计算机研究与发展
       ISSN 1000-1239   CN 11-1777/TP  
   RSS  Email Alert     
   
 
Nianqi Search Key words Adv search
33
2011 Vol. 48, No. 8
Published: 15 August 2011

   
 
       Paper
1315 Survey of Botnets
Fang Binxing, Cui Xiang, and Wang Wei
2011 Vol. 48 (8): 1315-1331 [Abstract] ( 438 ) HTML (1 KB)  PDF (2257 KB)  ( 442 )
1332 Research on Trusted Computing Technology
Feng Dengguo, Qin Yu, Wang Dan, and Chu Xiaobo
2011 Vol. 48 (8): 1332-1349 [Abstract] ( 744 ) HTML (1 KB)  PDF (2535 KB)  ( 1222 )
1350 An Efficient ID-Based Verifiably Encrypted Signature Scheme
Zhou Yousheng, Sun Yanbin, Qing Sihan,, and Yang Yixian
2011 Vol. 48 (8): 1350-1356 [Abstract] ( 438 ) HTML (1 KB)  PDF (729 KB)  ( 330 )
1357 A New Construction of Short Hierarchical Identity-Based Signature in the Standard Model
Wu Qing, Zhang Leyou, and Hu Yupu
2011 Vol. 48 (8): 1357-1362 [Abstract] ( 269 ) HTML (1 KB)  PDF (658 KB)  ( 325 )
1363 Multiple-Authority-Key Functional Encryption: A M-KP-ABE Scheme Based on LMSSS
Yang Xiaoyuan, Cai Weiyi, and Chen Haibin
2011 Vol. 48 (8): 1363-1369 [Abstract] ( 596 ) HTML (1 KB)  PDF (759 KB)  ( 405 )
1370 Analysis for Probabilistic and Timed Information Flow Security Properties via ptSPA
Li Chao, Yin Lihua, and Guo Yunchuan,
2011 Vol. 48 (8): 1370-1380 [Abstract] ( 331 ) HTML (1 KB)  PDF (1211 KB)  ( 376 )
1381 Algorithmic Complexity Attacks Against WuManber
Zhang Yu, Liu Ping, Liu Yanbing, Tan Jianlong, and Guo Li
2011 Vol. 48 (8): 1381-1389 [Abstract] ( 469 ) HTML (1 KB)  PDF (1892 KB)  ( 310 )
1390 A Modular Approach Towards Design and Analysis of Authenticated Key Exchange Protocol Based on Extended Canetti-Krawczyk Model
Pan Jiaxin and Wang Libin
2011 Vol. 48 (8): 1390-1399 [Abstract] ( 486 ) HTML (1 KB)  PDF (1024 KB)  ( 330 )
1400 Ownership Transfer Protocol for RFID Tag
Jin Yongming, Sun Huiping, Guan Zhi, and Chen Zhong
2011 Vol. 48 (8): 1400-1405 [Abstract] ( 397 ) HTML (1 KB)  PDF (919 KB)  ( 489 )
1406 A Secure Routing Protocol Based on D-S Evidence Theory in Ad Hoc Networks
Li Xiaoqing, Li Hui, Yang Kai, and Ma Jianfeng
2011 Vol. 48 (8): 1406-1413 [Abstract] ( 250 ) HTML (1 KB)  PDF (983 KB)  ( 359 )
1414 TRBAC: Trust Based Access Control Model
Liu Wu, Duan Haixin, Zhang Hong, Ren Ping, and Wu Jianping
2011 Vol. 48 (8): 1414-1420 [Abstract] ( 527 ) HTML (1 KB)  PDF (1081 KB)  ( 543 )
1421 Formal Security Analysis on Trusted Platform Module Based on Applied π Calculus
Xu Shiwei, and Zhang Huanguo,
2011 Vol. 48 (8): 1421-1429 [Abstract] ( 386 ) HTML (1 KB)  PDF (935 KB)  ( 331 )
1430 Static Analysis of TOCTTOU Vulnerabilities in Unix-Style File System
Han Wei, and He Yeping
2011 Vol. 48 (8): 1430-1437 [Abstract] ( 631 ) HTML (1 KB)  PDF (832 KB)  ( 306 )
1438 Software Integrity Verification Based on VMM-Level System Call Analysis Technique
Li Bo, Li Jianxin, Hu Chunming, Wo Tianyu, and Huai Jinpeng
2011 Vol. 48 (8): 1438-1446 [Abstract] ( 445 ) HTML (1 KB)  PDF (1692 KB)  ( 444 )
1447 An Design Approach of Trustworthy Software and Its Trustworthiness Evaluation
Tian Junfeng, Li Zhen, and Liu Yuling
