Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Wuhan University Journal of Natural Sciences
1007-1202
2013 Issue 5
Reversible Audio Watermarking Algorithm Using Non-Causal Prediction
HUO Yongjin;XIANG Shijun;LIU Shangyi;LUO Xinrong;BAI Zhongliang School of Information Science and Technology;Jinan University;Guangzhou 510632;Guangdong;China
..............page:455-460
An Adaptive Push-Styled Command and Control Mechanism in Mobile Botnets
CHEN Wei;GONG Peihua;YU Le;YANG Geng College of Computer;Nanjing University of Posts and Telecommunications;Nanjing 210023;Jiangsu;China
..............page:427-434
A Novel Fuzzy Keyword Retrieval Scheme over Encrypted Cloud Data
TIAN Ke;ZHANG Weiming;LI Ke;WU Junming;YU Nenghai School of Information Science and Technology;University of Science and Technology of China;Hefei 230027;Anhui;China
..............page:393-401
Application of Improved PSO-LSSVM on Network Threat Detection
QI Fumin;XIE Xiaoyao;JING Fengxuan Key Laboratory of Information and Computing Science Guizhou Province;Guizhou Normal University;Guiyang 550001;Guizhou;China
..............page:418-426
Formulations of Some Bit Switching Functions in DES
YOU Lin;YANG Yilin;WEN Wanli College of Communication Engineering;Hangzhou Dianzi University;Hangzhou 310018;Zhejiang;China
..............page:402-406
G Bytes Data Hiding Method Based on Cluster Chain Structure
NIU Xiaopeng 1;2;LI Qingbao 1;2;WANG Wei 1;2;WANG Yulong 1;2 1. State Key Laboratory of Mathematical Engineering and Advanced Computing;Zhengzhou 450002;Henan;China;2. PLA Information Engineering University;Zhengzhou 450001;Henan;China
..............page:443-448
Homomorphic MAC-Based Scheme against Pollution Attacks in Network Coding
ZHANG Yujie 1;CAI Ying 1;2;LI Zhuo 1;2;FAN Yanfang 1;2 1. School of Computer;Beijing Information Science and Technology University;Beijing 100101;China;2. Beijing Key Laboratory of Internet Culture and Digital Dissemination Research;Beijing 100101;China
..............page:435-442
A Privacy Protection Method for Continuous Query Based on Location Services
HU Wenling;WANG Yongli;ZHANG Gongxuan Department of Computer Science and Engineering;Nanjing University of Science and Technology;Nanjing 210094;Jiangsu;China
..............page:449-454
An Anonymous Data Collection Framework for Digital Community
LI Hongtao;MA Jianfeng;FU Shuai School of Computer Science and Technology;Xidian University;Xi’an 710071;Shaanxi;China
..............page:385-392
Information Transfer Model of Virtual Machine Based on Storage Covert Channel
WANG Xiaorui 1;WANG Qingxian 2;GUO Yudong 1;LU Jianping 3 1. Fourth Department;PLA Information Engineering University;Zhengzhou 450002;Henan;China;2. State Key Laboratory of Mathematical Engineering and Advanced Computing;Zhengzhou 450002;Henan;China;3. Department of Communication Command;Chongqing Communication Institute;Chongqing 400035;China
..............page:377-384
A Novel Secret Sharing Scheme Based on Minimal Linear Codes
LI Zhihui;SUN Jianhong;LI Jing College of Mathematics and Information Science;Shaanxi Normal University;Xi’an 710062;Shaanxi;China
..............page:407-412
A Quantum Error-Correction Circuit Based on Cyclic Code
Lü Hongjun;ZHANG Zhike;XIE Guangjun School of Electronic Science and Applied Physics;Hefei University of Technology;Hefei 230009;Anhui;China
..............page:413-417
An Unknown Trojan Detection Method Based on Software Network Behavior
LIANG Yu 1;PENG Guojun 1;2;ZHANG Huanguo 1;WANG Ying 1 1. School of Computer/Key Laboratory of Aerospace Information Security and Trusted Computing of Ministry of Education;Wuhan University;Wuhan 430072;Hubei;China;2. Law School;Renmin University of China;Beijing 100872;China
..............page:369-376