Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Computer Research and Development
1000-1239
2015 Issue 10
qian yan
cao zhen fu ;, xu qiu liang ;, zhang yu qing ;, dong xiao lei ;
..............page:2163-2166
Survey of Android Vulnerability Detection
zhang yu qing ;, fang jun ;, wang kai ;, wang zhi qiang ;, le hong zhou ;, liu qi xu ;, he yuan ;, li xiao zuo ;, yang gang ;
..............page:2167-2177
A Cloud Model Based Trust Evaluation Model for Defense Agent
Yu Yang;,Xia Chunhe;,Wang Xinghe;
..............page:2178-2191
An Auditing Protocol for Data Storage in Cloud Computing with Data Dynamics
Qin Zhiguang;,Wang Shiyu;,Zhao Yang;,Xiong Hu;,Wu Songyang;
..............page:2192-2199
SPFPA: A Format Parsing Approach for Unknown Security Protocols
Zhu Yuna;,Han Jihong;,Yuan Lin;,Chen Hantuo;,Fan Yudan;
..............page:2200-2211
pTrace: A Counter Technology of DDoS Attack Source for Controllable Cloud Computing
Li Baohui;,Xu Kefu;,Zhang Peng;,Guo Li;
..............page:2212-2223
A Trustzone-Based Trusted Code Execution with Strong Security Requirements
Zhang Yingjun;,Feng Dengguo;,Qin Yu;,Yang Bo;
..............page:2224-2238
Advances in Key Techniques of Practical Secure Multi-Party Computation
Jiang Han;,Xu Qiuliang;
..............page:2247-2257
A Strongly Secure Lattice-Based Key Exchange Protocol
Wen Weiqiang;,Wang Libin;
..............page:2258-2269
Adaptively Secure Outsourcing Ciphertext-Policy Attribute-Based Encryption
Wang Hao;,Zheng Zhihua;,Wu Lei;,Wang Yilei;
..............page:2270-2280
A Privacy Preserving Attribute-Based Encryption Scheme with User Revocation
Li Jiguo;,Shi Yuerong;,Zhang Yichen;
..............page:2281-2292
Accountable Attribute-Based Encryption Scheme Without Key Escrow
Zhang Xing;,Wen Zilong;,Shen Qingni;,Fang Yuejian;,Wu Zhonghai;
..............page:2293-2303
A Trustee-Based and Efficient Divisible E-Cash Scheme
Yu Yulei;,Dong Xiaolei;,Cao Zhenfu;
..............page:2304-2312
A Discretionary Searchable Encryption Scheme in Multi-User Settings
Li Zhen;,Jiang Han;,Zhao Minghao;
..............page:2313-2322
A Universally Composable Secure Group Ownership Transfer Protocol for RFID Tags
Yuan Bianqing;,Liu Jiqiang;
..............page:2323-2331
Rational Secret Sharing Scheme Based on Reconstruction Order Adjustment Mechanism
Liu Hai;,Li Xinghua;,Ma Jianfeng;
..............page:2332-2340
Advances of Privacy Preservation in Internet of Things
Dong Xiaolei;
..............page:2341-2352
Privacy-Preserving Public Auditing for Multiple Managers Shared Data in the Cloud
Fu Anmin;,Qin Ningyuan;,Song Jianye;,Su Mang;
..............page:2353-2362
A Community Detecting Method Based on the Node Intimacy and Degree in Social Network
Liu Yao;,Kang Xiaohui;,Gao Hong;,Liu Qiao;,Wu Zufeng;,Qin Zhiguang;
..............page:2363-2372
Towards Measuring Unobservability in Anonymous Communication Systems
Tan Qingfeng;,Shi Jinqiao;,Fang Binxing;,Guo Li;,Zhang Wentao;,Wang Xuebin;,Wei Bingjie;
..............page:2373-2381
Study on Semi-Homogenous Algorithm Based on Ring Generalization
He Xianmang;,Chen Yindong;,Li Dong;,Hao Yanni;
..............page:2382-2394
Privacy Requirement Modeling and Consistency Checking in Cloud Computing
Wang Jin;,Huang Zhiqiu;
..............page:2395-2410
Collaboration Supported Mandatory Access Control Model
Fan Yanfang;,Cai Ying;
..............page:2411-2421
Provable Data Possession by Partial Delegation
Zhong Ting;,Han Xiao;,Zhao Yulong;
..............page:2422-2430