Online trace anonymization based on anonymous flow table
HAN Chun-jing;GE Jing-guo;XIE Gao-gang;LI Liang-xiong;LI Tong;LIU Yun-jie;Institute of Computing Technology;Chinese Academy of Sciences;University of Chinese Academy of Sciences;Institute of Information Engineering;Chinese Academy of Sciences;
..............page:11-22
Dynamic and adaptive access control model
SHI Guo-zhen;WANG Hao-jie;CI Yun-fei;YE Si-shui;GUO Yun-chuan;School of Information Security;Beijing Electronic Science and Technology Institute;School of Computer Science and Technology;Xidian University;School of Telecommunications Engineering;Xidian University;Dept.of House Technology;Ruiting Networking Technology Co;Ltd.;State Key Laboratory of Information Security;Institute of Information Engineering;Chinese Academy of Sciences;
..............page:49-56
Research on human blockage effect for indoor 26 GHz mm-wave communications
GENG Sui-yan;LI Xing;WANG Qi;WANG Guang-bo;WANG Meng-jun;SUN Shao-hui;HONG Wei;ZHAO Xiong-wen;School of Electrical and Electronic Engineering;North China Electric Power University;State Key Laboratory of Wireless Mobile Communications;China Academy of Telecommunications Technology;State Key Laboratory of Millimeter Wave;Southeast University;
..............page:68-73
Bankline extraction in remote sensing images using principal curves
GUO Yun;WANG Yi-huai;LIU Chun-ping;GONG Sheng-rong;JI Yi;School of Computer Science and Technology;Soochow University;Collaborative Innovation Center of Novel Software Technology and Industrialization;Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education;Jilin University;School of Computer Science and Engineering;Changshu Institute of Technology;
..............page:80-89
..............page:90-103
..............page:104-113
..............page:114-128
..............page:129-136
..............page:137-145
..............page:146-155
..............page:156-168
Research progress on secure data deduplication in cloud
XIONG Jin-bo;ZHANG Yuan-yuan;LI Feng-hua;LI Su-ping;REN Jun;YAO Zhi-qiang;Faculty of Software;Fujian Normal University;State Key Laboratory of Information Security;Institute of Information Engineering;Chinese Academy of Sciences;Fujian Engineering Research Center of Public Service Big Data Mining and Application;
..............page:169-180
..............page:181-188
Zero correlation-integral attack of MIBS block cipher
LIU Qing-cong;ZHAO Ya-qun;MA Meng;LIU Feng-mei;State Key Laboratory of Mathematical Engineering and Advanced Computing;Information Engineering University;Science and Technology on Information Assurance Laboratory;
..............page:189-195
..............page:196-202