Tree-based lightweight RFID grouping proof protocol
ZHU Da-li;RONG Wen-jing;WANG Si-ye;PANG Na;Institute of Information Engineering;Chinese Academy of Sciences;University of Chinese Academy of Sciences;School of Computer and Information Technology;Beijing Jiaotong University;
..............page:15-24
Proxy-based privacy-preserving scheme for mobile Internet
GENG Kui;LI Feng-hua;LI Wei-hao;LI Hui;NIU Ben;XIE Rong-na;State Key Laboratory of Integrated Service Networks;Xidian University;State Key Laboratory of Information Security;Institute of Information Engineering;CAS;Department of Information Security;Beijing Electronic Science and Technology Institute;
..............page:25-32
Multidimensional digital media-oriented access control scheme
SHAN Fang-fang;LI Feng-hua;XIE Rong-na;XIONG Jin-bo;WANG Yan-chao;National Key Laboratory of Integrated Networks Services;Xidian University;State Key Laboratory of Information Security;Institute of Information Engineering;Chinese Academy of Sciences;Department of Information Security;Beijing Electronic Science and Technology Institute;
..............page:52-60
..............page:92-101
..............page:102-107
..............page:108-117
..............page:118-126
..............page:127-135
..............page:136-146
..............page:147-155
Parallel detection algorithm on long duration data streaming
ZHOU Ai-ping;CHENG Guang;GUO Xiao-jun;ZHU Chen-gang;School of Computer Science and Engineering;Southeast University;School of Computer Science and Technology;Taizhou University;Key Laboratory of Computer Network and Information Integration Ministry of Education;Southeast University;
..............page:156-166
..............page:167-173
..............page:174-179
..............page:180-189
..............page:190-200
..............page:201-212