Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of University of Science and Technology of China
0253-2778
2011 Issue 7
Hybrid group key management scheme based on STR unbalanced tree structure
MA Changsha;XUE Kaiping;HONG Peilin;DING Rong
..............page:582-588,635
A seamless switching method based on reverse route redirection
ZHANG Jianwei;HAN Feng;LIU Si;LI Chaoyang;CAI Zengyu
..............page:651-658
A tamper-proof software watermark using code-based encryption
TANG Zhanyong;FANG Dingyi;SU Lin
..............page:599-606
Multiple-authority-key KP-ABE scheme with adaptive security
YANG Xiaoyuan;WANG Zhiqiang;CAI Weiyi
..............page:619-625
An audio digital watermarking algorithm in DCT domain for air-channel transmitting
ZHANG Xia;CHANG Di;HUANG Qian;YANG Wanyi;GUO Wei
..............page:642-650
RFID cryptographic protocol based on two-dimensional region Hash chain
XIONG Wanxing;XUE Kaiping;HONG Peilin;MA Changsha
..............page:594-598
Multivariate group signature scheme withstanding conspiracy attacks
TAO Yu;YANG Yatao;LI Zichen;ZHENG Kin
..............page:615-618
Intrusion detection approach towards software behavior trustworthiness
WANG Xinzhi;SUN Lechang;LU Yuliang;ZHANG Min
..............page:626-635
Adaptive adjustment weighted text classification
LAI Yingxu;XU Xin;YANG Zhen
..............page:607-614
A lossless data coding and hiding scheme for fingerprint templates
HU Xiaocheng;ZHANG Weiming;YU Nenghai
..............page:576-581
Security issues and solutions on social networks
LIU Jianwei;LI Weiyu;SUN Yu
..............page:565-575