Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal on Communications
1000-436X
2009 Issue S2
Detection algorithm of LSB hidden messages based local image stability
ZHANG Qiu-yu; LIU Hong-guo; YUAN Zhan-ting
..............page:37-43
The "one-group-one-cipher" cryptograph of block-cipher based on chaotic
XUAN Lei1; YAN Ji-ning1;2
..............page:105-110
Enhanced authentication and key exchange protocols for roaming service
ZHOU Tao1;2; XU Jing3
..............page:61-68
Study of secret sharing schemes based on quantum theory
ZHU Zhen-chao 1;2; ZHANG Yu-qing2
..............page:127-132,139
Hybrid wireless mesh protocol
YANG Kai1;2; MA Jian-feng1;2
..............page:133-139
Cryptological properties of multi-output rotation symmetric functions
YUAN Yan-bin; ZHAO Ya-qun
..............page:1-7
Study on user's identification system in insider threats
PEI Qing-qi1;2; ZHAO Peng2; ZHANG Hong-bin3; WANG Chao2; YIN Hao1
..............page:121-126
On privacy of property-based remote attestation
LI Shang-jie1;2; HE Ye-ping1; LIU Dong-mei1;2; YUAN Chun-yang3
..............page:146-152
Fuzzy clustering method based on genetic algorithm in intrusion detection study
HUANG Min-ming LIN Bo-gang
..............page:140-145
Identity-based group-oriented signcryption scheme
ZHANG Bo; XU Qiu-liang
..............page:23-28
Primitive polynomials and word oriented linear feedback shift registers
ZENG Guang; YANG Yang; HAN Wen-bao; FAN Shu-qin
..............page:111-116
Grey evaluation model and algorithm of network attack effectiveness
WANG Hui-mei; JIANG Liang; XIAN Ming; WANG Guo-yu
..............page:17-22
Fair electronic cash protocol based on concurrent signature
PAN Ju; ZHU Jian-ming
..............page:69-74
Block cipher based on T-shaped cellular automata
WU Ying-zhi1; HAO Li-bo2; CHEN Ju-hua1
..............page:52-60
Analysis and improvement of ZG off-line TTP non-repudiation protocol
LIU Dong-mei1;3; QING Si-han 2; LI Peng-fei4; LI Shang-jie1;3
..............page:44-51
Grid-based routing protocol in wireless sensor networks
SHEN Yu-long1;2; XU Qi-jian1; PEI Qing-qi2; MA Jian-feng2
..............page:96-100
Conditions for anonymity in some generic public-key encryption constructions
TIAN Yuan; DENG Lu-yao; ZHANG Hao
..............page:8-16
Escrow mechanism for personal security keys on IBE
ZOU Yue-peng1;2; OUYANG Dan-tong1;2; HE Li-li1;2 ;BAI Hong-tao1;2
..............page:75-80
Access control model based on trusted computing for integrated avionics system
CUI Xi-ning1;2 ; SHEN Yu-long1; MA Jian-feng1 ; XIE Ke-jia2
..............page:86-90
Design and validation for a remote attestation security protocol
WANG Dan; WEI Jin-feng; ZHOU Xiao-dong
..............page:29-36
Image zero-watermarking algorithm based on region of interest
ZHANG Li-bao; MA Xin-yue; CHEN Qi
..............page:117-120
Anonymous and authenticated routing protocol for mobile ad hoc networks
LI Xiao-qing; LI Hui; MA Jan-feng
..............page:81-85