Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Beijing University of Technology
0254-0037
2010 Issue 5
Identity-based Signature Scheme with Partial Message Recovery in the Standard Model
LIU Zhen-hua1;ZHANG Xiang-song1;TIAN Xu-an2;HU Yu-pu3
..............page:654-658
Trusted Network Connect Protocol for Wireless Environment
MA Zhuo;MA Jian-feng;YANG Chao;YANG Li
..............page:577-581
Differential Algebraic Attack of Serpent
HU Zhi-hua1;2
..............page:651-653
A Mixed Cross-authentication Scheme for Trusted Platform Compatibility
MA Chao-bin1;2;HUANG Ning-yu1;ZHANG Xing1
..............page:582-585
ID-based Chameleon Hash Scheme and Signature Without Key Escrow
ZHAN Yang1;TIAN Hai-bo2;CHEN Xiao-feng1;WANG Yu-min1
..............page:685-688
Multivariable Algebra Theory and Its Application in Cryptography
WANG Hou-zhen1;2;ZHANG Huan-guo1;GUAN Hai-ming3;WU Qian-hong1
..............page:627-634
Trustworthy Evaluation Technology of Software Based on Roles
YUAN Lin1;2;WANG Huai-min1;YIN Gang1;SHI Dian-xi1;MI Hai-bo1
..............page:611-615
A Short Group Signature DAA Scheme Based on l-Modified One More Strong Diffie-Hellman Problem Assumption
ZHOU Yan-zhou1;2;ZHANG Huan-guo1;LI Li-xin2;SONG Yang3
..............page:601-604
Dynamic Arguments Dependence Analysis Technique for Test-suite Deduction
CHEN Ya-sha1;YE Qing1;LIAO Jian-hua2
..............page:616-620
The Fast Implementation of MD6 on GPU
LI Li-xin1;YE Jian1;YU Yang1
..............page:640-645,650
A Formal Model of Secure Electronic Transaction Based on Term Rewriting
CHEN Chen;LIU Nan;CHEN Wei-hong;ZHU Yue-fei
..............page:664-668
The Nonlinearity Lower Bounds on the Second Order of Cubic Monomial Boolean Functions
LI Xue-lian1;HU Yu-pu2;GAO Jun-tao2;FANG Yi-qi3
..............page:635-639
One Trusted Fix Method of Digital Data Forensics
SUN Guo-zi1;2;GENG Wei-ming2;CHEN Dan-wei1;2;LIN Qing-xiu2
..............page:621-626
Process-Consistent Access Control System
HAN Pei-sheng1;2;3;ZHAO Yong1;LI Yu1
..............page:698-702
The Mandatory Access Control Model for Document Flow
FAN Yan-fang1;HAN Zhen1;ZHAO Yong2;GENG Xiu-hua3
..............page:694-697
A Dynamic Self-reflection Model Based on Fluid Flow Approximation of PEPA
L Hong-wu;WANG Hui-qiang;MA Chun-guang;LIN Xiang-jun;ZHAO Qian
..............page:710-715
Query Verification Technique Preserving Privacy for Outsourced Databases
WANG Xiao-ming;YUAN Duo-bao
..............page:703-709
Analysis of the Infeasible Path Based on Key Branch
PAN Li-li1;ZOU Bei-ji2;WANG Tian-e3;CHEN Hao2
..............page:716-720
Security Analysis and Improvement of Digital Multi-signature on the Generalized Conic Curve
DING Li1;2;ZHOU Yuan1;2;QIAN Hai-feng2
..............page:646-650
Hierarchal Security Architecture of Virtualized Trusted Platform
SHEN Qing-ni1;2;3;DU Hong1;4;QING Si-han1;5
..............page:605-610
An Algorithm for Finding the Most Trsted Path Between Entities Based on Selected Mechanism
ZHOU Guo-qiang1;2;3;ZENG Qing-kai1;2
..............page:679-684
Channel-Based TCB Extension Model
LIAO Jian-hua1;3;ZHAO Yong2;SHEN Chang-xiang2
..............page:592-596
The Connection Anonymous Scheme of Trusted Network
ZHUANG Jun-xi;GONG Bei
..............page:597-600
The Trust Measurement Scheme in Trusted Computing
ZHANG Li-qiang1;2;ZHANG Huan-guo2;3;ZHANG Fan4
..............page:586-591
Optimal Steganography Based on Fisher Information
SUN Yi-feng1;2;LIU Fen-lin1;WANG Fei3;ZENG Ying1
..............page:689-693