计算机研究与发展
ISSN 1000-1239 CN 11-1777/TP
RSS
|
Email Alert
Nianqi Search
Key words
Adv search
33
Home
About Journal
About the Journal
Editorial Board
Index in
Readers
Current Issue
In Press
Top Cited
Most Download
Articles
Authors
Online Submission
Manuscript Tracking
Author Notice
Reviews
Peer Review
Editor-in-Chief
Area Editor-in-Chief
Editorial Office
Self Recommendation
Relevant Information
Download
Contact Us
Contact Us
Messages Board
Subscribe
Questions & Answers
Email Alert
中文
2015 Vol. 52, No. 10
Published: 01 October 2015
2167
Survey of Android Vulnerability Detection
Hot!
Zhang Yuqing, Fang Zhejun, Wang Kai, Wang Zhiqiang, Yue Hongzhou, Liu Qixu, He Yuan, Li Xiaoqi, Yang Gang
DOI: 10.7544/issn1000-1239.2015.20150572
2015 Vol. 52 (10): 2167-2177 [
Abstract
] (
1861
)
HTML
(1 KB)
PDF
(1658 KB) (
1648
)
2178
A Cloud Model Based Trust Evaluation Model for Defense Agent
Yu Yang, Xia Chunhe, Wang Xinghe
DOI: 10.7544/issn1000-1239.2015.20150417
2015 Vol. 52 (10): 2178-2191 [
Abstract
] (
517
)
HTML
(1 KB)
PDF
(4031 KB) (
530
)
2192
An Auditing Protocol for Data Storage in Cloud Computing with Data Dynamics
Qin Zhiguang, Wang Shiyu, Zhao Yang, Xiong Hu, Wu Songyang
DOI: 10.7544/issn1000-1239.2015.20150509
2015 Vol. 52 (10): 2192-2199 [
Abstract
] (
727
)
HTML
(1 KB)
PDF
(1758 KB) (
800
)
2200
SPFPA: A Format Parsing Approach for Unknown Security Protocols
Zhu Yuna, Han Jihong, Yuan Lin, Chen Hantuo, Fan Yudan
DOI: 10.7544/issn1000-1239.2015.20150568
2015 Vol. 52 (10): 2200-2211 [
Abstract
] (
667
)
HTML
(1 KB)
PDF
(3827 KB) (
537
)
2212
pTrace: A Counter Technology of DDoS Attack Source for Controllable Cloud Computing
Li Baohui, Xu Kefu, Zhang Peng, Guo Li
DOI: 10.7544/issn1000-1239.2015.20150577
2015 Vol. 52 (10): 2212-2223 [
Abstract
] (
597
)
HTML
(1 KB)
PDF
(2829 KB) (
602
)
2224
A Trustzone-Based Trusted Code Execution with Strong Security Requirements
Zhang Yingjun, Feng Dengguo, Qin Yu, Yang Bo
DOI: 10.7544/issn1000-1239.2015.20150582
2015 Vol. 52 (10): 2224-2238 [
Abstract
] (
822
)
HTML
(1 KB)
PDF
(3579 KB) (
702
)
2239
Multi-Criteria Mathematical Programming Based Method on Network Intrusion Detection
Wang Bo, Nie Xiaowei
DOI: 10.7544/issn1000-1239.2015.20150587
2015 Vol. 52 (10): 2239-2246 [
Abstract
] (
632
)
HTML
(1 KB)
PDF
(968 KB) (
577
)
2247
Advances in Key Techniques of Practical Secure Multi-Party Computation
Hot!
