计算机研究与发展
       ISSN 1000-1239   CN 11-1777/TP  
   RSS  Email Alert     
   
 
Nianqi Search Key words Adv search
33
2014 Vol. 51, No. 7
Published: 15 July 2014

   
 
1385 Survey of Android OS Security Hot!
Zhang Yuqing, Wang Kai, Yang Huan, Fang Zhejun, Wang Zhiqiang, and Cao Chen
2014 Vol. 51 (7): 1385-1396 [Abstract] ( 1885 ) HTML (1 KB)  PDF (1800 KB)  ( 1552 )
1397 Secure and Privacy-Preserving Data Storage Service in Public Cloud Hot!
Li Hui1, Sun Wenhai1, Li Fenghua2, and Wang Boyang1
2014 Vol. 51 (7): 1397-1409 [Abstract] ( 1293 ) HTML (1 KB)  PDF (1700 KB)  ( 1428 )
1410 Proofs of Data Possession of Multiple Copies
Fu Yanyan1, Zhang Min1, Chen Kaiqu2, and Feng Dengguo1
2014 Vol. 51 (7): 1410-1416 [Abstract] ( 603 ) HTML (1 KB)  PDF (1329 KB)  ( 686 )
1417 A Secure Electronic Document Self-Destructing Scheme in Cloud Computing
Yao Zhiqiang1,2, Xiong Jinbo2, Ma Jianfeng1, Li Qi1, and Liu Ximeng3
2014 Vol. 51 (7): 1417-1423 [Abstract] ( 553 ) HTML (1 KB)  PDF (948 KB)  ( 664 )
1424 CACDP: A Cryptographic Access Control for Dynamic Policy in Cloud Storage
Zhang Hao, Zhao Lei, Feng Bo, Yu Rongwei, and Liu Weijie
2014 Vol. 51 (7): 1424-1435 [Abstract] ( 513 ) HTML (1 KB)  PDF (2895 KB)  ( 718 )
1436 Research on Direct Anonymous Attestation Scheme Based on Trusted Mobile Platform
Yang Bo1,2, Feng Dengguo1, Qin Yu1, Zhang Qianying1,2, Xi Li1,2, and Zheng Changwen3
2014 Vol. 51 (7): 1436-1445 [Abstract] ( 693 ) HTML (1 KB)  PDF (1804 KB)  ( 686 )
1446 An Anti-Obfuscation Method for Detecting Similarity Among Android Applications in Large Scale
Jiao Sibei, Ying Lingyun, Yang Yi, Cheng Yao, Su Purui, and Feng Dengguo
2014 Vol. 51 (7): 1446-1457 [Abstract] ( 565 ) HTML (1 KB)  PDF (3534 KB)  ( 545 )
1458 Description of Android Malware Feature Based on Dalvik Instructions
Li Ting1, Dong Hang2, Yuan Chunyang1, Du Yuejin1, and Xu Guoai2
2014 Vol. 51 (7): 1458-1466 [Abstract] ( 512 ) HTML (1 KB)  PDF (2129 KB)  ( 797 )
1467 Modified Matrix Encoding Based on the Spatial Distortion Model and Its Improvement
Han Tao1,2, Zhu Yuefei1,2, Lin Sisi3, and Wu Yang1,2
2014 Vol. 51 (7): 1467-1475 [Abstract] ( 451 ) HTML (1 KB)  PDF (1906 KB)  ( 452 )
1476 A Distributed Rational Secret Sharing Scheme with Hybrid Preference Model
Peng Changgen1,2, Liu Hai1,2, Tian Youliang1,2,3, Lü Zhen1,2, and Liu Rongfei1,2
2014 Vol. 51 (7): 1476-1485 [Abstract] ( 443 ) HTML (1 KB)  PDF (963 KB)  ( 650 )
1486 A Secure Routing Protocol for MWNs Based on Cross-Layer Dynamic Reputation Mechanism
Lin Hui1, Ma Jianfeng2, and Xu Li1
2014 Vol. 51 (7): 1486-1496 [Abstract] ( 558 ) HTML (1 KB)  PDF (3722 KB)  ( 599 )
1497 Efficient and Provably-Secure Certificate-Based Key Encapsulation Mechanism in the Standard Model
Lu Yang and Li Jiguo
2014 Vol. 51 (7): 1497-1505 [Abstract] ( 451 ) HTML (1 KB)  PDF (821 KB)  ( 551 )
1506 RFID Lightweight Authentication Protocol Based on PRF
Jin Yongming1, Wu Qiying2, Shi Zhiqiang1, Lu Xiang1,3, and Sun Limin1
