Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Chinese Journal of Computers
0254-4164
2015 Issue 4
Analyzing Trusted Computing Protocol Based on the Strand Spaces Model
FENG Wei;,FENG Deng-Guo;
..............page:701-716
Survey of Software Vulnerability Detection Techniques
LI Zhou-Jun;,ZHANG Jun-Xian;,LIAO Xiang-Ke;,MA Jin-Xin;
..............page:717-732
Provable Secure Trusted and Anonymous Roaming Protocol for Mobile Internet
ZHOU Yan-Wei;,YANG Bo;,ZHANG Wen-Zheng;
..............page:733-748
An Improved Quantitative Evaluation Method for Network Security
XI Rong-Rong;,YUN Xiao-Chun;,ZHANG Yong-Zheng;,HAO Zhi-Yu;
..............page:749-758
A Survey of Key-Insulated Cryptography
QIN Zhi-Guang;,LIU Jing-Jing;,ZHAO Yang;,WU Song-Yang;,XIONG Hu;,NIE Xu-Yun;,ZHU Guo-Bin;
..............page:759-774
An Efficient FIBE Scheme Based on Ideal Lattices
WU Li-Qiang;,YANG Xiao-Yuan;,HAN Yi-Liang;
..............page:775-782
Differential Frequency Analysis Method Based on Resample
WANG Zhe;,LIU Jian;,WANG Fei-Yu;,LIU Jian-Feng;
..............page:783-792
A New Message Authentication Code Based on Hash Function and Block Cipher
XU Jin;,WEN Qiao-Yan;,WANG Da-Yin;
..............page:793-803
Provably Secure Certificateless Hybrid Signcryption
YU Hui-Fang;,YANG Bo;
..............page:804-813
Multiple Differential Cryptanalysis Based on Optimal Distinguisher
GAO Hai-Ying;,JIN Chen-Hui;
..............page:814-821
Wireless Key Generation for RFID Systems
LU Li;
..............page:822-832
Website Fingerprinting Attack Based on Hyperlink Relations
GU Xiao-Dan;,YANG Ming;,LUO Jun-Zhou;,JIANG Ping;
..............page:833-845
Parallel Community Detection Based Worm Containment in Online Social Network
HE Liang;,FENG Deng-Guo;,SU Pu-Rui;,YING Ling-Yun;,YANG Yi;
..............page:846-858
Provable Secure Mechanism for BGP Path Protection in the Standard Model
LI Dao-Feng;,WANG Gao-Cai;,WANG Zhi-Wei;,ZHONG Cheng;,LI Tao-Shen;
..............page:859-871
A Method of OpenFlow-Based Real-Time Conflict Detection and Resolution for SDN Access Control Policies
WANG Juan;,WANG Jiang;,JIAO Hong-Yang;,WANG Yong;,CHEN Shi-Ya;,LIU Shi-Hui;,HU Hong-Xin;
..............page:872-883