Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Huazhong University of Science and Technology(Nature Science)
1671-4512
2014 Issue 11
Lightweight checkpoint of virtual machine memory
Qiang Weizhong;Liu Ling;Zou Deqing;School of Computer Science and Technology;Huazhong University of Science and Technology;
..............page:1-5
A hardware-level trust measurement approach without operating system
Zhang Fan;Zhang Cong;Chen Wei;Xu Mingdi;School of Mathematics and Computer Science;Wuhan Polytechnic University;College of Communication Engineering;Hangzhou Dianzi University;School of Computer Science and Technology;Nanjing University of Posts and Telecommunications;System Software Department;Wuhan Digital Engineering Institute;
..............page:6-10
Coupling measurement of IaaS platform based on structural entropy
Zhao Bo;Zou Li;Xiang Shuang;Milan Heinayati;School of Compute;Wuhan University;Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education;Wuhan University;School of Computer;Wuhan University;Distance Learning College;Xinjiang Radio and;TV University;
..............page:11-16+22
Remote data checking approach based on network coding
Wang Lina;Deng Ruyi;Ren Zhengwei;Liu Weijie;School of Computer;Wuhan University;
..............page:17-22
Deep predation and secondary gradient acceleration differential evolution algorithm
Shen Jinan;Liang Fang;Zheng Minghui;Department of Computer Science and Technology;Hubei Minzu University;
..............page:23-27+33
Anonymous remote attestation protocol based on DAA and TLS
Zhang Dawei;Han Zhen;Jiang Yichen;Li Meihong;School of Computer and Information Technology;Beijing Jiaotong University;
..............page:28-33
Lightweight method for detecting JavaScript-based malicious Web pages
Ma Hongliang;Wang Wei;Han Zhen;School of Computer and Information Technology;Beijing Jiaotong University;School of Information Science and Technology;Shihezi University;
..............page:34-38
S-Tracker:attribution of shellcode exploiting stack
Liang Yu;Fu Jianming;Peng Guojun;Peng Bichen;School of Computer;Wuhan University;State Key Laboratory of Aerospace Information Security and Trusted Computing of the Ministry of Education;Wuhan University;China Securities Depository and Clearing Corporation Limited;
..............page:39-46
Provable secure multivariate encryption scheme in standard model
Han Yiliang;Yue Zelun;Yang Xiaoyuan;Wei Yuechuan;Department of Electronics Technology;Engineering University of Armed Police Force;
..............page:47-51
Game theory model for routing hotspot in wireless network
Zheng Minghui;Shen Jinan;Zhou Huihua;Liu Zhaozhao;Department of Computer Science and Technology;Hubei Minzu University;
..............page:52-56
P2P botnet detection based on correlation of flow and information fusion theory
Song Yuanzhang;Chen Yuan;Wang Anbang;Changchun Institute of Optics;Fine Mechanics and Physics;Chinese Academy of Sciences;
..............page:57-62
Resource allocation in wireless cooperative multicast networks for outage probability minimization
Chen Lei;Wang Hongyu;Niu Fanglin;Department of Information and Communication Engineering;Dalian University of Technology;Department of Public Security Intelligence;National Police University of China;Electron and Information Engineering College;Liaoning University of Technology;
..............page:63-67+73
Analysis of security anti-virus software based on confrontation
Peng Guojun;Zhou Yingji;Wang Taige;Liu Conggang;School of Computer;Wuhan University;Key Laboratory of Aerospace Information Security and Trusted Computing;Wuhan University;Law School;Renmin University of China;
..............page:68-73
Research and implementation of process isolation under virtualization environment
Zhao Bo;Xia Zhonglin;An Yang;Xiang Shuang;School of Computer;Wuhan University;
..............page:74-79
Interval-valued intuitionistic fuzzy sets service evaluation approach based on users′preferences
Luo Jian;Wang Haiyan;Yan Qi;Wang Suichang;College of Computer Science;Nanjing University of Posts and Telecommunications;
..............page:80-85
Approach for integer vulnerability detection based on static instrumentation and constraint solving
Zhang Fan;Zhang Cong;Xu Mingdi;Yang Jie;College of Communication Engineering;Hangzhou Dianzi University;School of Mathematics and Computer Science;Wuhan Polytechnic University;System Software Department;Wuhan Digital Engineering Institute;Software School;South China University of Technology;
..............page:86-90
Skyline service selection approach with dynamic adaptation to user preference degree
Wang Haiyan;Wang Qian;College of Computer Science;Nanjing University of Posts and Telecommunications;
..............page:91-96
Digital signature protocol based on error-correcting codes
Liu Jinhui;Jia Jianwei;Zhang Huanguo;Dong Zhe;School of Computer;Wuhan University;Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education Wuhan;Wuhan University;Nanjing Army Command College Library;
..............page:97-101
Security communication model for vehicular clouds based on trusted computing
Zhang Wenbo;Bao Zhenshan;Li Jian;Zhan Jing;College of Computer Science;Beijing University of Technology;Beijing Municipal Key Laboratory of Trusted Computing;Beijing University of Technology;
..............page:102-105
Optimized approach for resolving policy inconsistency conflicts
Lu Jianfeng;Yan Xuan;Peng Hao;Han Jianmin;School of Mathematics-Physical and Information Engineering;Zhejiang Normal University;
..............page:106-111
Correlation power attack on AES cipher chip with rotating masking
Liu Biao;Department of management;Beijing Electronic Science and Technology Institution;
..............page:112-116
Research of multi-level identification technology for peer to peer application
Chen Lin;Kong Huafeng;Shen Kaixin;School of Computer of Science and Technology;Huazhong University of Science and Technology;The Third Research Institute of the Minisry of Public Security;
..............page:117-120
Agent-free processes monitoring method supporting various virtualization technologies
Cui Jingsong;Zhang Yana;Guo Chi;Zhang Meng;School of Computer;Wuhan University;State Key Laboratory of Software Engineering;Wuhan University;Global Navigation Satellite System Research Center;Wuhan University;
..............page:121-127
Behavior analysis and detection method for distributed systems
Wang Tao;Ma Chuan;Shen Limin;School of Information Science and Engineering;Yanshan University;E&A College;Hebei Normal University of Science and Technology;
..............page:128-132