Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Shandong University(Natural Science)
1671-9352
2011 Issue 9
Research on modular reasoning of aspect-oriented programming
xie gang ; yang bo
..............page:48-52
Universally composable self-updating hash chain authentication model
zhang hao jun ; qi qing lei ; zhao bao peng
..............page:67-70
Design and implementation of a component stack overflow vulnerability detection system
chen jin fu ; zhang chao ; lu yan sheng ; wang huan huan
..............page:43-47,56
Key escrow scheme based on tree-structure
liu li ming ; jing feng xuan ; xie xiao yao
..............page:35-38
A PPM probabilistic packet marking improving scheme
jiang hua ; li ming zhen ; wang zuo
..............page:85-88
Security assurance method based on non-interference
sun zuo ; chen ya sha ; zhang xing ; liu yi
..............page:28-34
An ARQ error control scheme based on RSSI in wireless sensor networks
yao wu jun ; ding yi ; wei li xian ; yang xiao yuan
..............page:61-66
Study on a formal modeling method for survivability of mission-critical systems
wang jian ; guo li li ; li yang
..............page:89-94
Optimal inspection and replacement policy for a shock model with preventive repair
li ling ; cheng guo qing ; tang ying hui
..............page:122-126
Research on the privilege control mechanism and modeling of a high level information system
chen ya sha ; zhao yong ; liu yan ; shen chang xiang
..............page:57-60
A integrated fuzzy-neural network intrusion detection model
jiang jia tao ; liu zhi jie ; xie xiao yao
..............page:95-98,105
Secure quantum voting protocol
wen xiao jun ; cai xue jun
..............page:9-13
Whittle type inequality for demimartingales and its applications
gong xiao bing
..............page:112-116,121
The formal description of software correctness based on the environment
ma yan fang ; zhang min ; chen yi xiang
..............page:22-27
The research of a SOA-based tourism e-commerce system security model
xiao xue mei ; zhang ren jin
..............page:81-84
Measure model for trusted Web services
zheng xiao rong
..............page:53-56
A resilient and distributed scheme of data security
wang zuo ; wu lei ; hao rong
..............page:39-42
The research of security in grouping based on the geographical area of a vehicular Ad hoc network
shuai lue ; liu zhi jie ; xie xiao yao
..............page:18-21,34
Linear orthomorphisms and orthomorphic matrix on the ring Zn
han hai qing ; li qin ; liu xiu sheng ; zhang huan guo
..............page:14-17
Honesty-rate measuring based distributed intrusion detection system
chen pei jian ; yang yue xiang ; tang chuan
..............page:77-80