Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Wuhan University Journal of Natural Sciences
1007-1202
2014 Issue 5
Temporal Dynamics in Social Trust Prediction
CAI Guoyong;LV Rui;TANG Jiliang;LIU Huan;Guangxi Key Laboratory of Trusted Software;Guilin University of Electronic Technology;Department of Computer Science and Engineering;Arizona State University;
..............page:369-378
A Trusted Mobile Payment Environment Based on Trusted Computing and Virtualization Technology
WANG Juan;LIN Wutao;LI Haoyu;DU Bianxia;MENG Ke;WANG Jiang;School of Computer;Wuhan University;Key Laboratory of Aerospace Information Security and Trusted Computing;Ministry of Education;
..............page:379-384
Semantic Description and Verification of Security Policy Based on Ontology
TANG Chenghua;WANG Lina;TANG Shensheng;QIANG Baohua;TIAN Jilong;Guangxi Experiment Center of Information Science;Guilin University of Electronic Technology;Department of Engineering Technology;Missouri Western State University;Guangxi Key Laboratory of Trusted Software;Guilin University of Electronic Technology;
..............page:385-392
cMonitor: VMI-Based Fine-Grained Monitoring Mechanism in Cloud
ZHANG Hao;ZHAO Lei;XU Lai;WANG Lina;School of Computer/The Key Laboratory of Aerospace Information and Trusted Computing of Ministry of Education;Wuhan University;The State Key Laboratory for Novel Software Technology;Nanjing University;
..............page:393-397
A Novel Risk Assessment Model for Privacy Security in Internet of Things
WU Tianshui;ZHAO Gang;School of Information Management;Beijing Information Science and Technology University;
..............page:398-404
Software Defect Prediction Using Fuzzy Integral Fusion Based on GA-FM
LI Kewen;CHEN Chenxi;LIU Wenying;Fang Xianghua;LU Qinghua;College of Computer and Communication Engineering;China University of Petroleum;
..............page:405-408
Network Security Situation Evaluation Based on Modified D-S Evidence Theory
WANG Chundong;ZHANG YuKey;Laboratory of Computer Vision and System;Ministry of Education/Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology;Tianjin University of Technology;
..............page:409-416
Deepflow: Hiding Anonymous Communication Traffic in P2P Streaming Networks
LV Jianming;ZHU Chaoyun;TANG Shaohua;YANG Can;School of Computer Science and Engineering;South China University of Technology;
..............page:417-425
Multi-Party Identity-Based Symmetric Privacy-Preserving Matching with Cloud Storage
QIU Shuo;LIU Jiqiang;SHI Yanfeng;HAN Zhen;School of Computer and Information Technology;Beijing Jiaotong University;
..............page:426-432
New Multivariate-Based Certificateless Hybrid Signcryption Scheme for Multi-Recipient
HAN Yiliang;YUE Zelun;FANG Dingyi;YANG Xiaoyuan;Department of Electronic Technology;Engineering University of Chinese Armed Police Force;College of Information Science and Technology;Northwest University;
..............page:433-440
Construction Vectors for Visual Cryptographic Schemes
FEI Ruchun;School of Electrical and Information Engineering;Liaoning Institute of Science and Technology;
..............page:441-448
Key Management for Outsourced Data Security
PEI Bei;CHEN Changsong;WAN Changsheng;The Third Research Institute of Ministry of Public Security;School of Information Science and Engineering;Southeast University;
..............page:449-454
An Efficient Identity-Based Key Agreement Protocol in a Multiple PKG Environment
ZHOU Huan;WANG Xiaofeng;SU Jinshu;School of Computer;National University of Defense Technology;National Laboratory for Parallel and Distributed Processing;National University of Defense Technology;
..............page:455-460