Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of the Graduate School of the Chinese Academy of Sciences
1002-1175
2001 Issue 2
zong mu ci
..............page:ī-īī
zheng gao jian ze
..............page:193-194
On E2 and Camellia Block Cipher
wu wen ling
..............page:181-185
Square Attack on Reduced Camellia Cipher
he ye ping ; wu wen ling ; qing si han
..............page:177-180
Application of CA on Internet Banking
zhang kai ; jing ji wu
..............page:173-176
Managed Security Monitoring System
lian yi feng ; dai ying xia ; wang hang
..............page:167-172
The Predictoin of the Absolute Configuration of Aliphatic Compound
yin yu ying ; liu chun yun
..............page:160-166
Extracting Man-made Building from Sparse Laser Sample Points
you hong jian ; li shu kai
..............page:154-159
Password Attack and Password Protection
xiao qing ; li xiao jian ; jiang jian chun
..............page:149-153
Time-stamp Protocol with 10-digital
chen kai qu
..............page:144-148
A SECRET SHARING SCHEME BASED ON LINEAR TRANSFORMATION
wang ming sheng ; wang gui lin ; feng deng guo
..............page:134-139
Information Leakage of Feedback Network
sun lin hong ; ye ding feng ; lv shu wang
..............page:130-133
A Simple and Secure Threshold RSA Signature Scheme
wang gui lin ; wang ming sheng ; qing si han ; feng deng guo
..............page:124-129
An Intrusion Tolerant Services on Internet
jing ji wu ; zhou tian yang
..............page:119-123
A NEW THRESHOLD SCHEME VIA PLUCKER COORDINATES
wang ming sheng ; feng deng guo ; wang gui lin
..............page:114-118
Several Methods of Constructing Partially-bent Functions
zhao ya qun ; li shi qu ; zhang yan xiao
..............page:105-109