计算机研究与发展
       ISSN 1000-1239   CN 11-1777/TP  
   RSS  Email Alert     
   
 
Nianqi Search Key words Adv search
33
2017 Vol. 54, No. 10
Published: 01 October 2017

   
 
2107 Research Advances on Secure Searchable Encryption Hot!
Dong Xiaolei, Zhou Jun, Cao Zhenfu
DOI: 10.7544/issn1000-1239.2017.20170627
2017 Vol. 54 (10): 2107-2120 [Abstract] ( 1211 ) HTML (1 KB)  PDF (2525 KB)  ( 911 )
2121 Recent Advances in Lattice-Based Cryptography Hot!
Zhang Pingyuan, Jiang Han, Cai Jie, Wang Chenguang, Zheng Zhihua, Xu Qiuliang
DOI: 10.7544/issn1000-1239.2017.20170628
2017 Vol. 54 (10): 2121-2129 [Abstract] ( 1136 ) HTML (1 KB)  PDF (1107 KB)  ( 1562 )
2130 Survey of Internet of Things Security Hot!
Zhang Yuqing, Zhou Wei, Peng Anni
DOI: 10.7544/issn1000-1239.2017.20170470
2017 Vol. 54 (10): 2130-2143 [Abstract] ( 1888 ) HTML (1 KB)  PDF (1747 KB)  ( 2280 )
2144 Survey on Redactable Signatures Hot!
Ma Jinhua, Liu Jianghua, Wu Wei, Huang Xinyi
DOI: 10.7544/issn1000-1239.2017.20170646
2017 Vol. 54 (10): 2144-2152 [Abstract] ( 922 ) HTML (1 KB)  PDF (1353 KB)  ( 800 )
2153 Survey on Private Preserving Set Intersection Technology Hot!
Shen Liyan, Chen Xiaojun, Shi Jinqiao, Hu Lanlan
DOI: 10.7544/issn1000-1239.2017.20170461
2017 Vol. 54 (10): 2153-2169 [Abstract] ( 1056 ) HTML (1 KB)  PDF (2375 KB)  ( 842 )
2170 Survey on Privacy Preserving Techniques for Blockchain Technology Hot!
Zhu Liehuang, Gao Feng, Shen Meng, Li Yandong, Zheng Baokun, Mao Hongliang, Wu Zhen
DOI: 10.7544/issn1000-1239.2017.20170471
2017 Vol. 54 (10): 2170-2186 [Abstract] ( 4063 ) HTML (1 KB)  PDF (3265 KB)  ( 2462 )
2187 RAKA: New Authenticated Key Agreement Protocol Based on Ring-LWE
Yang Yatao, Zhang Yaze, Li Zichen, Zhang Fengjuan, Liu Boya
DOI: 10.7544/issn1000-1239.2017.20170477
2017 Vol. 54 (10): 2187-2192 [Abstract] ( 646 ) HTML (103 KB)  PDF (834 KB)  ( 446 )
2193 Efficient Hierarchical Identity-Based Encryption Scheme from Learning with Errors
Ye Qing, Hu Mingxing, Tang Yongli, Liu Kun, Yan Xixi
DOI: 10.7544/issn1000-1239.2017.20170394
2017 Vol. 54 (10): 2193-2204 [Abstract] ( 436 ) HTML (232 KB)  PDF (1342 KB)  ( 451 )
2205 Research on the LED Lightweight Cipher Against the Statistical Fault Analysis in Internet of Things
Li Wei, Ge Chenyu, Gu Dawu, Liao Linfeng, Gao Zhiyong, Guo Zheng, Liu Ya, Liu Zhiqiang, Shi Xiujin
DOI: 10.7544/issn1000-1239.2017.20170437
2017 Vol. 54 (10): 2205-2214 [Abstract] ( 639 ) HTML (87 KB)  PDF (1728 KB)  ( 512 )
2215 An Efficient Single Server-Aided k-out-of-n Oblivious Transfer Protocol
Zhao Shengnan, Jiang Han, Wei Xiaochao, Ke Junming, Zhao Minghao
DOI: 10.7544/issn1000-1239.2017.20170463
2017 Vol. 54 (10): 2215-2223 [Abstract] ( 503 ) HTML (135 KB)  PDF (1315 KB)  ( 341 )
2224 Security Analysis of Lightweight Block Cipher ESF
Yin Jun, Ma Chuyan, Song Jian, Zeng Guang, Ma Chuangui
DOI: 10.7544/issn1000-1239.2017.20170455
2017 Vol. 54 (10): 2224-2231 [Abstract] ( 569 ) HTML (95 KB)  PDF (1089 KB)  ( 442 )
2232 Dual Server Identity-Based Encryption with Equality Test for Cloud Computing
Wu Libing, Zhang Yubo, He Debiao
DOI: 10.7544/issn1000-1239.2017.20170446
2017 Vol. 54 (10): 2232-2243 [Abstract] ( 503 ) HTML (203 KB)  PDF (1536 KB)  ( 510 )
2244 Generic Tightly Secure Signature Schemes from Strong Chameleon Hash Functions
Li Fei, Gao Wei, Wang Guilin, Xie Dongqing, Tang Chunming
DOI: 10.7544/issn1000-1239.2017.20170422
2017 Vol. 54 (10): 2244-2254 [Abstract] ( 531 ) HTML (154 KB)  PDF (1287 KB)  ( 433 )
