计算机研究与发展
       ISSN 1000-1239   CN 11-1777/TP  
   RSS  Email Alert     
   
 
Nianqi Search Key words Adv search
33
2015 Vol. 52, No. 10
Published: 01 October 2015

   
 
2167 Survey of Android Vulnerability Detection Hot!
Zhang Yuqing, Fang Zhejun, Wang Kai, Wang Zhiqiang, Yue Hongzhou, Liu Qixu, He Yuan, Li Xiaoqi, Yang Gang
DOI: 10.7544/issn1000-1239.2015.20150572
2015 Vol. 52 (10): 2167-2177 [Abstract] ( 1800 ) HTML (1 KB)  PDF (1658 KB)  ( 1613 )
2178 A Cloud Model Based Trust Evaluation Model for Defense Agent
Yu Yang, Xia Chunhe, Wang Xinghe
DOI: 10.7544/issn1000-1239.2015.20150417
2015 Vol. 52 (10): 2178-2191 [Abstract] ( 504 ) HTML (1 KB)  PDF (4031 KB)  ( 528 )
2192 An Auditing Protocol for Data Storage in Cloud Computing with Data Dynamics
Qin Zhiguang, Wang Shiyu, Zhao Yang, Xiong Hu, Wu Songyang
DOI: 10.7544/issn1000-1239.2015.20150509
2015 Vol. 52 (10): 2192-2199 [Abstract] ( 708 ) HTML (1 KB)  PDF (1758 KB)  ( 786 )
2200 SPFPA: A Format Parsing Approach for Unknown Security Protocols
Zhu Yuna, Han Jihong, Yuan Lin, Chen Hantuo, Fan Yudan
DOI: 10.7544/issn1000-1239.2015.20150568
2015 Vol. 52 (10): 2200-2211 [Abstract] ( 655 ) HTML (1 KB)  PDF (3827 KB)  ( 540 )
2212 pTrace: A Counter Technology of DDoS Attack Source for Controllable Cloud Computing
Li Baohui, Xu Kefu, Zhang Peng, Guo Li
DOI: 10.7544/issn1000-1239.2015.20150577
2015 Vol. 52 (10): 2212-2223 [Abstract] ( 587 ) HTML (1 KB)  PDF (2829 KB)  ( 589 )
2224 A Trustzone-Based Trusted Code Execution with Strong Security Requirements
Zhang Yingjun, Feng Dengguo, Qin Yu, Yang Bo
DOI: 10.7544/issn1000-1239.2015.20150582
2015 Vol. 52 (10): 2224-2238 [Abstract] ( 806 ) HTML (1 KB)  PDF (3579 KB)  ( 699 )
2239 Multi-Criteria Mathematical Programming Based Method on Network Intrusion Detection
Wang Bo, Nie Xiaowei
DOI: 10.7544/issn1000-1239.2015.20150587
2015 Vol. 52 (10): 2239-2246 [Abstract] ( 605 ) HTML (1 KB)  PDF (968 KB)  ( 579 )
2247 Advances in Key Techniques of Practical Secure Multi-Party Computation Hot!
Jiang Han, Xu Qiuliang
DOI: 10.7544/issn1000-1239.2015.20150763
2015 Vol. 52 (10): 2247-2257 [Abstract] ( 1383 ) HTML (1 KB)  PDF (1937 KB)  ( 1313 )
2258 A Strongly Secure Lattice-Based Key Exchange Protocol
Wen Weiqiang, Wang Libin
DOI: 10.7544/issn1000-1239.2015.20150518
2015 Vol. 52 (10): 2258-2269 [Abstract] ( 646 ) HTML (1 KB)  PDF (1679 KB)  ( 658 )
2270 Adaptively Secure Outsourcing Ciphertext-Policy Attribute-Based Encryption
Wang Hao, Zheng Zhihua, Wu Lei, Wang Yilei
DOI: 10.7544/issn1000-1239.2015.20150497
2015 Vol. 52 (10): 2270-2280 [Abstract] ( 639 ) HTML (1 KB)  PDF (1156 KB)  ( 616 )
2281 A Privacy Preserving Attribute-Based Encryption Scheme with User Revocation
Li Jiguo, Shi Yuerong, Zhang Yichen
DOI: 10.7544/issn1000-1239.2015.20150580
2015 Vol. 52 (10): 2281-2292 [Abstract] ( 610 ) HTML (1 KB)  PDF (1296 KB)  ( 713 )
2293 Accountable Attribute-Based Encryption Scheme Without Key Escrow
Zhang Xing, Wen Zilong, Shen Qingni, Fang Yuejian, Wu Zhonghai
DOI: 10.7544/issn1000-1239.2015.20150550
2015 Vol. 52 (10): 2293-2303 [Abstract] ( 549 ) HTML (1 KB)  PDF (1601 KB)  ( 693 )
