Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Wuhan University(Natural Science Edition)
1671-8836
2016 Issue 2
Rapid Restoration of Migrated Trusted Chain between Physical Machines
JIN Xin;CHEN Xingshu;Cybersecurity Research Institute;Sichuan University;
..............page:103-109
A Mobile Payment Authentication Protocol Based on Mobile Token
LIU Mingda;SHI Yijuan;ZHAO Bo;LI Yifan;Jiangnan Institute of Computing Technology;School of Computer;Wuhan University;
..............page:110-116
A Ring-Signature Based Remote Attestation Scheme for the Property of Configurations
ZHANG Xin;YANG Xiaoyuan;ZHU Shuaishuai;Key Laboratory of Network and Information Security of the Chinese Armed Police Force;Department of Electronic Technology;Engineering College of the Chinese Armed Police Force;
..............page:117-121
A PLSA Based Forensic Method of Instant Messenger
MA Qingjie;LI Binglong;The Forth College;Information Engineering University;State Key Laboratory of Digital Engineering and Advanced Computing;Information Engineering University;
..............page:122-126
A Privacy Protection Method Based on Relationship Encrypt
MENG Xiang;KANG Haiyan;Computer School;Beijing Information Science and Technology University;School of Information Management;Beijing Information Science and Technology University;
..............page:127-134
An Improved Dynamic Group Signature Scheme Based on Lattice
LI Zichen;ZHANG Yulong;WANG Yuxiao;YANG Yatao;School of Information Engineering;Beijing Institute of Graphic Communication;School of Telecommunications Engineering;Xidian University;Department of Information Security;Beijing Electronic Science and Technology Institute;
..............page:135-140
Identity-Based(Leveled) Fully Homomorphic Signature Scheme
LI Mingxiang;AN Ni;Hebei Provincial Key Laboratory of Technology and Finance;Hebei Finance University;International Education College;Hebei Finance University;
..............page:141-147
A Construction of Revocable Attribute-Based Encryption from Multi-Linear Maps
JIANG Di;HAN Yiliang;YANG Xiaoyuan;Key Laboratory of Network and Information Security of the Chinese Armed Police Force;Department of Electronic Technology;Engineering College of the Chinese Armed Police Force;
..............page:148-154
A New Hierarchical Identity-Based Encryption Scheme Based on Lattice
YANG Haibin;Department of Electronic Technology;Engineering College of the Chinese Armed Police Force;
..............page:155-160
Efficient Broadcasting Encryption Scheme Based on Multilinear Map
ZHU Shuaishuai;YANG Xiaoyuan;HAN Yiliang;Key Laboratory of Network and Information Security of the Chinese Armed Police Force;Department of Electronic Technology;Engineering College of the Chinese Armed Police Force;
..............page:161-164
A Signcryption Scheme from Multilinear Maps
CHEN Fei;HAN Yiliang;YANG Xiaoyuan;WANG Jingjing;Key Laboratory of Network and Information Security of the Chinese Armed Police Force;Department of Electronic Technology;Engineering College of the Chinese Armed Police Force;
..............page:165-170
Storage Encryption Technology Based on KLEIN Cipher
MAI Taotao;PAN Xiaozhong;SU Yang;Department of Electronic Technology;Engineering College of the Chinese Armed Police Force;Key Laboratory of Network and Information Security of the Chinese Armed Police Force;
..............page:171-176
XSS Attack Detection Model Based on Maximum Entropy Model
ZHANG Sicong;XIE Xiaoyao;JING Fengxuan;XU Yang;Key Laboratory of Information and Computing Science of Guizhou Province;Guizhou Normal University;
..............page:177-182
Algebraic Analysis of SHA-3 Algorithm Security
ZUO Zifei;ZHAO Bo;School of Computer;Wuhan University;
..............page:183-186
Analysis on the Consistent Degree of Triple Addition Modulo 2~n with XOR
WEI Yuechuan;PAN Xiaozhong;RONG Yisheng;MA Qinglu;Department of Electronic Technology;Engineering College of the Chinese Armed Police Force;College of Equipment Engineering;Engineering College of the Chinese Armed Police Force;Suihua Division of Heilongjiang Armed Police Force;
..............page:187-190
Hyperstar Access Structures with Three Hyperedges and Their Characteristics
XIE Jiali;LI Zhihui;XUE Lixia;College of Mathematics and Information Science;Shaanxi Normal University;
..............page:191-196