2014 Vol. 51 (7): 1506-1514 [Abstract] ( 485 ) HTML (1 KB)  PDF (1305 KB)  ( 732 )
1515 LWE Problem with Uniform Secret and Errors and Its Application
Sun Xiaochao, Li Bao, and Lu Xianhui
2014 Vol. 51 (7): 1515-1519 [Abstract] ( 700 ) HTML (1 KB)  PDF (536 KB)  ( 557 )
1520 Related-Key Impossible Differential Cryptanalysis on LBlock
Wei Hongru and Yin Guangli
2014 Vol. 51 (7): 1520-1526 [Abstract] ( 1262 ) HTML (1 KB)  PDF (714 KB)  ( 486 )
1527 Rational Fair Computation with Computational Sequential Equilibrium
Wang Yilei1,2, Zheng Zhihua3, Wang Hao3, and Xu Qiuliang2
2014 Vol. 51 (7): 1527-1537 [Abstract] ( 681 ) HTML (1 KB)  PDF (1412 KB)  ( 550 )
1538 A Tor Anonymous Communication System with Security Enhancements
Zhou Yanwei1,2, Yang Qiliang3, Yang Bo2, and Wu Zhenqiang1,2
2014 Vol. 51 (7): 1538-1546 [Abstract] ( 813 ) HTML (1 KB)  PDF (2134 KB)  ( 592 )
1547 Plaintext Recovery Based on Memory Dependence Measurement
Wei Qiang, Wu Zehui, and Wang Qingxian
2014 Vol. 51 (7): 1547-1554 [Abstract] ( 455 ) HTML (1 KB)  PDF (1623 KB)  ( 664 )
1555 Towards Analysis of Security in I2P’s Path Selection
Liu Peipeng1,2,3,4, Wang Lihong4, Shi Jinqiao2,4, and Tan Qingfeng2,4
2014 Vol. 51 (7): 1555-1564 [Abstract] ( 961 ) HTML (1 KB)  PDF (3223 KB)  ( 574 )
1565 Algorithm of Optimal Security Hardening Measures Against Insider Threat
Chen Xiaojun1,2,3, Shi Jinqiao2, Xu Fei2, Pu Yiguo2, and Guo Li2
2014 Vol. 51 (7): 1565-1577 [Abstract] ( 507 ) HTML (1 KB)  PDF (4441 KB)  ( 715 )
1578 UML-Based Modeling Method of Network Security Infrastructure
Bu Ning1, Liu Yuling2, Lian Yifeng2, and Huang Liang2
2014 Vol. 51 (7): 1578-1593 [Abstract] ( 590 ) HTML (1 KB)  PDF (4677 KB)  ( 645 )
1594 Multi-Addresses Amplification DoS Attacks by Native IPv6 and IPv6Tunnels
Cui Yu, Zhang Hongli, Tian Zhihong, and Fang Binxing
2014 Vol. 51 (7): 1594-1603 [Abstract] ( 451 ) HTML (1 KB)  PDF (2200 KB)  ( 436 )
1604 Action-Based Multi-level Access Control Model
Su Mang1, Li Fenghua2, and Shi Guozhen3
2014 Vol. 51 (7): 1604-1613 [Abstract] ( 615 ) HTML (1 KB)  PDF (2149 KB)  ( 653 )
1614 Sybil Group Attack Detection in Kad Network
Li Qiang1, Li Zhoujun1, Zhou Changbin1, and Yu Jie2
2014 Vol. 51 (7): 1614-1623 [Abstract] ( 526 ) HTML (1 KB)  PDF (2838 KB)  ( 448 )
1624 Detection of XSS Vulnerabilities in Online Flash
Liu Qixu1, Wen Tao2, and Wen Guanxing1
2014 Vol. 51 (7): 1624-1632 [Abstract] ( 650 ) HTML (1 KB)  PDF (1549 KB)  ( 648 )
1633 Security Architecture to Deal with APT Attacks: Abnormal Discovery
Du Yuejin1,2, Zhai Lidong1, Li Yue1, and Jia Zhaopeng1,3
2014 Vol. 51 (7): 1633-1645 [Abstract] ( 648 ) HTML (1 KB)  PDF (3141 KB)  ( 725 )
计算机研究与发展
·
·
·
·
·
·
·F5000
·
More....  
More....  
EI Village
China Computer Federation
Institute of Computing, Chinese Academy of Sciences
More....  
 
 
Copyright © Editorial Board of Journal of Computer Research and Development
Supported by:Beijing Magtech