2011 Vol. 48 (8): 1447-1454 [Abstract] ( 318 ) HTML (1 KB)  PDF (2160 KB)  ( 361 )
1455 Detecting the Vulnerability Pattern of Writing Tainted Value to Tainted Address
Hu Chaojian, Li Zhoujun, Guo Tao, and Shi Zhiwei
2011 Vol. 48 (8): 1455-1463 [Abstract] ( 356 ) HTML (1 KB)  PDF (1029 KB)  ( 402 )
1464 Trusted Dynamic Measurement Based on Interactive Markov Chains
Zhuang Lu, Cai Mian, and Shen Changxiang
2011 Vol. 48 (8): 1464-1472 [Abstract] ( 291 ) HTML (1 KB)  PDF (984 KB)  ( 476 )
1473 GoodRep Attack and Defense in P2P Reputation Systems
Feng Jingyu, Zhang Yuqing, Chen Shenlong, and Fu Anmin,
2011 Vol. 48 (8): 1473-1480 [Abstract] ( 301 ) HTML (1 KB)  PDF (1218 KB)  ( 325 )
1481 A Secure Routing Scheme for Opportunistic Networks Based on Identity-Based Encryption
Chen Xi, and Ma Jianfeng
2011 Vol. 48 (8): 1481-1487 [Abstract] ( 496 ) HTML (1 KB)  PDF (988 KB)  ( 467 )
1488 MRRbot: A Multi-Role and Redundancy-Based P2P Botnet Model
Li Shuhao, Yun Xiaochun, Hao Zhiyu, and Zhai Lidong
2011 Vol. 48 (8): 1488-1496 [Abstract] ( 401 ) HTML (1 KB)  PDF (2187 KB)  ( 439 )
1497 Analysis of Attack Graphs Based on Network Flow Method
Wu Jinyu, Jin Shuyuan, and Yang Zhi,
2011 Vol. 48 (8): 1497-1505 [Abstract] ( 339 ) HTML (1 KB)  PDF (1508 KB)  ( 479 )
1506 Anomaly Detection Using Multi-Level and Multi-Dimensional Analyzing of Network Traffic
Zheng Liming, Zou Peng, and Jia Yan
2011 Vol. 48 (8): 1506-1516 [Abstract] ( 355 ) HTML (1 KB)  PDF (1628 KB)  ( 605 )
1517 An Algorithm Based on LRU and SCBF for Elephant Flows Identification and Its Application in DDoS Defense
Xie Dongqing, Zhou Zaihong, and Luo Jiawei
2011 Vol. 48 (8): 1517-1523 [Abstract] ( 489 ) HTML (1 KB)  PDF (1166 KB)  ( 429 )
1524 An Authorization Model and Implementation for Vector Data in Spatial DBMS
Zhang Desheng, Feng Dengguo, and Chen Chi
2011 Vol. 48 (8): 1524-1533 [Abstract] ( 283 ) HTML (1 KB)  PDF (2264 KB)  ( 297 )
1534 Detecting and Managing Hidden Process via Hypervisor
Wang Lina, Gao Hanjun, Liu Wei, and Peng Yang,
2011 Vol. 48 (8): 1534-1541 [Abstract] ( 704 ) HTML (1 KB)  PDF (2714 KB)  ( 460 )
1542 Detecion Approach for Covert Channel Based on Concurrency Conflict Interval Time
Wang Yongji, Wu Jingzheng, Ding Liping, and Zeng Haitao
2011 Vol. 48 (8): 1542-1553 [Abstract] ( 402 ) HTML (1 KB)  PDF (2800 KB)  ( 304 )
1554 The Research and Application of a Specific Instruction Processor for AES
Xia Hui, Jia Zhiping, Zhang Feng, Li Xin, Chen Renhai, and Edwin H.-M. Sha
2011 Vol. 48 (8): 1554-1562 [Abstract] ( 356 ) HTML (1 KB)  PDF (964 KB)  ( 494 )
1563 Histograms Difference and Quantitative Steganalysis of JPEG Steganography Based on Relative Entropy
Yang Chunfang, Liu Fenlin, and Luo Xiangyang
2011 Vol. 48 (8): 1563-1569 [Abstract] ( 464 ) HTML (1 KB)  PDF (701 KB)  ( 330 )
计算机研究与发展
·
·
·
·
·
·
·F5000
·
More....  
More....  
EI Village
China Computer Federation
Institute of Computing, Chinese Academy of Sciences
More....  
 
 
Copyright © Editorial Board of Journal of Computer Research and Development
Supported by:Beijing Magtech