Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal on Communications
1000-436X
2008 Issue 10
Cluster-based key management scheme for ad hoc networks
HU Rong-lei;LIU Jian-wei;ZHANG Qi-shan
..............page:223-228
Reputation computation based on new metric in P2P network
BAO Yu;ZENG Guo-sun;ZENG Lian-sun;CHEN Bo;WANG Wei
..............page:215-222
Multi-Clock control shift register sequences
XIAO Hong;ZHANG Chuan-rong;XIAO Guo-zhen;WANG Xin-mei
..............page:210-214
JPEG steganalysis based on Tri-training semi-supervised learning
GUO Yan-qing;KONG Xiang-wei;YOU Xin-gang;HE De-quan
..............page:205-209,214
High speed modular divider based on GCD algorithm over GF(2m)
DING Yong;GUI Feng
..............page:199-204
Bayesian-network-approximate-reasoning-based method for network vulnerabilities evaluation
JIA Wei;LIAN Yi-feng;FENG Deng-guo;CHEN Si-si
..............page:191-198
Document watermarking scheme for information tracking
QI Wen-fa;LI Xiao-long;YANG Bin;CHENG Dao-fang
..............page:183-190
WPD-based blind image steganalysis
LUO Xiang-yang;LIU Fen-lin;WANG Dao-shun
..............page:173-182
Modified kernels-alternated error diffusion multipurpose water-marking algorithm for halftone images
NI Jiang-qun;XIE Zhen;TANG Lin-na;HUANG Ji-wu
..............page:30-36
Montgomery algorithm on elliptic curves over finite fields of character three
WANG Hong;LI Bao;YU Wei
..............page:25-29,36
Method of designing security protocol for remote attestation
YU Rong-wei;WANG Li-na;KUANG Bo
..............page:19-24
Extended-CSP based analysis of non-repudiation protocols
HAN Zhi-geng;LUO Jun-zhou;WANG Liang-min
..............page:8-18
EPN: encryption padding for NTRU with provable security
MU Ning-bo;HU Yu-pu;WANG Bao-cang
..............page:3-7
qian yan
..............page:1-2
Design and realization of the real-time monitoring system for instant messenger
FU An-min;ZHANG Yu-qing
..............page:165-172
Trusted digital rights management protocol supporting for time and space constraint
MA Zhao-feng;FAN Ke-feng;CHEN Ming;YANG Yi-xian;NIU Xin-xin
..............page:153-164
Verifier-based password-authenticated key exchange protocol for three-party
LI Wen-min;WEN Qiao-yan;ZHANG Hua
..............page:149-152,164
On the algebraic structure of Klimov-Shamir T-function
LUO Yong-long;QI Wen-feng
..............page:143-148
Universally composable secure trusted access protocol for WLAN Mesh networks
MA Zhuo;MA Jian-feng;ZENG Yong;SHEN Yu-long
..............page:126-134
Research of STR multicast key management protocol based on bilinear pairing in ad hoc network
ZHOU Fu-cai;XU Jian;XU Hai-fang;LIU Ze-chao
..............page:117-125
HPBR: host packet behavior ranking model used in worm detection
XIAO Feng-tao;HU Hua-ping;LIU Bo;CHEN Xin
..............page:108-116
Security of randomized hashing and signer's cheating
LI Zhi-min;WANG Li-cheng;ZHENG Shi-hui;YANG Yi-xian
..............page:101-107
One-way hash function with chaotic dynamic parameters
GUO Wei;CAO Yang;WANG Xiao-min;HE Da-ke
..............page:93-100
Saturation cryptanalysis of CLEFIA
WANG Wei;WANG Xiao-yun
..............page:88-92
Group construction method of threshold visual cryptography schemes
FEI Ru-chun;WANG Li-na;ZHANG Huan-guo
..............page:82-87
EDSM: secure and efficient scalar multiplication algorithm on Edwards curves
ZHANG Bao-hua;YIN Xin-chun;ZHANG Hai-ling
..............page:76-81
Secure password-based authentication scheme with anonymous identity without smart cards
WANG Bang-ju;ZHANG Huan-guo;WANG Yu-hua
..............page:70-75
R2BAC: a risk-based multi-domain secure interoperation model
LI Rui-xuan;HU Jin-wei;TANG Zhuo;LU Zheng-ding
..............page:58-69
Real-time monitoring and controlling to secure information flow
YAN Li;JU Shi-guang;WANG Chang-da
..............page:51-57
Provably secure secret sharing scheme based on bilinear maps
LI Hui-xian;PANG Liao-jun
..............page:45-50
Modified security model based on dynamic trusted degree
NIE Xiao-wei;FENG Deng-guo
..............page:37-44