topicissuevirtualTopic
    Top ViewTop Cited

        column
        Design of Trust Base in Operating Systems
        SHI Wenchang
        2010, 35(5): 505-508.
        Abstract PDF
        A Framework for Key Management in Heterogeneous Sensor Networks
        MA Chunguang, CHU Zhenjiang, WANG Jiuru, WANG Huiqiang
        2010, 35(5): 509-511.
        Abstract PDF
        A QoS Based Fault-Tolerant Topology Control Algorithm for Ad Hoc Network
        WANG Dong, LI Fa, LI Xiaohong
        2010, 35(5): 512-515.
        Abstract PDF
        A Data Dispersal Algorithm Based on Key Policies
        YANG Xiaoyuan, ZHU Shuaishuai, ZHANG Wei
        2010, 35(5): 516-519.
        Abstract PDF
        Application KCFM to Detect New P2P Botnet Based on Multi-Observed Sequence
        KANG Jian, SONG Yuanzhang
        2010, 35(5): 520-523.
        Abstract PDF
        A Trust Evaluation Model Based on Multiple Services Attributes
        DU Ruizhong, YANG Xiaohui, TIAN Junfeng
        2010, 35(5): 524-527.
        Abstract PDF
        A New Image Encryption Algorithm Based on Multiple Chaotic Maps and Output-Feedback
        ZHU Congxu, HUANG Dazu, GUO Ying
        2010, 35(5): 528-531.
        Abstract PDF
        Recursion Multi-service Cross-layer Flow Control Algorithm of Broadband GEO Satellite Networks
        HE Ning, WANG Lei
        2010, 35(5): 532-536.
        Abstract PDF
        A DTE-based Security Domain Model for the Attestation System
        SHI Guangyuan, GONG Bei, FENG Yumeng, YUE Shaoyuan
        2010, 35(5): 537-541.
        Abstract PDF
        A Trustworthiness Self-Adaptive Evaluation Model Oriented to Software Evolution
        DING Shuai, YANG Shanlin, MA Xijun, KAN Hongxing
        2010, 35(5): 542-545.
        Abstract PDF
        Chosen-plaintext Attack on a Chaotic Image Cipher
        LIU Ting, MIN Lequan
        2010, 35(5): 546-549.
        Abstract PDF
        Lattice-based Blind Signature Schemes
        WANG Fenghe, HU Yupu, WANG Chunxiao
        2010, 35(5): 550-553.
        Abstract PDF
        A Dynamic Monitoring Approach for Component Security Testing
        CHEN Jinfu, WEN Xianxin, YANG Hebiao
        2010, 35(5): 554-557.
        Abstract PDF
        Design of Cross-Correlation Test Algorithm on S-Box
        GAO Sheng, MA Wenping, GUO Na, CHEN Qiuli
        2010, 35(5): 558-561.
        Abstract PDF
        Fault-proneness Prediction of Software Modules
        LUO Yunfeng, PU Jie, BEN Kerong
        2010, 35(5): 562-565.
        Abstract PDF
        Multi-output LFSR Based Uniform Pseudo Random Number Generator
        GU Xiaochen, ZHANG Minxuan
        2010, 35(5): 566-569.
        Abstract PDF
        Employment of Program Annotations in Trusted Code and Their Type Verification
        ZHAO Yang, XU Xiaogang, ZHANG Gongxuan, ZHANG Rong
        2010, 35(5): 570-573.
        Abstract PDF
        Certificateless Authentication Protocol Without Pairing
        ZHU Hui, LI Hui, TAN Shichong, WANG Yumin
        2010, 35(5): 574-577.
        Abstract PDF
        Online Botnet Detection Techniques
        YU Xiaocong, DONG Xiaomei, YU Ge, QIN Yuhai
        2010, 35(5): 578-581.
        Abstract PDF
        An Identity-based Authenticated Key Agreement Sheme for Heterogeneous Sensor Networks
        FU Xiaojing, ZHANG Guoyin, MA Chunguang
        2010, 35(5): 582-586.
        Abstract PDF
        Quantitative Assignment of the Grid Behavior Trust Model Based on Trusted Computing
        LIU Lizhao, WEI Peng, WANG Ying, LI Maoqing
        2010, 35(5): 587-590.
        Abstract PDF
        Two Efficient CPK-based Group Key Transfer Protocols
        DENG Shaofeng, DENG Fan, ZHANG Wenzheng, LI Yifa
        2010, 35(5): 591-594.
        Abstract PDF
        Impossible Differential Cryptanalysis on 8-round AES-256
        DONG Xiaoli, HU Yupu, CHEN Jie
        2010, 35(5): 595-598.
        Abstract PDF
        Analysis and Improvement of Delegation Mechanism in a Trusted Computing Platform
        HUANG Ningyu, ZHANG Xing
        2010, 35(5): 599-602.
        Abstract PDF
        A Standardized Method of Security Protocol Design
        DENG Fan, LI Yifa, ZHANG Wenzheng
        2010, 35(5): 603-606.
        Abstract PDF
        Analysis and Implementation of Trusted Node and Trusted Routing in Vehicular Ad-Hoc Network
        DENG Junyi, LIU Yanheng, WANG Jian
        2010, 35(5): 607-609.
        Abstract PDF
        An Epidemic Model of Mobile Phone Bluetooth Virus with Mobile Nodes
        QIU Guoli, JIANG Guoping, SONG Yurong
        2010, 35(5): 610-613.
        Abstract PDF
        Trust Valuation Based Anonymous Authenticated Routing Protocol
        LI Xiaoqing, LI Hui, ZHU Hui, MA Janfeng
        2010, 35(5): 614-617.
        Abstract PDF
        Design of Compatibility Scheme on TCM Software Stack
        ZHANG Xing, HUANG Ningyu, ZHU Lu
        2010, 35(5): 618-621.
        Abstract PDF
        A Botnet Migration Analyzer Based on the C-F Model
        ZANG Tianning, YUN Xiaochun, ZHANG Yongzheng, MEN Chaoguang
        2010, 35(5): 622-625.
        Abstract PDF
        A Embedded System-based Computing Platform for Tolerating Untrusted Component
        GAO Li, QIN Xi, CHANG Chaowen, CHEN Xin
        2010, 35(5): 626-629.
        Abstract PDF
        • All visit::
        • Today's visit::