..............page:14-18,13
..............page:99-104,55
..............page:105-111
..............page:84-87,77
..............page:66-71,65
Cryptographic Hash Functions and Their Application
zhang dong 1; 2 li meng-dong2xiao peng 1; 2peng cheng-pei 1; 2(1.department of communication engineering; xidian university; xi an shaanxi 710071; china; 2.beijing electronic science and technology institute; beijing 100070; china)
..............page:36-42
Research of E-Schema-based Mapping from XML Schema to Relational Schema
fan jie1 shang zeng-guang2 xie ting-ting3(1.department of information security; beijing electronic science and technology institute; 100070; beijing; china; 2.department of information engineering; pla academy of armored forces engineering; 100072; beijing; china; 3.department of computer science; beijing electronic science and technology institute; 100070; beijing; china)
..............page:56-60
..............page:43-48,42
..............page:32-35,24
P2PSIP authenticated key agreement scheme based on SGC-PKE
zhang rui1 jiang hua1; 2 yang ya-tao2 1.college of communication engineering; xidian university; xi an; 710071; china 2.department of communication engineering; beijing electronic science and technology institute; beijing 100070; china
..............page:49-55