topicissuevirtualTopic
    Top ViewTop Cited

        column
        A New Type Trusted Platform Module(TPM)
        ZHANG Huanguo, QIN Zhongping, LIU Yi, HAN Yongqiao
        2008, 33(10): 991-994.
        Abstract PDF
        Research on Key Technologies for Implementing Network Security Situation Awareness
        WANG Huiqiang, LAI Jibao, HU Mingming, LIANG Ying
        2008, 33(10): 995-998.
        Abstract PDF
        A Network Connection and Routing Model Based on Trust Theory
        WANG Lina, ZHAO Lei, GUO Chi, FANG Zhejun
        2008, 33(10): 999-1002.
        Abstract PDF
        A Compressible Threshold Image Sharing Scheme Based on Matrix Projection
        HOU Zhengfeng, GAO Hanjun, HAN Jianghong, HU Donghui
        2008, 33(10): 1003-1006.
        Abstract PDF
        Steganalysis Based on R-Farid High Order Statistic Model
        TANG Guangming, ZHANG Shishu
        2008, 33(10): 1007-1010.
        Abstract PDF
        A Novel Design of Trusted Platform Control Module
        ZHANG Xing, SHEN Changxiang
        2008, 33(10): 1011-1014.
        Abstract PDF
        Research of SMS4's Implementation in Hardware Based on Embedded System
        ZHAO Bo, XIONG Quan, HAN Bixia
        2008, 33(10): 1015-1017.
        Abstract PDF
        A Study of Software Fault Tolerance System Evaluation Strategy
        LIU Xin, YIN Qian, GUO Ping
        2008, 33(10): 1018-1021.
        Abstract PDF
        A Key Predistribution Scheme Based on Polynomial for HWSN
        MA Chunguang, GENG Guining, WANG Huiqiang, SHANG Zhiguo
        2008, 33(10): 1022-1025.
        Abstract PDF
        Study of Watermarking Nonnumeric Data in Relational Databases
        DONG Xiaomei, TIAN Yueping, LI Xiaohua, YU Ge
        2008, 33(10): 1026-1029.
        Abstract PDF
        Blind Detection of Image Splicing Based on Image Quality Metrics and Hidden Markov Model
        ZHANG Zhen, REN Yuan, PING Xijian, KANG Jiquan
        2008, 33(10): 1030-1033.
        Abstract PDF
        SmartMK:TPM-based Trusted Multi-Kernel Operating System Architecture
        CHEN Wenzhi, HUANG Wei
        2008, 33(10): 1034-1037.
        Abstract PDF
        Multi-Pattern Matching Algorithm for Web Resource Access Control Decision
        SHAN Dibin, CHEN Xingyuan, ZHANG Bin
        2008, 33(10): 1038-1041.
        Abstract PDF
        Energy-efficient Secure Topology Control Protocol for Wireless Sensor Networks
        WANG Xinsheng, ZHAN Yongzhao, WANG Liangmin
        2008, 33(10): 1042-1045.
        Abstract PDF
        An Efficient and Scalable Fault Detection Algorithm for Grid Systems
        JI Xiaobo, CHEN Shuyu, TIAN Dong, WANG Rongbin
        2008, 33(10): 1046-1050.
        Abstract PDF
        A Universal Provable Security Authentication Protocol for Multi-Domain
        ZHU Hui, LI Hui, YANG Jiaxi, WANG Yumin
        2008, 33(10): 1051-1054.
        Abstract PDF
        Active Defense Model for Network Intrusion Based on Immune Multi-Agent
        LIU Sunjun, WANG Diangang, YANG Pin, ZHANG Jianhua
        2008, 33(10): 1055-1058.
        Abstract PDF
        Active Steganalysis for Stego-image Based on HMT and ICA
        LIU Xiaoqin, WANG Jiazhen, XU Bo, DENG Gaoming
        2008, 33(10): 1059-1061.
        Abstract PDF
        Software Download Framework Based on Trust Measurement
        LI Jian, HE Yongzhong, XU Kaiyong
        2008, 33(10): 1062-1066.
        Abstract PDF
        Research on TPM Based on State Machine Theory
        ZHAN Jing, ZHANG Huanguo, XU Shiwei, XIANG Shuang
        2008, 33(10): 1067-1069.
        Abstract PDF
        Security Digital Watermarking Schemes Based on Structured Code
        HAO Yanjun, WANG Lina, ZHANG Huanguo
        2008, 33(10): 1070-1072.
        Abstract PDF
        A Secure Mutual Password Authentication Scheme with User Anonymity
        WANG Bangju, ZHANG Huanguo, WANG Zhangyi, WANG Yuhua
        2008, 33(10): 1073-1075.
        Abstract PDF
        Provable Secure Identity Based Signature Scheme in the Standard Model
        ZHANG Leyou, HU Yupu
        2008, 33(10): 1076-1079.
        Abstract PDF
        Subjective Trust Control in Attribute Based Delegation Authorization Logical System
        CHEN Bo, ZENG Guosun, LI Li
        2008, 33(10): 1080-1083.
        Abstract PDF
        Design of a Symmetric Image Encryption Algorithm Based on Complex Chaotic Sequence
        GUO Jindi, ZHOU Yanzhou
        2008, 33(10): 1084-1087.
        Abstract PDF
        Difference Timing Attack Against AES Based on Cache Timing Character
        DENG Gaoming, ZHANG Peng, ZHAO Qiang, LIU Xiaoqin
        2008, 33(10): 1088-1091.
        Abstract PDF
        Research of Terminal Security Model Based on Noninterference
        WANG Fei, LIU Yi, LI Yong
        2008, 33(10): 1092-1094.
        Abstract PDF
        Quantitative Evaluation Model for Survivability in MANETs
        PENG Sancheng, JIA Weijia, WANG Guojun
        2008, 33(10): 1095-1098.
        Abstract PDF
        • All visit::
        • Today's visit::