Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Shanghai Jiaotong University
1007-1172
2006 Issue 2
A Secret Sharing Featured Secure Communication System Based on Dual Synchronization of Chaos in Colpitts Circuits
FAN Yan;SHI Zhi-guo;RAN Li-xin;CHEN Kang-sheng
..............page:158-164,171
Key Management Using Certificate-Based Cryptosystem in Ad Hoc Networks
LI Fa-gen;GAO Jun-tao;LIU Shuang-gen;HU Yu-pu
..............page:152-157
A Scheme of Fragile Watermarking Based on SVD and 2D Chaotic Mapping
LIU Fen-lin;GAO Shan-qing;GE Xin
..............page:146-151
A Fast Attack Algorithm on the MD5 Hash Function
WANG Zhang-yi;ZHANG Huan-guo;QIN Zhong-ping;MENG Qing-shu
..............page:140-145,151
An Approach to Hide Secret Speech Information
WU Zhi-jun;DUAN Hai-xin;LI Xing
..............page:134-139
ID-Based Threshold Decryption Secure Against Chosen Plaintext Attack
LONG Yu;CHEN Ke-fei;LIU Sheng-li
..............page:127-133
Improved ID-Based Signature Scheme Solving Key Escrow
LIAO Jian;QI Ying-hao;HUANG Pei-wei;RONG Men-tian;LI Sheng-hong
..............page:121-126
The Anomaly Detection in SMTP Traffic Based on Leaky Integrate-and-Fire Model
LUO Hao;FANG Bin-xing;YUN Xiao-chun
..............page:165-171
A Perturbing Scheme of Digital Chaos
LIU Bin;LUO Xiang-yang;LIU Fen-lin
..............page:172-176
A Heuristic Method of Scalar Multiplication of Elliptic Curve over OEF
LIU Duo;LUO Ping;DAI Yi-qi
..............page:177-183
A Group Oriented Cryptosystem for the Vector Space Access Structure
XU Chun-xiang;MA Hua;ZHOU Jun-hui;XIAO Guo-zheng
..............page:184-187
Recovery from Wormhole Attack in Mobile Ad Hoc Network (MANET)
JI Xiao-jun;TIAN Chang;ZHANG Yu-sen
..............page:188-191,196
A Secure Session Key Distribution Scheme for Group Communications
LIN Ren-hung;JAN Jinn-ke
..............page:192-196
Proofs of Security for Improved Rabin Signature Scheme
DONG Xiao-lei;LU Rong-xing;CAO Zhen-fu
..............page:197-199,204
The Braid-Based Bit Commitment Protocol
WANG Li-cheng;CAO Zhen-fu;CAO Feng;QIAN Hai-feng
..............page:200-204
An ID-Based Authenticated Key Agreement Protocol for Peer-to-Peer Computing
LU Rong-xing;CAO Zhen-fu;SU Ren-wang;CHAI Zhen-chuan
..............page:205-209
A Self-Encryption Remote User Anonymous Authentication Scheme Using Smart Cards
LU Rong-xing;CAO Zhen-fu;SU Ren-wang
..............page:210-214
An Efficient Forward Secure Signature Scheme
YU Jia;KONG Fan-yu;LI Da-xing
..............page:242-247
How to Play E-Lottery Games via Voting
HAN Wei;ZHANG Long-jun;ZHENG Dong;CHEN Ke-fei
..............page:248-252,258
Trusted Anomaly Detection with Context Dependency
PENG Xin-guang;YAN Mei-feng
..............page:253-258
Research on Modeling of Genetic Networks Based on Information Measurement
ZHANG Guo-wei;SHAO Shi-huang;ZHANG Ying;LI Hai-ying
..............page:259-262
Ising Spin-Based Error Correcting Private-Key Cryptosystems
ZHENG Dong;ZHENG Yan-fei;FAN Wu-ying
..............page:215-218
Analysis of Information Leakage in Quantum Key Agreement
LIU Sheng-li;ZHENG Dong;CHENG Ke-fei
..............page:219-223
Buffer Overflow Detection on Binary Code
ZHENG Yan-fei;LI Hui;CHEN Ke-fei
..............page:224-229
Verifiably Encrypted Signatures Without Random Oracles
LI Xiang-xue;CHEN Ke-fei;LIU Sheng-li;LI Shi-qun
..............page:230-235
Verifiable Secret Redistribution for Proactive Secret Sharing Schemes
YU Jia;KONG Fan-yu;LI Da-xing
..............page:236-241