• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search

Survey of Botnets
Fang Binxing, Cui Xiang, Wang Wei
2011, 48(8): 1315-1331.
Abstract PDF
Research on Trusted Computing Technology
Feng Dengguo, Qin Yu, Wang Dan, and Chu Xiaobo
2011, 48(8): 1332-1349.
Abstract PDF
An Efficient ID-Based Verifiably Encrypted Signature Scheme
Zhou Yousheng, Sun Yanbin, Qing Sihan, Yang Yixian
2011, 48(8): 1350-1356.
Abstract PDF
A New Construction of Short Hierarchical Identity-Based Signature in the Standard Model
Wu Qing, Zhang Leyou, Hu Yupu
2011, 48(8): 1357-1362.
Abstract PDF
Multiple-Authority-Key Functional Encryption: A M-KP-ABE Scheme Based on LMSSS
Yang Xiaoyuan, Cai Weiyi, Chen Haibin
2011, 48(8): 1363-1369.
Abstract PDF
Analysis for Probabilistic and Timed Information Flow Security Properties via ptSPA
Li Chao, Yin Lihua, Guo Yunchuan
2011, 48(8): 1370-1380.
Abstract PDF
Algorithmic Complexity Attacks Against WuManber
Zhang Yu, Liu Ping, Liu Yanbing, Tan Jianlong, Guo Li
2011, 48(8): 1381-1389.
Abstract PDF
A Modular Approach Towards Design and Analysis of Authenticated Key Exchange Protocol Based on Extended Canetti-Krawczyk Model
Pan Jiaxin and Wang Libin
2011, 48(8): 1390-1399.
Abstract PDF
Ownership Transfer Protocol for RFID Tag
Jin Yongming, Sun Huiping, Guan Zhi, Chen Zhong
2011, 48(8): 1400-1405.
Abstract PDF
A Secure Routing Protocol Based on D-S Evidence Theory in Ad Hoc Networks
Li Xiaoqing, Li Hui, Yang Kai, and Ma Jianfeng
2011, 48(8): 1406-1413.
Abstract PDF
TRBAC: Trust Based Access Control Model
Liu Wu, Duan Haixin, Zhang Hong, Ren Ping, Wu Jianping
2011, 48(8): 1414-1420.
Abstract PDF
Formal Security Analysis on Trusted Platform Module Based on Applied π Calculus
Xu Shiwei, Zhang Huanguo
2011, 48(8): 1421-1429.
Abstract PDF
Static Analysis of TOCTTOU Vulnerabilities in Unix-Style File System
Han Wei, He Yeping
2011, 48(8): 1430-1437.
Abstract PDF
Software Integrity Verification Based on VMM-Level System Call Analysis Technique
Li Bo, Li Jianxin, Hu Chunming, Wo Tianyu, and Huai Jinpeng
2011, 48(8): 1438-1446.
Abstract PDF
An Design Approach of Trustworthy Software and Its Trustworthiness Evaluation
Tian Junfeng, Li Zhen, Liu Yuling
2011, 48(8): 1447-1454.
Abstract PDF
Detecting the Vulnerability Pattern of Writing Tainted Value to Tainted Address
Hu Chaojian, Li Zhoujun, Guo Tao, Shi Zhiwei
2011, 48(8): 1455-1463.
Abstract PDF
Trusted Dynamic Measurement Based on Interactive Markov Chains
Zhuang Lu, Cai Mian, and Shen Changxiang
2011, 48(8): 1464-1472.
Abstract PDF
GoodRep Attack and Defense in P2P Reputation Systems
Feng Jingyu, Zhang Yuqing, Chen Shenlong, Fu Anmin
2011, 48(8): 1473-1480.
Abstract PDF
A Secure Routing Scheme for Opportunistic Networks Based on Identity-Based Encryption
Chen Xi, Ma Jianfeng
2011, 48(8): 1481-1487.
Abstract PDF
MRRbot: A Multi-Role and Redundancy-Based P2P Botnet Model
Li Shuhao, Yun Xiaochun, Hao Zhiyu, Zhai Lidong
2011, 48(8): 1488-1496.
Abstract PDF
Analysis of Attack Graphs Based on Network Flow Method
Wu Jinyu, Jin Shuyuan, Yang Zhi
2011, 48(8): 1497-1505.
Abstract PDF
Anomaly Detection Using Multi-Level and Multi-Dimensional Analyzing of Network Traffic
Zheng Liming, Zou Peng, Jia Yan
2011, 48(8): 1506-1516.
Abstract PDF
An Algorithm Based on LRU and SCBF for Elephant Flows Identification and Its Application in DDoS Defense
Xie Dongqing, Zhou Zaihong, Luo Jiawei
2011, 48(8): 1517-1523.
Abstract PDF
An Authorization Model and Implementation for Vector Data in Spatial DBMS
Zhang Desheng, Feng Dengguo, Chen Chi
2011, 48(8): 1524-1533.
Abstract PDF
Detecting and Managing Hidden Process via Hypervisor
Wang Lina, Gao Hanjun, Liu Wei, Peng Yang
2011, 48(8): 1534-1541.
Abstract PDF
Detecion Approach for Covert Channel Based on Concurrency Conflict Interval Time
Wang Yongji, Wu Jingzheng, Ding Liping, Zeng Haitao
2011, 48(8): 1542-1553.
Abstract PDF
The Research and Application of a Specific Instruction Processor for AES
Xia Hui, Jia Zhiping, Zhang Feng, Li Xin, Chen Renhai, Edwin H.-M. Sha
2011, 48(8): 1554-1562.
Abstract PDF
Histograms Difference and Quantitative Steganalysis of JPEG Steganography Based on Relative Entropy
Yang Chunfang, Liu Fenlin, and Luo Xiangyang
2011, 48(8): 1563-1569.
Abstract PDF