column
Design of Trust Base in Operating Systems
SHI Wenchang
2010, 35(5): 505-508.
Abstract PDF
A Framework for Key Management in Heterogeneous Sensor Networks
MA Chunguang, CHU Zhenjiang, WANG Jiuru, WANG Huiqiang
2010, 35(5): 509-511.
Abstract PDF
A QoS Based Fault-Tolerant Topology Control Algorithm for Ad Hoc Network
WANG Dong, LI Fa, LI Xiaohong
2010, 35(5): 512-515.
Abstract PDF
A Data Dispersal Algorithm Based on Key Policies
YANG Xiaoyuan, ZHU Shuaishuai, ZHANG Wei
2010, 35(5): 516-519.
Abstract PDF
Application KCFM to Detect New P2P Botnet Based on Multi-Observed Sequence
KANG Jian, SONG Yuanzhang
2010, 35(5): 520-523.
Abstract PDF
A Trust Evaluation Model Based on Multiple Services Attributes
DU Ruizhong, YANG Xiaohui, TIAN Junfeng
2010, 35(5): 524-527.
Abstract PDF
A New Image Encryption Algorithm Based on Multiple Chaotic Maps and Output-Feedback
ZHU Congxu, HUANG Dazu, GUO Ying
2010, 35(5): 528-531.
Abstract PDF
Recursion Multi-service Cross-layer Flow Control Algorithm of Broadband GEO Satellite Networks
HE Ning, WANG Lei
2010, 35(5): 532-536.
Abstract PDF
A DTE-based Security Domain Model for the Attestation System
SHI Guangyuan, GONG Bei, FENG Yumeng, YUE Shaoyuan
2010, 35(5): 537-541.
Abstract PDF
A Trustworthiness Self-Adaptive Evaluation Model Oriented to Software Evolution
DING Shuai, YANG Shanlin, MA Xijun, KAN Hongxing
2010, 35(5): 542-545.
Abstract PDF
Chosen-plaintext Attack on a Chaotic Image Cipher
LIU Ting, MIN Lequan
2010, 35(5): 546-549.
Abstract PDF
Lattice-based Blind Signature Schemes
WANG Fenghe, HU Yupu, WANG Chunxiao
2010, 35(5): 550-553.
Abstract PDF
A Dynamic Monitoring Approach for Component Security Testing
CHEN Jinfu, WEN Xianxin, YANG Hebiao
2010, 35(5): 554-557.
Abstract PDF
Design of Cross-Correlation Test Algorithm on S-Box
GAO Sheng, MA Wenping, GUO Na, CHEN Qiuli
2010, 35(5): 558-561.
Abstract PDF
Fault-proneness Prediction of Software Modules
LUO Yunfeng, PU Jie, BEN Kerong
2010, 35(5): 562-565.
Abstract PDF
Multi-output LFSR Based Uniform Pseudo Random Number Generator
GU Xiaochen, ZHANG Minxuan
2010, 35(5): 566-569.
Abstract PDF
Employment of Program Annotations in Trusted Code and Their Type Verification
ZHAO Yang, XU Xiaogang, ZHANG Gongxuan, ZHANG Rong
2010, 35(5): 570-573.
Abstract PDF
Certificateless Authentication Protocol Without Pairing
ZHU Hui, LI Hui, TAN Shichong, WANG Yumin
2010, 35(5): 574-577.
Abstract PDF
Online Botnet Detection Techniques
YU Xiaocong, DONG Xiaomei, YU Ge, QIN Yuhai
2010, 35(5): 578-581.
Abstract PDF
An Identity-based Authenticated Key Agreement Sheme for Heterogeneous Sensor Networks
FU Xiaojing, ZHANG Guoyin, MA Chunguang
2010, 35(5): 582-586.
Abstract PDF
Quantitative Assignment of the Grid Behavior Trust Model Based on Trusted Computing
LIU Lizhao, WEI Peng, WANG Ying, LI Maoqing
2010, 35(5): 587-590.
Abstract PDF
Two Efficient CPK-based Group Key Transfer Protocols
DENG Shaofeng, DENG Fan, ZHANG Wenzheng, LI Yifa
2010, 35(5): 591-594.
Abstract PDF
Impossible Differential Cryptanalysis on 8-round AES-256
DONG Xiaoli, HU Yupu, CHEN Jie
2010, 35(5): 595-598.
Abstract PDF
Analysis and Improvement of Delegation Mechanism in a Trusted Computing Platform
HUANG Ningyu, ZHANG Xing
2010, 35(5): 599-602.
Abstract PDF
A Standardized Method of Security Protocol Design
DENG Fan, LI Yifa, ZHANG Wenzheng
2010, 35(5): 603-606.
Abstract PDF
Analysis and Implementation of Trusted Node and Trusted Routing in Vehicular Ad-Hoc Network
DENG Junyi, LIU Yanheng, WANG Jian
2010, 35(5): 607-609.
Abstract PDF
An Epidemic Model of Mobile Phone Bluetooth Virus with Mobile Nodes
QIU Guoli, JIANG Guoping, SONG Yurong
2010, 35(5): 610-613.
Abstract PDF
Trust Valuation Based Anonymous Authenticated Routing Protocol
LI Xiaoqing, LI Hui, ZHU Hui, MA Janfeng
2010, 35(5): 614-617.
Abstract PDF
Design of Compatibility Scheme on TCM Software Stack
ZHANG Xing, HUANG Ningyu, ZHU Lu
2010, 35(5): 618-621.
Abstract PDF
A Botnet Migration Analyzer Based on the C-F Model
ZANG Tianning, YUN Xiaochun, ZHANG Yongzheng, MEN Chaoguang
2010, 35(5): 622-625.
Abstract PDF
A Embedded System-based Computing Platform for Tolerating Untrusted Component
GAO Li, QIN Xi, CHANG Chaowen, CHEN Xin
2010, 35(5): 626-629.
Abstract PDF