Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Journal on Communications
1000-436X
2009 Issue S2
Detection algorithm of LSB hidden messages based local image stability
ZHANG Qiu-yu; LIU Hong-guo; YUAN Zhan-ting
..............
page:37-43
The "one-group-one-cipher" cryptograph of block-cipher based on chaotic
XUAN Lei1; YAN Ji-ning1;2
..............
page:105-110
Enhanced authentication and key exchange protocols for roaming service
ZHOU Tao1;2; XU Jing3
..............
page:61-68
Study of secret sharing schemes based on quantum theory
ZHU Zhen-chao 1;2; ZHANG Yu-qing2
..............
page:127-132,139
Hybrid wireless mesh protocol
YANG Kai1;2; MA Jian-feng1;2
..............
page:133-139
Research on large-scale identity authentication architecture based on combined symmetric key
LIU Tong; XU Guan-ning
..............
page:91-95
Cryptological properties of multi-output rotation symmetric functions
YUAN Yan-bin; ZHAO Ya-qun
..............
page:1-7
an qing shi fan xue yuan ying yong shu xue zhong dian xue ke dai tou ren hu wan bao jiao shou jian jie
..............
page:153
fu zhou da xue wu li yu xin xi gong cheng xue yuan
..............
page:4
jiang su da xue ji suan ji ke xue yu tong xin gong cheng xue yuan
..............
page:153
Study on user's identification system in insider threats
PEI Qing-qi1;2; ZHAO Peng2; ZHANG Hong-bin3; WANG Chao2; YIN Hao1
..............
page:121-126
On privacy of property-based remote attestation
LI Shang-jie1;2; HE Ye-ping1; LIU Dong-mei1;2; YUAN Chun-yang3
..............
page:146-152
Fuzzy clustering method based on genetic algorithm in intrusion detection study
HUANG Min-ming LIN Bo-gang
..............
page:140-145
Identity-based group-oriented signcryption scheme
ZHANG Bo; XU Qiu-liang
..............
page:23-28
Multipurpose watermarking realizing image copyright notification,copyright protection and content authentication
ZHU Cong-xu
..............
page:101-104,110
Primitive polynomials and word oriented linear feedback shift registers
ZENG Guang; YANG Yang; HAN Wen-bao; FAN Shu-qin
..............
page:111-116
Grey evaluation model and algorithm of network attack effectiveness
WANG Hui-mei; JIANG Liang; XIAN Ming; WANG Guo-yu
..............
page:17-22
Fair electronic cash protocol based on concurrent signature
PAN Ju; ZHU Jian-ming
..............
page:69-74
Block cipher based on T-shaped cellular automata
WU Ying-zhi1; HAO Li-bo2; CHEN Ju-hua1
..............
page:52-60
da qing shi you xue yuan ji suan ji yu xin xi ji shu xue yuan
..............
page:154
wu han li gong da xue xin xi gong cheng xue yuan
..............
page:2
Analysis and improvement of ZG off-line TTP non-repudiation protocol
LIU Dong-mei1;3; QING Si-han 2; LI Peng-fei4; LI Shang-jie1;3
..............
page:44-51
Grid-based routing protocol in wireless sensor networks
SHEN Yu-long1;2; XU Qi-jian1; PEI Qing-qi2; MA Jian-feng2
..............
page:96-100
Conditions for anonymity in some generic public-key encryption constructions
TIAN Yuan; DENG Lu-yao; ZHANG Hao
..............
page:8-16
Escrow mechanism for personal security keys on IBE
ZOU Yue-peng1;2; OUYANG Dan-tong1;2; HE Li-li1;2 ;BAI Hong-tao1;2
..............
page:75-80
Access control model based on trusted computing for integrated avionics system
CUI Xi-ning1;2 ; SHEN Yu-long1; MA Jian-feng1 ; XIE Ke-jia2
..............
page:86-90
Design and validation for a remote attestation security protocol
WANG Dan; WEI Jin-feng; ZHOU Xiao-dong
..............
page:29-36
Image zero-watermarking algorithm based on region of interest
ZHANG Li-bao; MA Xin-yue; CHEN Qi
..............
page:117-120
Anonymous and authenticated routing protocol for mobile ad hoc networks
LI Xiao-qing; LI Hui; MA Jan-feng
..............
page:81-85