计算机研究与发展
       ISSN 1000-1239   CN 11-1777/TP  
   RSS  Email Alert     
   
 
Nianqi Search Key words Adv search
33
2014 Vol. 51, No. 7
Published: 15 July 2014

   
 
1385 Survey of Android OS Security Hot!
Zhang Yuqing, Wang Kai, Yang Huan, Fang Zhejun, Wang Zhiqiang, and Cao Chen
2014 Vol. 51 (7): 1385-1396 [Abstract] ( 1916 ) HTML (1 KB)  PDF (1800 KB)  ( 1576 )
1397 Secure and Privacy-Preserving Data Storage Service in Public Cloud Hot!
Li Hui1, Sun Wenhai1, Li Fenghua2, and Wang Boyang1
2014 Vol. 51 (7): 1397-1409 [Abstract] ( 1309 ) HTML (1 KB)  PDF (1700 KB)  ( 1456 )
1410 Proofs of Data Possession of Multiple Copies
Fu Yanyan1, Zhang Min1, Chen Kaiqu2, and Feng Dengguo1
2014 Vol. 51 (7): 1410-1416 [Abstract] ( 628 ) HTML (1 KB)  PDF (1329 KB)  ( 706 )
1417 A Secure Electronic Document Self-Destructing Scheme in Cloud Computing
Yao Zhiqiang1,2, Xiong Jinbo2, Ma Jianfeng1, Li Qi1, and Liu Ximeng3
2014 Vol. 51 (7): 1417-1423 [Abstract] ( 582 ) HTML (1 KB)  PDF (948 KB)  ( 683 )
1424 CACDP: A Cryptographic Access Control for Dynamic Policy in Cloud Storage
Zhang Hao, Zhao Lei, Feng Bo, Yu Rongwei, and Liu Weijie
2014 Vol. 51 (7): 1424-1435 [Abstract] ( 544 ) HTML (1 KB)  PDF (2895 KB)  ( 753 )
1436 Research on Direct Anonymous Attestation Scheme Based on Trusted Mobile Platform
Yang Bo1,2, Feng Dengguo1, Qin Yu1, Zhang Qianying1,2, Xi Li1,2, and Zheng Changwen3
2014 Vol. 51 (7): 1436-1445 [Abstract] ( 739 ) HTML (1 KB)  PDF (1804 KB)  ( 708 )
1446 An Anti-Obfuscation Method for Detecting Similarity Among Android Applications in Large Scale
Jiao Sibei, Ying Lingyun, Yang Yi, Cheng Yao, Su Purui, and Feng Dengguo
2014 Vol. 51 (7): 1446-1457 [Abstract] ( 619 ) HTML (1 KB)  PDF (3534 KB)  ( 581 )
1458 Description of Android Malware Feature Based on Dalvik Instructions
Li Ting1, Dong Hang2, Yuan Chunyang1, Du Yuejin1, and Xu Guoai2
2014 Vol. 51 (7): 1458-1466 [Abstract] ( 543 ) HTML (1 KB)  PDF (2129 KB)  ( 829 )
1467 Modified Matrix Encoding Based on the Spatial Distortion Model and Its Improvement
Han Tao1,2, Zhu Yuefei1,2, Lin Sisi3, and Wu Yang1,2
2014 Vol. 51 (7): 1467-1475 [Abstract] ( 494 ) HTML (1 KB)  PDF (1906 KB)  ( 476 )
1476 A Distributed Rational Secret Sharing Scheme with Hybrid Preference Model
Peng Changgen1,2, Liu Hai1,2, Tian Youliang1,2,3, Lü Zhen1,2, and Liu Rongfei1,2
2014 Vol. 51 (7): 1476-1485 [Abstract] ( 459 ) HTML (1 KB)  PDF (963 KB)  ( 670 )
1486 A Secure Routing Protocol for MWNs Based on Cross-Layer Dynamic Reputation Mechanism
Lin Hui1, Ma Jianfeng2, and Xu Li1
2014 Vol. 51 (7): 1486-1496 [Abstract] ( 586 ) HTML (1 KB)  PDF (3722 KB)  ( 629 )
1497 Efficient and Provably-Secure Certificate-Based Key Encapsulation Mechanism in the Standard Model
Lu Yang and Li Jiguo
2014 Vol. 51 (7): 1497-1505 [Abstract] ( 462 ) HTML (1 KB)  PDF (821 KB)  ( 572 )
1506 RFID Lightweight Authentication Protocol Based on PRF
Jin Yongming1, Wu Qiying2, Shi Zhiqiang1, Lu Xiang1,3, and Sun Limin1
