Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Beijing Electronics
1006-8503
2012 Issue 2
Blind Signature Scheme Based on McEliece Public Key Cryptosystem
ZHAO Cheng-cheng1;2 LI Zi-chen1;2 Liu Nian2 YAN Xiao-Heng3 1.Communication Engineering Institute;Xidian University;Xi’an Shanxi 710071;China 2.Department of Information Security;Beijing Electronic Science and Technology Institute;Beijing 100070;China
..............page:32-38
A Method of Access Control on Electronic Document Based on Multilevel Security
Li Man 1.2 Sui Zhiyuan 1.2 Fang Yong1 1.Xidian University;Xi’an Shanxi 710071;China 2.Beijing Electronic Science and Technology Institute;Beijing 100070;China
..............page:9-14
A New SHA-1 System to Resist Modular Differential Attack
GAO Xiao-dong1;2 LIUNian2 LI Zi-chen2 1.Communication Engineering Institute;Xidian University;Xi’an Shanxi 710071;China 2.Beijing Electronic Science and Technology Institute;Beijing 100070;China
..............page:43-49
An Analysis of Peer Behavior on P2P-Based Live Streaming Systems
Chao Xue1;2 Yaiian Zhou1;2 Yuan Ping1;2 Miao Zhang 1.Information Security Center;Beijing University of Posts and Telecommunications; Beijing 100876;China 2.National EngineeringLaboratory for Disaster Backup and Recovery;Beijing University of Posts and Telecommunications;Beijing 100876;China
..............page:39-42
Research and Analysis of JFK Protocol
Feng Yan Li Yang Xu Zijie Huang Da Electronic and Science Technology Institute;Bejing 100070
..............page:15-20
Research on the relationship between Information security management system and classified protection
Yadong Wang1 Liping Lv2 Yongli Tang3 Lihua Wang3 1.China Pingdingshan SHENMA Group Sunshine Properties Limited; Pingdingshan;Henan 467 099 2.Information Engineering of Jiaozuo University;Jiaozuo;Henan 454000 3.Science and Technology of Henan Polytechnic University computer machine;Jiaozuo; Henan 454003
..............page:26-31
The Research of Lattice Reduction Attacks on Public-key Cryptosystem
LIU Li-qiang1;2 LIU Nian2 LI Zi-chen2 1.Communication Engineering Institute;Xidian University;Xi’an Shanxi 710071;China 2.Beijing Electronic Science and Technology Institute;Beijing 100070;China
..............page:67-72
Design And Management of Classified Electronic Documents Security Level Identification
XU Sheng wei1 LI Man1;2 FANG Yong2 1.Xidian University;Xi’an Shaanxi 710071;P.R.China; 2.Beijing Electronic Science and Technology Institute;Beijing 100070;P.R.China;
..............page:81-86
Decoding Scheme of TFCI in WCDMA Based on IHT
YE Zhuo-ying ZHU Lin FENG Hai Embedded Linux Application Center;Xiamen City University;Xiamen Fujian 361008;China
..............page:87-91
The Homomorphism Analysis of Public Key Cryptosystem
Yan shi-dou1;2 Liu nian2 Li zi-chen2 1.Communication Engineering Institute;Xidian University;Xi’an;Shanxi 710071;China 2.Beijing Electronic Science and Technology Institute;Beijing 100070;China
..............page:55-59
An Analysis of Anti-Differential Cryptanalysis Attack for Chaotic Block Cipher Based on Feistel Structure
Hao Zheng1;2 Geng Zhao2 Erfan Zhao1;2 Xiaoli Zheng3 1 School of Communication Engineering;Xidian University;Xi’an Shanxi 710071;China 2 Department of Computer Science and Technology;Beijing Electronic Science and Technology Institute;Beijing 100070;China; 3 PLA Institute of Physical Education;Guangzhou Guangdong 510500;China
..............page:60-66
Research on Multi-signature for Electronic Documents
Zhang Ya-chun Liu Xin-hai Ju lei
..............page:50-54
An Analysis of Peer Behavior on P2P-Based Live Streaming Systems
Chao Xue1;2 Yaiian Zhou1;2 Yuan Ping1;2 Miao Zhang 1.Information Security Center;Beijing University of Posts and Telecommunications;Beijing 100876;China 2.National Engineering Laboratory for Disaster Backup and Recovery;Beijing University of Posts and Telecommunications;Beijing 100876;China
..............page:73-80
Research on Choice of Authoring Standards Based on Equipment IETM
Hu Liang-yong Zhou Li-ye No.66222 of the PLA;Beijing 102202;China
..............page:21-25
The Research of Random Jamming on Wireless Network
ZHANG Jun-yi YANG Yi-xian Information Security Center;State Key Laboratory of Networking and Switching Technology;Beijing University of Posts and Telecommunications;Beijing 100876;China
..............page:1-8