Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Wuhan University(Natural Science Edition)
1671-8836
2010 Issue 2
Migration of TrouSerS to Windows Platform
HAO Yanjun;BAO Guoqi;LIU Yi;LING Jie
..............page:175-178
A Fine-Grained Dynamic Network Authorization Model Based on Trust Level in Trusted Connecting Network
ZOU Bingyu;ZHANG Huanguo;GUO Xi;HU Ying;Jamila-Sattar
..............page:147-150
Digital Signature Scheme Based on the Root Extraction Problem on Matrix Ring
JU Chunfei;WANG Baocang;CHEN Zhigang
..............page:203-206
Equivalent Keys in Multivariate Public Key Cryptosystem
YUAN Feng;HU Yupu;LI Shunbo
..............page:211-215
Terminal Security Model Based on Access Behavior
LI Yong;WANG Fei;NA Baoyu;GAI Xinmao
..............page:125-128
Trusted Scheduling of Dependent Tasks under Heterogeneous Grid Environment
ZHU Hai;WANG Yuping;WANG Xiaoli;FAN Lei
..............page:184-188
Analysis of Two Provably Secure Authenticated Key Exchange Protocols in the eCK Model
CHENG Qingfeng;MA Chuangui;HU Xuexian
..............page:219-222
Design of TPM Chip against Physical Attacks
CHEN Xi;DU Haitao;LI Guangsong;MA Jianfeng
..............page:143-146
Attacks Analysis of MAC Protocol in Wireless Self-Organizing Networks
ZHAO Zemao;HE Fei;XU Rui
..............page:179-183
Analyzing of Software Structural Features and Malware Detection
CHENG Binlin;FU Jianming;XU Jing
..............page:161-164
Test of Trusted Software Stack Based on Model Checking
HE Fan;ZHANG Huanguo;YAN Fei;YANG Yang;WANG Hong;MENG Xuejun
..............page:129-132
A Pipeline-Circuit Harden Method for Soft Error Tolerance
WU Zhenni;LIANG Huaguo;HUANG Zhengfeng;CHEN Xiumei;CAO Yuan
..............page:240-244
Software Behavior-Based Trusted Dynamic Measurement
ZHUANG Lu;CAI Mian;LI Chen
..............page:133-137
A Robust Model for Trusted Routing in VANETs
HE Junting;LIU Yanheng;WANG Jian
..............page:189-193
An Application Protection Model
HE Hongjun;HE Xiuxiong;LUO Li;FANG Zhihe;WANG Yang;DUAN Zhipeng
..............page:151-155
A Fast New Hashing Algorithm with Variable Length of Output
LIU Jiandong;JIANG Huina;YANG Kai
..............page:231-234
Resilient Boolean Functions with High Algebraic Immunity
ZHANG Fengrong;HU Yupu;TIAN Xuan;XIE Min;GAO Sheng
..............page:207-210
An Improved Pointer Safe Analysis Algorithm
GUO Xi;HE Yanxiang;ZHANG Huanguo;HU Ying;Jamila-Sattar
..............page:170-174
Design and Implementation of a Virtualization Platform Oriented Transparent Cryptographic System
GAO Hanjun;KOU Peng;WANG Lina;YU Rongwei;DONG Yongfeng
..............page:223-226
Construction of Distributed LDoS Attack Aiming at Vulnerability of RED
ZHAO Lei;ZHANG Xiaoying;WANG Lina;GUO Chi
..............page:199-202
Testing Sequences Generation Optimization for Trusted Platform Module Based on Chinese Postman Problem
XU Shiwei;ZHANG Huanguo;XIAO Jinyu;YAN Fei
..............page:138-142
A Software Safety Verification Method Based on Model Checking
WANG Xi;XU Zhongwei;MEI Meng
..............page:156-160
Steganalysis Methodology for QIM-JPEG2000 Based on Principal Component
LI Peng;CAI Xiaoxia;CHEN Hong;ZHAO Yongkuan
..............page:245-248
Linear Orthomorphisms on GF(2n)m
TONG Yan;ZHANG Huanguo;HAN Haiqing
..............page:235-239
Cryptanalysis for Combination Stream Cipher Based on Evolutionary Computation
CHEN Lianjun;ZHAO Yun;TANG Ming;ZHANG Huanguo
..............page:227-230
A UML2.0-Based Software Safety Testing Method
ZHANG Chen;DUAN Zhenhua
..............page:165-169