2304 A Trustee-Based and Efficient Divisible E-Cash Scheme
Yu Yulei, Dong Xiaolei, Cao Zhenfu
DOI: 10.7544/issn1000-1239.2015.20150596
2015 Vol. 52 (10): 2304-2312 [Abstract] ( 614 ) HTML (1 KB)  PDF (1385 KB)  ( 636 )
2313 A Discretionary Searchable Encryption Scheme in Multi-User Settings
Li Zhen, Jiang Han, Zhao Minghao
DOI: 10.7544/issn1000-1239.2015.20150504
2015 Vol. 52 (10): 2313-2322 [Abstract] ( 631 ) HTML (1 KB)  PDF (1106 KB)  ( 616 )
2323 A Universally Composable Secure Group Ownership Transfer Protocol for RFID Tags
Yuan Bianqing, Liu Jiqiang
DOI: 10.7544/issn1000-1239.2015.20150555
2015 Vol. 52 (10): 2323-2331 [Abstract] ( 529 ) HTML (1 KB)  PDF (1387 KB)  ( 467 )
2332 Rational Secret Sharing Scheme Based on Reconstruction Order Adjustment Mechanism
Liu Hai, Li Xinghua, Ma Jianfeng
DOI: 10.7544/issn1000-1239.2015.20150511
2015 Vol. 52 (10): 2332-2340 [Abstract] ( 366 ) HTML (1 KB)  PDF (943 KB)  ( 561 )
2341 Advances of Privacy Preservation in Internet of Things Hot!
Dong Xiaolei
DOI: 10.7544/issn1000-1239.2015.20150764
2015 Vol. 52 (10): 2341-2352 [Abstract] ( 1620 ) HTML (1 KB)  PDF (2292 KB)  ( 1518 )
2353 Privacy-Preserving Public Auditing for Multiple Managers Shared Data in the Cloud
Fu Anmin, Qin Ningyuan, Song Jianye, Su Mang
DOI: 10.7544/issn1000-1239.2015.20150544
2015 Vol. 52 (10): 2353-2362 [Abstract] ( 558 ) HTML (1 KB)  PDF (1317 KB)  ( 619 )
2363 A Community Detecting Method Based on the Node Intimacy and Degree in Social Network
Liu Yao, Kang Xiaohui, Gao Hong, Liu Qiao, Wu Zufeng, Qin Zhiguang
DOI: 10.7544/issn1000-1239.2015.20150407
2015 Vol. 52 (10): 2363-2372 [Abstract] ( 648 ) HTML (1 KB)  PDF (2126 KB)  ( 1116 )
2373 Towards Measuring Unobservability in Anonymous Communication Systems
Tan Qingfeng, Shi Jinqiao, Fang Binxing, Guo Li, Zhang Wentao, Wang Xuebin, Wei Bingjie
DOI: 10.7544/issn1000-1239.2015.20150562
2015 Vol. 52 (10): 2373-2381 [Abstract] ( 9706 ) HTML (1 KB)  PDF (6861 KB)  ( 4071 )
2382 Study on Semi-Homogenous Algorithm Based on Ring Generalization
He Xianmang, Chen Yindong, Li Dong, Hao Yanni
DOI: 10.7544/issn1000-1239.2015.20150494
2015 Vol. 52 (10): 2382-2394 [Abstract] ( 664 ) HTML (1 KB)  PDF (2951 KB)  ( 455 )
2395 Privacy Requirement Modeling and Consistency Checking in Cloud Computing
Wang Jin, Huang Zhiqiu
DOI: 10.7544/issn1000-1239.2015.20150513
2015 Vol. 52 (10): 2395-2410 [Abstract] ( 483 ) HTML (1 KB)  PDF (3193 KB)  ( 497 )
2411 Collaboration Supported Mandatory Access Control Model
Fan Yanfang, Cai Ying
DOI: 10.7544/issn1000-1239.2015.20150574
2015 Vol. 52 (10): 2411-2421 [Abstract] ( 446 ) HTML (1 KB)  PDF (2262 KB)  ( 444 )
2422 Provable Data Possession by Partial Delegation
Zhong Ting, Han Xiao, Zhao Yulong
DOI: 10.7544/issn1000-1239.2015.20150515
2015 Vol. 52 (10): 2422-2430 [Abstract] ( 430 ) HTML (1 KB)  PDF (1046 KB)  ( 503 )
计算机研究与发展
·
·
·
·
·
·
·F5000
·
More....  
More....  
EI Village
China Computer Federation
Institute of Computing, Chinese Academy of Sciences
More....  
 
 
Copyright © Editorial Board of Journal of Computer Research and Development
Supported by:Beijing Magtech