2255 An Intrusion Detection Scheme Based on Semi-Supervised Learning and Information Gain Ratio
Xu Mengfan, Li Xinghua, Liu Hai, Zhong Cheng, Ma Jianfeng
DOI: 10.7544/issn1000-1239.2017.20170456
2017 Vol. 54 (10): 2255-2267 [Abstract] ( 509 ) HTML (107 KB)  PDF (5922 KB)  ( 687 )
2268 A TrustZone Based Application Protection Scheme in Highly Open Scenarios
Zhang Yingjun, Feng Dengguo, Qin Yu, Yang Bo
DOI: 10.7544/issn1000-1239.2017.20170387
2017 Vol. 54 (10): 2268-2283 [Abstract] ( 514 ) HTML (115 KB)  PDF (3758 KB)  ( 399 )
2284 A Method of Constructing the Model of Trusted Virtual Machine Migration
Shi Yuan, Zhang Huanguo, Wu Fusheng
DOI: 10.7544/issn1000-1239.2017.20170465
2017 Vol. 54 (10): 2284-2295 [Abstract] ( 540 ) HTML (112 KB)  PDF (2950 KB)  ( 467 )
2296 A System for Scoring the Exploitability of Vulnerability Based Types
Lei Kenan, Zhang Yuqing, Wu Chensi, Ma Hua
DOI: 10.7544/issn1000-1239.2017.20170457
2017 Vol. 54 (10): 2296-2309 [Abstract] ( 576 ) HTML (105 KB)  PDF (2455 KB)  ( 534 )
2310 A Virtual Machine Introspection Triggering Mechanism Based on VMFUNC
Liu Weijie, Wang Lina, Tan Cheng, Xu Lai
DOI: 10.7544/issn1000-1239.2017.20170452
2017 Vol. 54 (10): 2310-2320 [Abstract] ( 531 ) HTML (73 KB)  PDF (3302 KB)  ( 685 )
2321 Design and Implementation of Mimic Network Operating System
Wang Zhenpeng, Hu Hongchao, Cheng Guozhen
DOI: 10.7544/issn1000-1239.2017.20170444
2017 Vol. 54 (10): 2321-2333 [Abstract] ( 618 ) HTML (118 KB)  PDF (3664 KB)  ( 518 )
2334 Detection of Covert and Suspicious DNS Behavior in Advanced Persistent Threats
Wang Xiaoqi, Li Qiang, Yan Guanghua, Xuan Guangzhe, Guo Dong
DOI: 10.7544/issn1000-1239.2017.20170403
2017 Vol. 54 (10): 2334-2343 [Abstract] ( 541 ) HTML (95 KB)  PDF (1538 KB)  ( 459 )
2344 Advanced Persistent Threats Detection Game with Expert System for Cloud
Hu Qing, Lü Shichao, Shi Zhiqiang, Sun Limin, Xiao Liang
DOI: 10.7544/issn1000-1239.2017.20170433
2017 Vol. 54 (10): 2344-2355 [Abstract] ( 486 ) HTML (119 KB)  PDF (4180 KB)  ( 588 )
2356 A Dynamic Defense Mechanism for SDN DoS Attacks Based on Network Resource Management Technology
Wang Tao, Chen Hongchang, Cheng Guozhen
DOI: 10.7544/issn1000-1239.2017.20170389
2017 Vol. 54 (10): 2356-2368 [Abstract] ( 447 ) HTML (1 KB)  PDF (4073 KB)  ( 507 )
2369 Attribute-Based Encryption with Keyword Search in Mobile Cloud Storage
Su Hang, Zhu Zhiqiang, Sun Lei
DOI: 10.7544/issn1000-1239.2017.20170431
2017 Vol. 54 (10): 2369-2377 [Abstract] ( 409 ) HTML (131 KB)  PDF (1288 KB)  ( 457 )
2378 A Secure Outsourced Fusion Denoising Scheme in Multiple Encrypted Remote Sensing Images
Huang Dongmei, Dai Liang, Wei Lifei, Wei Quanmiao, Wu Guojian
DOI: 10.7544/issn1000-1239.2017.20170427
2017 Vol. 54 (10): 2378-2389 [Abstract] ( 455 ) HTML (114 KB)  PDF (4626 KB)  ( 520 )
2390 Research on Scaling Technology of Bitcoin Blockchain
Yu Hui, Zhang Zongyang, Liu Jianwei
DOI: 10.7544/issn1000-1239.2017.20170416
2017 Vol. 54 (10): 2390-2403 [Abstract] ( 1297 ) HTML (106 KB)  PDF (2634 KB)  ( 1923 )
2404 Compliance Analysis of Authorization Constraints in Business Process
Bo Yang, Xia Chunhe
DOI: 10.7544/issn1000-1239.2017.20170397
2017 Vol. 54 (10): 2404-2418 [Abstract] ( 360 ) HTML (147 KB)  PDF (3681 KB)  ( 354 )
计算机研究与发展
·
·
·
·
·
·
·F5000
·
More....  
More....  
EI Village
China Computer Federation
Institute of Computing, Chinese Academy of Sciences
More....  
 
 
Copyright © Editorial Board of Journal of Computer Research and Development
Supported by:Beijing Magtech