column
A New Type Trusted Platform Module(TPM)
ZHANG Huanguo, QIN Zhongping, LIU Yi, HAN Yongqiao
2008, 33(10): 991-994.
Abstract PDF
Research on Key Technologies for Implementing Network Security Situation Awareness
WANG Huiqiang, LAI Jibao, HU Mingming, LIANG Ying
2008, 33(10): 995-998.
Abstract PDF
A Network Connection and Routing Model Based on Trust Theory
WANG Lina, ZHAO Lei, GUO Chi, FANG Zhejun
2008, 33(10): 999-1002.
Abstract PDF
A Compressible Threshold Image Sharing Scheme Based on Matrix Projection
HOU Zhengfeng, GAO Hanjun, HAN Jianghong, HU Donghui
2008, 33(10): 1003-1006.
Abstract PDF
Steganalysis Based on R-Farid High Order Statistic Model
TANG Guangming, ZHANG Shishu
2008, 33(10): 1007-1010.
Abstract PDF
A Novel Design of Trusted Platform Control Module
ZHANG Xing, SHEN Changxiang
2008, 33(10): 1011-1014.
Abstract PDF
Research of SMS4's Implementation in Hardware Based on Embedded System
ZHAO Bo, XIONG Quan, HAN Bixia
2008, 33(10): 1015-1017.
Abstract PDF
A Study of Software Fault Tolerance System Evaluation Strategy
LIU Xin, YIN Qian, GUO Ping
2008, 33(10): 1018-1021.
Abstract PDF
A Key Predistribution Scheme Based on Polynomial for HWSN
MA Chunguang, GENG Guining, WANG Huiqiang, SHANG Zhiguo
2008, 33(10): 1022-1025.
Abstract PDF
Study of Watermarking Nonnumeric Data in Relational Databases
DONG Xiaomei, TIAN Yueping, LI Xiaohua, YU Ge
2008, 33(10): 1026-1029.
Abstract PDF
Blind Detection of Image Splicing Based on Image Quality Metrics and Hidden Markov Model
ZHANG Zhen, REN Yuan, PING Xijian, KANG Jiquan
2008, 33(10): 1030-1033.
Abstract PDF
SmartMK:TPM-based Trusted Multi-Kernel Operating System Architecture
CHEN Wenzhi, HUANG Wei
2008, 33(10): 1034-1037.
Abstract PDF
Multi-Pattern Matching Algorithm for Web Resource Access Control Decision
SHAN Dibin, CHEN Xingyuan, ZHANG Bin
2008, 33(10): 1038-1041.
Abstract PDF
Energy-efficient Secure Topology Control Protocol for Wireless Sensor Networks
WANG Xinsheng, ZHAN Yongzhao, WANG Liangmin
2008, 33(10): 1042-1045.
Abstract PDF
An Efficient and Scalable Fault Detection Algorithm for Grid Systems
JI Xiaobo, CHEN Shuyu, TIAN Dong, WANG Rongbin
2008, 33(10): 1046-1050.
Abstract PDF
A Universal Provable Security Authentication Protocol for Multi-Domain
ZHU Hui, LI Hui, YANG Jiaxi, WANG Yumin
2008, 33(10): 1051-1054.
Abstract PDF
Active Defense Model for Network Intrusion Based on Immune Multi-Agent
LIU Sunjun, WANG Diangang, YANG Pin, ZHANG Jianhua
2008, 33(10): 1055-1058.
Abstract PDF
Active Steganalysis for Stego-image Based on HMT and ICA
LIU Xiaoqin, WANG Jiazhen, XU Bo, DENG Gaoming
2008, 33(10): 1059-1061.
Abstract PDF
Software Download Framework Based on Trust Measurement
LI Jian, HE Yongzhong, XU Kaiyong
2008, 33(10): 1062-1066.
Abstract PDF
Research on TPM Based on State Machine Theory
ZHAN Jing, ZHANG Huanguo, XU Shiwei, XIANG Shuang
2008, 33(10): 1067-1069.
Abstract PDF
Security Digital Watermarking Schemes Based on Structured Code
HAO Yanjun, WANG Lina, ZHANG Huanguo
2008, 33(10): 1070-1072.
Abstract PDF
A Secure Mutual Password Authentication Scheme with User Anonymity
WANG Bangju, ZHANG Huanguo, WANG Zhangyi, WANG Yuhua
2008, 33(10): 1073-1075.
Abstract PDF
Provable Secure Identity Based Signature Scheme in the Standard Model
ZHANG Leyou, HU Yupu
2008, 33(10): 1076-1079.
Abstract PDF
Subjective Trust Control in Attribute Based Delegation Authorization Logical System
CHEN Bo, ZENG Guosun, LI Li
2008, 33(10): 1080-1083.
Abstract PDF
Design of a Symmetric Image Encryption Algorithm Based on Complex Chaotic Sequence
GUO Jindi, ZHOU Yanzhou
2008, 33(10): 1084-1087.
Abstract PDF
Difference Timing Attack Against AES Based on Cache Timing Character
DENG Gaoming, ZHANG Peng, ZHAO Qiang, LIU Xiaoqin
2008, 33(10): 1088-1091.
Abstract PDF
Research of Terminal Security Model Based on Noninterference
WANG Fei, LIU Yi, LI Yong
2008, 33(10): 1092-1094.
Abstract PDF
Quantitative Evaluation Model for Survivability in MANETs
PENG Sancheng, JIA Weijia, WANG Guojun
2008, 33(10): 1095-1098.
Abstract PDF