logic
ZHOU Hongwei;SHI Wenchang;LIANG Zhaohui;LIANG Bin
..............page:376-382