2014 Vol. 51 (7): 1506-1514 [Abstract] ( 513 ) HTML (1 KB)  PDF (1305 KB)  ( 771 )
1515 LWE Problem with Uniform Secret and Errors and Its Application
Sun Xiaochao, Li Bao, and Lu Xianhui
2014 Vol. 51 (7): 1515-1519 [Abstract] ( 753 ) HTML (1 KB)  PDF (536 KB)  ( 575 )
1520 Related-Key Impossible Differential Cryptanalysis on LBlock
Wei Hongru and Yin Guangli
2014 Vol. 51 (7): 1520-1526 [Abstract] ( 1282 ) HTML (1 KB)  PDF (714 KB)  ( 498 )
1527 Rational Fair Computation with Computational Sequential Equilibrium
Wang Yilei1,2, Zheng Zhihua3, Wang Hao3, and Xu Qiuliang2
2014 Vol. 51 (7): 1527-1537 [Abstract] ( 704 ) HTML (1 KB)  PDF (1412 KB)  ( 564 )
1538 A Tor Anonymous Communication System with Security Enhancements
Zhou Yanwei1,2, Yang Qiliang3, Yang Bo2, and Wu Zhenqiang1,2
2014 Vol. 51 (7): 1538-1546 [Abstract] ( 890 ) HTML (1 KB)  PDF (2134 KB)  ( 617 )
1547 Plaintext Recovery Based on Memory Dependence Measurement
Wei Qiang, Wu Zehui, and Wang Qingxian
2014 Vol. 51 (7): 1547-1554 [Abstract] ( 492 ) HTML (1 KB)  PDF (1623 KB)  ( 681 )
1555 Towards Analysis of Security in I2P’s Path Selection
Liu Peipeng1,2,3,4, Wang Lihong4, Shi Jinqiao2,4, and Tan Qingfeng2,4
2014 Vol. 51 (7): 1555-1564 [Abstract] ( 984 ) HTML (1 KB)  PDF (3223 KB)  ( 606 )
1565 Algorithm of Optimal Security Hardening Measures Against Insider Threat
Chen Xiaojun1,2,3, Shi Jinqiao2, Xu Fei2, Pu Yiguo2, and Guo Li2
2014 Vol. 51 (7): 1565-1577 [Abstract] ( 513 ) HTML (1 KB)  PDF (4441 KB)  ( 745 )
1578 UML-Based Modeling Method of Network Security Infrastructure
Bu Ning1, Liu Yuling2, Lian Yifeng2, and Huang Liang2
2014 Vol. 51 (7): 1578-1593 [Abstract] ( 604 ) HTML (1 KB)  PDF (4677 KB)  ( 652 )
1594 Multi-Addresses Amplification DoS Attacks by Native IPv6 and IPv6Tunnels
Cui Yu, Zhang Hongli, Tian Zhihong, and Fang Binxing
2014 Vol. 51 (7): 1594-1603 [Abstract] ( 447 ) HTML (1 KB)  PDF (2200 KB)  ( 455 )
1604 Action-Based Multi-level Access Control Model
Su Mang1, Li Fenghua2, and Shi Guozhen3
2014 Vol. 51 (7): 1604-1613 [Abstract] ( 626 ) HTML (1 KB)  PDF (2149 KB)  ( 675 )
1614 Sybil Group Attack Detection in Kad Network
Li Qiang1, Li Zhoujun1, Zhou Changbin1, and Yu Jie2
2014 Vol. 51 (7): 1614-1623 [Abstract] ( 550 ) HTML (1 KB)  PDF (2838 KB)  ( 457 )
1624 Detection of XSS Vulnerabilities in Online Flash
Liu Qixu1, Wen Tao2, and Wen Guanxing1
2014 Vol. 51 (7): 1624-1632 [Abstract] ( 673 ) HTML (1 KB)  PDF (1549 KB)  ( 660 )
1633 Security Architecture to Deal with APT Attacks: Abnormal Discovery
Du Yuejin1,2, Zhai Lidong1, Li Yue1, and Jia Zhaopeng1,3
2014 Vol. 51 (7): 1633-1645 [Abstract] ( 655 ) HTML (1 KB)  PDF (3141 KB)  ( 747 )
计算机研究与发展
·
·
·
·
·
·
·F5000
·
More....  
More....  
EI Village
China Computer Federation
Institute of Computing, Chinese Academy of Sciences
More....  
 
 
Copyright © Editorial Board of Journal of Computer Research and Development
Supported by:Beijing Magtech