Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Beijing Electronics Information Time Guiding
1006-8503
2013 Issue 4
A Chaos Map-based Scheme for Deniable Authentication
Zhao Geng;Sun Jinhui;Department of Computer Science and Technology;Beijing Electronic Science and Technology Institute;
..............page:1-4
Analysis of Nonlinear Transformation x of Keccak
Zheng Xiulin;Zhang Cong;Guo Xing;Shi Rui;Xi’an Electronic and Science University;Beijing Electronic Science and Technology Institute;
..............page:5-8
FPGA Realization of Digital Signature based on SHA-3
Yang Yatao;Yang Junming;Beijing Electronic Science and Technology Institute;
..............page:9-14
Research on elliptic curve cryptographic algorithms based on Chaotic System
Liu Minglai;Zhao Geng;Wei Guangzheng;Wang Kun;Beijing Electronic Science and Technology Institute;College of Communication Engineering;Xidian University;
..............page:15-19
The Implementation of SM4 Algorithm on Multi-core System Based on FSL
Tao Lin;Li Ge;Zhang Lei;Beijing Electronic Science and Technology Institute;Xidian University;
..............page:20-24
A New One-time Group Signature Based on Hash Function
Liu Hui;Li Xiaodong;Bai Jian;Communication Engineering Institute;Xidian University;Beijing Electronic Science and Technology Institute;
..............page:25-29
Research on the Development of the Lattice-Reduction
Bai Jian;Liu Hui;Yang Yatao;Li Zichen;Communication Engineering Institute;Xidian University;Beijing Electronic Science and Technology Institute;
..............page:30-34
Scheme Design for the Integrated Service of the Internet of Things and Geographic Information
Ma Xuping;Mo Xinyu;Department of Computer science;Beijing Information Science Technology University;
..............page:35-39
Research On The Integral Distinguisher For SMS4
Zhang Zhenmin;Zhen Xiulin;Shi Rui;Ma Jingyi;School of Telecommunications Engineering. Xidian University;Department of Information Security;Beijing Electronic Science andTechnology Institute;Department of Communication Engineering;Beijing Electronic Science andTechnology Institute;
..............page:40-45
Study of AMPDR~2C Model-based eParty System
Peng Bo;Lou Jiapeng;Beijing Electronic Science and Technology Institute;
..............page:46-49
The design and complement of hierarchical management Electronic Signature System
Jiang Hua;Liu Juan;Hu Ronglei;Li Haoliang;Xidian University;Beijing Electronic Science and Technology Institute;
..............page:50-55
Design and Implementation of Electronic Documents Security Label
Xu Shengwei;Zhang Xiaoshuai;Qin Xiaolei;Huang Xiaoshuai;Beijing Electronic Science and Technology Institute;Xidian University;
..............page:56-59
The Implementation of an ARQ Mechanism Based on Network Coding in Wifi Unicast Traffic
Pan Luyuan;Zhou Yajian;Guo Yucui;Xu Guoai;Information Security Center;Beijing University of Posts and Telecommunications;National Engineering Laboratory for Disaster Backup and Recovery;Beijing Universityof Posts and Telecommunications;
..............page:60-65+73
Application of Improved SQUARE Model in Software Security Requirements Elicitation
Fan Jie;Xu Shengwei;Lou Jiapeng;Beijing Electronic and Science Technology Institute;
..............page:66-73
The Applications of Linear Algebra in Cryptology
Li Jia;Li Yuannan;Beijing Electronic Science and Technology Institute;
..............page:74-79
Digital Frequency Divider Based on the FPGA
Li Xuemei;Zhou Simin;Beijing Electronic Science and Technology Institute;
..............page:80-84
Implementation of Rainbow Tables to Crack PowerPoint Password on GPU-based Heterogeneous System
Li Xiaoxiao;Information Security Center;Beijing University of Posts and Telecommunications;
..............page:85-92