Jiang Han, Xu Qiuliang
DOI: 10.7544/issn1000-1239.2015.20150763
2015 Vol. 52 (10): 2247-2257 [
Abstract
] (
1431
)
HTML
(1 KB)
PDF
(1937 KB) (
1364
)
2258
A Strongly Secure Lattice-Based Key Exchange Protocol
Wen Weiqiang, Wang Libin
DOI: 10.7544/issn1000-1239.2015.20150518
2015 Vol. 52 (10): 2258-2269 [
Abstract
] (
678
)
HTML
(1 KB)
PDF
(1679 KB) (
665
)
2270
Adaptively Secure Outsourcing Ciphertext-Policy Attribute-Based Encryption
Wang Hao, Zheng Zhihua, Wu Lei, Wang Yilei
DOI: 10.7544/issn1000-1239.2015.20150497
2015 Vol. 52 (10): 2270-2280 [
Abstract
] (
645
)
HTML
(1 KB)
PDF
(1156 KB) (
614
)
2281
A Privacy Preserving Attribute-Based Encryption Scheme with User Revocation
Li Jiguo, Shi Yuerong, Zhang Yichen
DOI: 10.7544/issn1000-1239.2015.20150580
2015 Vol. 52 (10): 2281-2292 [
Abstract
] (
623
)
HTML
(1 KB)
PDF
(1296 KB) (
721
)
2293
Accountable Attribute-Based Encryption Scheme Without Key Escrow
Zhang Xing, Wen Zilong, Shen Qingni, Fang Yuejian, Wu Zhonghai
DOI: 10.7544/issn1000-1239.2015.20150550
2015 Vol. 52 (10): 2293-2303 [
Abstract
] (
568
)
HTML
(1 KB)
PDF
(1601 KB) (
680
)
2304
A Trustee-Based and Efficient Divisible E-Cash Scheme
Yu Yulei, Dong Xiaolei, Cao Zhenfu
DOI: 10.7544/issn1000-1239.2015.20150596
2015 Vol. 52 (10): 2304-2312 [
Abstract
] (
629
)
HTML
(1 KB)
PDF
(1385 KB) (
641
)
2313
A Discretionary Searchable Encryption Scheme in Multi-User Settings
Li Zhen, Jiang Han, Zhao Minghao
DOI: 10.7544/issn1000-1239.2015.20150504
2015 Vol. 52 (10): 2313-2322 [
Abstract
] (
653
)
HTML
(1 KB)
PDF
(1106 KB) (
615
)
2323
A Universally Composable Secure Group Ownership Transfer Protocol for RFID Tags
Yuan Bianqing, Liu Jiqiang
DOI: 10.7544/issn1000-1239.2015.20150555
2015 Vol. 52 (10): 2323-2331 [
Abstract
] (
547
)
HTML
(1 KB)
PDF
(1387 KB) (
475
)
2332
Rational Secret Sharing Scheme Based on Reconstruction Order Adjustment Mechanism
Liu Hai, Li Xinghua, Ma Jianfeng
DOI: 10.7544/issn1000-1239.2015.20150511
2015 Vol. 52 (10): 2332-2340 [
Abstract
] (
379
)
HTML
(1 KB)
PDF
(943 KB) (
560
)
2341
Advances of Privacy Preservation in Internet of Things
Hot!
Dong Xiaolei
DOI: 10.7544/issn1000-1239.2015.20150764
2015 Vol. 52 (10): 2341-2352 [
Abstract
] (
1630
)
HTML
(1 KB)
PDF
(2292 KB) (
1511
)
2353
Privacy-Preserving Public Auditing for Multiple Managers Shared Data in the Cloud
Fu Anmin, Qin Ningyuan, Song Jianye, Su Mang
DOI: 10.7544/issn1000-1239.2015.20150544
2015 Vol. 52 (10): 2353-2362 [
Abstract
] (
576
)
HTML
(1 KB)
PDF
(1317 KB) (
620
)
2363
A Community Detecting Method Based on the Node Intimacy and Degree in Social Network
Liu Yao, Kang Xiaohui, Gao Hong, Liu Qiao, Wu Zufeng, Qin Zhiguang
DOI: 10.7544/issn1000-1239.2015.20150407
2015 Vol. 52 (10): 2363-2372 [
Abstract
] (
657
)
HTML
(1 KB)
PDF
(2126 KB) (
1142
)
2373
Towards Measuring Unobservability in Anonymous Communication Systems
Tan Qingfeng, Shi Jinqiao, Fang Binxing, Guo Li, Zhang Wentao, Wang Xuebin, Wei Bingjie
DOI: 10.7544/issn1000-1239.2015.20150562
2015 Vol. 52 (10): 2373-2381 [
Abstract
] (
9741
)
HTML
(1 KB)
PDF
(6861 KB) (
4101
)
2382
Study on Semi-Homogenous Algorithm Based on Ring Generalization
He Xianmang, Chen Yindong, Li Dong, Hao Yanni
DOI: 10.7544/issn1000-1239.2015.20150494
2015 Vol. 52 (10): 2382-2394 [
Abstract
] (
674
)
HTML
(1 KB)
PDF
(2951 KB) (
461
)
2395
Privacy Requirement Modeling and Consistency Checking in Cloud Computing
Wang Jin, Huang Zhiqiu
DOI: 10.7544/issn1000-1239.2015.20150513
2015 Vol. 52 (10): 2395-2410 [
Abstract
] (
498
)
HTML
(1 KB)
PDF
(3193 KB) (
495
)
2411
Collaboration Supported Mandatory Access Control Model
Fan Yanfang, Cai Ying
DOI: 10.7544/issn1000-1239.2015.20150574
2015 Vol. 52 (10): 2411-2421 [
Abstract
] (
454
)
HTML
(1 KB)
PDF
(2262 KB) (
421
)
2422
Provable Data Possession by Partial Delegation
Zhong Ting, Han Xiao, Zhao Yulong
DOI: 10.7544/issn1000-1239.2015.20150515
2015 Vol. 52 (10): 2422-2430 [
Abstract
] (
463
)
HTML
(1 KB)
PDF
(1046 KB) (
506
)
计算机研究与发展
·
·
·
·
·
·
·
F5000
·
More....
More....
EI Village
China Computer Federation
Institute of Computing, Chinese Academy of Sciences
More....
Copyright © Editorial Board of Journal of Computer Research and Development
Supported by:
Beijing Magtech