Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal on Communications
1000-436X
2015 Issue 11
Detecting APT attacks: a survey from the perspective of big data analysis
FU Yu;LI Hong-cheng;WU Xiao-ping;WANG Jia-sheng;Department of Information Security;Naval University of Engineering;
..............page:1-14
Tree-based lightweight RFID grouping proof protocol
ZHU Da-li;RONG Wen-jing;WANG Si-ye;PANG Na;Institute of Information Engineering;Chinese Academy of Sciences;University of Chinese Academy of Sciences;School of Computer and Information Technology;Beijing Jiaotong University;
..............page:15-24
Proxy-based privacy-preserving scheme for mobile Internet
GENG Kui;LI Feng-hua;LI Wei-hao;LI Hui;NIU Ben;XIE Rong-na;State Key Laboratory of Integrated Service Networks;Xidian University;State Key Laboratory of Information Security;Institute of Information Engineering;CAS;Department of Information Security;Beijing Electronic Science and Technology Institute;
..............page:25-32
Secure and efficient distributed pseudonym generation in VANET
LIU Zhe;LIU Jian-wei;WU Qian-hong;CHEN Jie;WANG Meng-meng;School of Electronics and Information Engineering;Beihang University;
..............page:33-40
Secure coordinated beamforming for multiuser MISO interference channels
ZHANG Li-jian;JIN Liang;LUO Wen-yu;China National Digital Switching System Engineering and Technological R&D Center;
..............page:41-51
Multidimensional digital media-oriented access control scheme
SHAN Fang-fang;LI Feng-hua;XIE Rong-na;XIONG Jin-bo;WANG Yan-chao;National Key Laboratory of Integrated Networks Services;Xidian University;State Key Laboratory of Information Security;Institute of Information Engineering;Chinese Academy of Sciences;Department of Information Security;Beijing Electronic Science and Technology Institute;
..............page:52-60
Verifiable outsourcing private key generation algorithm in an identity-based encryption scheme
REN Yan-li;CAI Jian-xing;HUANG Chun-shui;GU Da-wu;School of Communication and Information Engineering;Shanghai University;School of Electronic Information and Electrical Engineering;Shanghai Jiaotong University;
..............page:61-66
Threshold scheme for different access clusters based on vector space
LI Bin;Department of Mathematics;Chengdu Normal University;
..............page:67-72
Multi-element based on proxy re-encryption scheme for mobile cloud computing
SU Mang;SHI Guo-zhen;XIE Rong-na;FU An-min;School of Computer Science and Engineering;Nanjing University of Science and Technology;Department of Information Security;Beijing Electronic Science and Technology Institute;
..............page:73-79
Multiuser and multiple-replica provable data possession scheme based on multi-branch authentication tree
ZHA Ya-xing;LUO Shou-shan;BIAN Jian-chao;LI Wei;Information Security Center;Beijing University of Posts and Telecommunications;National Engineering Laboratory for Disaster Backup and Recovery;
..............page:80-91
New user revocation approach based on intermediate agency for cloud data access control
YAO Liang;YANG Chao;MA Jian-feng;ZHANG Jun-wei;College of Computer;Xidian University;
..............page:92-101
Security protection mechanism of virtual machine computing environment under the cloud computing
YAN Shi-jie;CHEN Yong-gang;LIU-Peng;MIN Le-quan;College of Automation Engineering;University of Science and Technology Beijing;State Information Center;China National Institute of Standardization;
..............page:102-107
Novel cloud data assured deletion approach based on ciphertext sample slice
ZHANG Kun;YANG Chao;MA Jian-feng;ZHANG Jun-wei;College of Computer;Xidian University;
..............page:108-117
Adaptive AP clustering algorithm and its application on intrusion detection
JIANG Jie;WANG Zhuo-fang;CHEN Tie-ming;ZHU Chen-chen;CHEN Bo;College of Computer Sci.& Tech.;Zhejiang University of Technology;
..............page:118-126
Yaksha scheme based content publish/subscribe system for NDN
GUO Xian;FENG Tao;CAO Lai-cheng;WANG Jing;LU Ye;School of Computer and Communication;Lanzhou University of Technology;
..............page:127-135
Research on network anomaly detection based on one-class SVM and active learning
LIU Jing;GU Li-ze;NIU Xin-xin;YANG Yi-xian;Information Security Center;Beijing University of Posts and Telecommunications;Troops 61741 of PLA;
..............page:136-146
Message combined with instruction analysis for network protocol’s abnormal behavior
HU Yan-jing;PEI Qing-qi;PANG Liao-jun;National Key Laboratory of Integrated Services Networks;Xidian University;Department of Electronics Engineering;Engineering University of the Armed Police Force;
..............page:147-155
Parallel detection algorithm on long duration data streaming
ZHOU Ai-ping;CHENG Guang;GUO Xiao-jun;ZHU Chen-gang;School of Computer Science and Engineering;Southeast University;School of Computer Science and Technology;Taizhou University;Key Laboratory of Computer Network and Information Integration Ministry of Education;Southeast University;
..............page:156-166
Research on distributed genetic k-means for anomaly detection in MANET
LI Hong-cheng;WU Xiao-ping;YAN Bo;Department of Information Security;Naval University of Engineering;
..............page:167-173
Analysis and improvement of an identity-based signcryption
ZHANG Yu;DU Rui-ying;CHEN Jing;HOU Jian;ZHOU Qing;WANG Wen-wu;School of Computer;Wuhan University;Science and Technology on Information Assurance Laboratory;Army Aviation Research Institute;
..............page:174-179
Trust-aware secure virtual network embedding algorithm
GONG Shui-qing;CHEN Jing;HUANG Cong-hui;ZHU Qing-chao;College of Information and Navigation;Air Force Engineering University;Unit 94543 of PLA;
..............page:180-189
Towards session identification using principal behavior for multi-party secure protocol
ZHU Yu-na;HAN Ji-hong;YUAN Lin;CHEN Han-tuo;FAN Yu-dan;The Third College;PLA Information Engineering University;
..............page:190-200
RMPCM: network-wide anomaly detection method based on robust multivariate probabilistic calibration model
LI Yu-chong;LUO Xing-guo;QIAN Ye-kui;ZHAO Xin;National Digital Switching System Engineering & Technological Research Center;Science and Technology on Information Transmission and Dissemination in Communication Networks Laboratory;Air Defence Forces Academy of PLA;
..............page:201-212