[1] |
Lu Shuaibing, Zhang Ming, Lin Zhechao, Li Hu, Kuang Xiaohui, Zhao Gang.
Dynamic Binary Translation and Instrumentation Based Function Call Tracing
[J]. Journal of Computer Research and Development, 2019, 56(2): 421-430.
|
[2] |
Zhou Weiwei, Yu Bin.
A Secure Transmission Model Between the Nodes in Clusters of Wireless Service System for Internet of Things
[J]. Journal of Computer Research and Development, 2018, 55(7): 1393-1408.
|
[3] |
Zhang Chun, Zhou Jing.
Optimization Algorithm of Association Rule Mining for EMU Operation and Maintenance Efficiency
[J]. Journal of Computer Research and Development, 2017, 54(9): 1958-1965.
|
[4] |
Ling Ruilin, Li Junfeng, Li Dan.
Realtime Capture of High-Speed Traffic on Multi-Core Platform
[J]. Journal of Computer Research and Development, 2017, 54(6): 1300-1313.
|
[5] |
Wang Kaixuan, Li Yuxi, Zhou Fucai, Wang Quanqi.
Multi-Keyword Fuzzy Search over Encrypted Data
[J]. Journal of Computer Research and Development, 2017, 54(2): 348-360.
|
[6] |
Huang Xiaohui, Li Dong, Shi Hailong, Cui Li.
EasiRCC: A Method of Rule-Matching and Conflict Resolution for Smart Home
[J]. Journal of Computer Research and Development, 2017, 54(12): 2711-2720.
|
[7] |
Li Fei, Gao Wei, Wang Guilin, Xie Dongqing, Tang Chunming.
Generic Tightly Secure Signature Schemes from Strong Chameleon Hash Functions
[J]. Journal of Computer Research and Development, 2017, 54(10): 2244-2254.
|
[8] |
WuTao,JinJianguo,WeiMingjun.
A Hash Function Algorithm Based on Variable Parameter Cascade Chaos
[J]. Journal of Computer Research and Development, 2016, 53(3): 674-681.
|
[9] |
Yang Xiaoyan, Hou Mengbo, Wei Xiaochao.
Verifier-Based Three-Party Password Authenticated Key Exchange Protocol
[J]. Journal of Computer Research and Development, 2016, 53(10): 2230-2238.
|
[10] |
Li Zhanhui, Liu Chang, Meng Jianyi, Yan Xiaolang.
Cache Load Balancing Oriented Dynamic Binary Translation
[J]. Journal of Computer Research and Development, 2015, 52(9): 2105-2113.
|
[11] |
Gao Shujing, Qu Yingjie, Song Tingqiang.
Pseudorandom Number Generators Based on One-Way Functions
[J]. Journal of Computer Research and Development, 2015, 52(6): 1394-1399.
|
[12] |
Wang Guopeng,Hu Xiangdong,Yin Fei,Zhu Ying.
Research and Design of Hash Indexing Mechanism for BTB
[J]. Journal of Computer Research and Development, 2014, 51(9): 2003-2011.
|
[13] |
Ma Bingke, Li Bao.
Collision and Second Preimage Attacks on the HTBC Hash Function
[J]. Journal of Computer Research and Development, 2014, 51(11): 2513-2517.
|
[14] |
Wang Zhiwei and Zhang Wei.
ID Based Signature Scheme from Strong RSA Assumption in the Standard Model
[J]. , 2013, 50(2): 302-306.
|
[15] |
Liu Xiao, Liu Weiran, and Li Weiyu.
An Enhanced Dynamic Password Generation Algorithm and Resynchronization Scheme
[J]. , 2012, 49(12): 2611-2618.
|