Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Chinese Computer Systems
1000-1220
2013 Issue 10
Design and Implementation of Network Information Security Testing Platform
JIN Song-chang;YANG Shu-qiang;YIN Hong;LI Ai-ping;YANG Hui-yu
..............page:2304-2309
Signcryption Scheme Based on Paillier's Public-key Cryptosystem
YUE Ze-lun;HAN Yi-liang;YANG Xiao-yuan
..............page:2310-2314
Bug Diagnose Framework Based on Kernel Supported Application Snapshot
YAN Dong;TAN Jian-feng;WANG Yu-ping;LI Hao;BAI Xiao-long
..............page:2231-2238
Trusted Dynamic Attestation Mechanism Based on Property Certificate
YAN Jian-hong
..............page:2349-2353
New Method for Security Access to Kernel Extension
LIU Hu-qiu;MA Chao;BAI Jia-ju
..............page:2225-2230
Improved Anti-collision Algorithm on Multi-state Binary and Hardware Implementation
ZHOU Yan-cong;DONG Yong-feng;GU Jun-hua
..............page:2275-2280
A Trust Routing Based on Collaborative Filtering in Ad-hoc Networks
FENG Jing;JIANG Lei;CHEN Jun;SHEN Ye;ZHANG Shu
..............page:2329-2334
A User Authentication and Key Agreement Scheme for Wireless Sensor Networks
YAN Li-li;ZHANG Shi-bin;CHANG Yan
..............page:2340-2344
Hardware Language Implementation and its Optimization of PRESENT
LI Lang;LI Ren-fa;ZOU Yi;HE Wei-wei
..............page:2272-2274
Set-valued Statistics Trustworthiness Measurement towards User Behavior in Networks
TIAN Ye;PENG Xin-guang;LI Hong-bin;ZHANG Yi-feng
..............page:2354-2357
Application of Game Theory Approach to Test Architecture Optimization and Test Scheduling for 3D SoC
SHAO Jing-bo;FU Yong-qing;LIU Xiao-xiao
..............page:2256-2260
Dynamic TDMA Protocol for Mobile Underwater Sensor Networks
HONG Lu;WEI Xian-min;HONG Feng
..............page:2377-2382
Novel Energy-efficient Metadata Dynamic Modeling and Management Approach for Cloud Storage System
LIAO Bin;YU Jiong;ZHANG Tao;YANG Xing-yao;YING Chang-tian
..............page:2407-2412
A Verifiable Quantum Anonymous Communication Scheme
LOU Xiao-ping;CHEN Zhi-gang
..............page:2315-2318
Research on Methodology of Formal Design and Verification for File System Based on Microkernel Architecture
QIAN Zhen-jiang;TANG Hong-ying;LI Kang-jie;HUANG Hao;SONG Fang-min
..............page:2261-2266
Algorithm of Compiler Optimizations for Stream Programs Based on X10
LIU Xiao-xian;WEI Hai-tao;YU Jun-qing
..............page:2239-2245
Fast Signature for Multi-source Network Coding
PENG Yong;YAN Wen-jie;CHEN Yu-qiang
..............page:2393-2395
VSA and SDS:Two Security Architectures in SDN
QIU Xiao-feng;ZHAO Liang;GAO Teng
..............page:2298-2303
Evaluation for Information Security Technologies Based on Multi-stage Dynamic Game
WANG Xiu-li;ZHU Jian-ming;LI Yang;JIA Heng-yue
..............page:2335-2339
A H.264/AVC Information Hiding Algorithm Based on Integer DCT Coefficients Modulation and N-dimensional Magic Matrix
LI Song-bin;FU Jiang-yun;LIU Peng;DAI Qiong-xing;DENG Hao-jiang
..............page:2293-2297
Micro-blog Information Collection and Group Behaviors Analysis
GAO Kai;WANG Jiu-shuo;MA Hong-xia;ZHOU Er-liang;Radha Ganesan
..............page:2413-2416
Overview of Ontology Search and Ranking
LI Jiang-hua;SHI Peng;HU Chang-jun
..............page:2396-2406
A New Maximum Distance Separable Array Code on Toleration Triple Failures
WAN Wu-nan;SUO Wang;WANG Tuo;YANG Wei
..............page:2267-2271
zheng gao jian ze
..............page:2297
FPSFI: a LLVM-based Software Fault Isolation Mechanism for Linux Drivers
ZHEN Kai;BAI Jia-ju;LIU Hu-qiu;GUO Xu-feng
..............page:2246-2250
Research on the Minimum Number of Mobile Node for Sweep Coverage in Wireless Sensor Network Based on Genetic Algorithm
ZHANG Zhen-ya;CHENG Hong-mei;LIU Jia;FANG Qian-sheng
..............page:2388-2392
AGQ-MAC:Asynchronous MAC Protocol Based Grid Quorum for Low Duty-cycled Wireless Sensor Networks
XU Chu-gui;DENG Xiao-heng;LIU Chi-biao;CHEN Zhi-gang
..............page:2383-2387
Study on Network User Behavior Evaluation Model Based on Cloud Model Theory
ZHANG Shi-bin;XIAO Shan;CHANG Yan;YAN Li-li
..............page:2367-2372
Lattice-based Strong Designated Verifier Signature Scheme
LI Ming-xiang;ZHENG Yan-juan;XU Ming
..............page:2363-2366
Prediction Assisted Data Delivery Mechanism in Delay Tolerant Mobile Sensor Networks
FU Bin;LI Ren-fa;XIAO Xiong-ren
..............page:2286-2292
Game-oriented Adaptive Routing Algorithm in Wireless Sensor Network
YANG Yun;KONG Xiu-ping;YAN Ran;XU Wen-chun;YANG An-ju
..............page:2281-2285
Design and Implementation of Cloud Storage Integrity Accountability Method
YANG Xiao-hui;FAN Zhen-hua;LIU Shi-lei
..............page:2358-2362
A Code Dissassembly Framework Combining Dynamic and Static State
XI Qi;ZENG Yong-jun;WANG Qing-xian;WU Hong-shui
..............page:2251-2255