Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Wuhan University(Natural Science Edition)
1671-8836
2008 Issue 5
A Distributed Detection Scheme Based on Weighted CAT against DDoS
ZHOU Zaihong;XIE Dongqing;XIONG Wei;YANG Xiaohong
..............page:626-630
An Encryption Scheme with Collusion Attack Security Based on Certified Public-Key
KANG Li;TANG Xiaohu;FAN Jia
..............page:598-602
Anti-Authority Hijack Secure Electronic Transaction
MAO Jian;WEI Tao;CHEN Yu;ZOU Wei
..............page:593-597
One-Way Hash Function Based on Piecewise Logistic Chaotic Map
ZHANG Xuefeng;FAN Jiulun
..............page:588-592
ID-Based Authenticated Key Agreement Protocol in Dynamic Peer Groups
WANG Xiaofen;TAN Shichong;DONG Qingkuan;XIAO Guozhen
..............page:583-587
An ID-Based Wireless Authentication Protocol with Anonymity
ZHU Hui;LI Hui;WANG Yumin;LIU Shuanggen
..............page:579-582
Fair Signature of Knowledge
LI Li;LI Hongda;LI Bao
..............page:575-578
A Deniable Group Key Establishment Protocol in Standard Model
ZHANG Yazhe;XU Haixia;LI Bao
..............page:571-574
Node Matrix Representation of Braid Group
LIU Yanxiao;ZHANG Yuqing;HU Yupu
..............page:565-570
A Designated-Verifier Proxy Multi-Signature Scheme with Message Recovery
ZUO Weiping;WANG Caifen;YANG Xiaoya;LIU Yunfang
..............page:561-564
A Forward Secure and Backward Secure Digital Signature Scheme
LI Cheng;HE Mingxing
..............page:557-560
Security Analysis of Public Key Encryption Scheme Based on Attack Classification
LU Xianhui;LAI Xuejia;HE Dake;LI Guomin
..............page:543-546
Design of Algorithm for Selecting Secure ECC Based on Ant Colony
WANG Chao;ZHU Meili
..............page:540-542
Approximation Calculations on the Elliptic Curves over Unramified Extensions of 2-Adie Number Fields
YUE Zhihong;XU Maozhi;ZHOU Zhenghua;SONG Chenggen
..............page:535-539
Fast Point Multiplication Formulae on the Elliptic Curves Weierstrass Form
FENG Rongquan;WU Hongfeng;WANG Zilong
..............page:530-534
On the Memory Space of Shrinking Type Sequence Generators
GAO Juntao;HU Yupu;LI Xuelian
..............page:521-524
A Construct Method of Even Variables Boolean Functions with Optimum Algebraic Immunity
WANG Yongjuan;FAN Shuqin;HAN Wenbao;ZHANG Shiwu
..............page:517-520
A Dynamic Random Number Generator
LI Youming;TANG Ming;ZHANG Huanguo
..............page:513-516
Differential Fault Analysis on KeeLoq and SHACAL-1
LI Lin;LI Ruilin;XIE Duanqiang;LI Chao
..............page:507-512
A New Broadcast Encryption Scheme Based on a Family of Random Functions
LAI Xia;CHEN Liya;HE Mingxing
..............page:623-625
An Identification Scheme Based on Certificateless Public-Key Cryptosystem
LI Yanping;WANG Yumin
..............page:619-622
Unified Crypto Architecture Accelerating RSA/SHA for Security Processor
HAN Lin;HAN Jun;ZENG Xiaoyang;HUANG Wei
..............page:615-618
A Wireless Security Oriented Dual-Core SOC Platform
CAO Dan;HAN Jun;ZENG Xiaoyang
..............page:611-614
Multi-Authority Verifiable Attribute-Based Encryption
TANG Qiang;JI Dongyao
..............page:607-610
(k,n)Extended Visual Secret Sharing Scheme with Colored Cover Images
LIU Shuo;WANG Daoshun
..............page:603-606