Advanced Search

    column
    Survey of Botnets
    Fang Binxing, Cui Xiang, Wang Wei
    2011, 48(8): 1315-1331.
    Abstract PDF
    Research on Trusted Computing Technology
    Feng Dengguo, Qin Yu, Wang Dan, and Chu Xiaobo
    2011, 48(8): 1332-1349.
    Abstract PDF
    An Efficient ID-Based Verifiably Encrypted Signature Scheme
    Zhou Yousheng, Sun Yanbin, Qing Sihan, Yang Yixian
    2011, 48(8): 1350-1356.
    Abstract PDF
    A New Construction of Short Hierarchical Identity-Based Signature in the Standard Model
    Wu Qing, Zhang Leyou, Hu Yupu
    2011, 48(8): 1357-1362.
    Abstract PDF
    Multiple-Authority-Key Functional Encryption: A M-KP-ABE Scheme Based on LMSSS
    Yang Xiaoyuan, Cai Weiyi, Chen Haibin
    2011, 48(8): 1363-1369.
    Abstract PDF
    Analysis for Probabilistic and Timed Information Flow Security Properties via ptSPA
    Li Chao, Yin Lihua, Guo Yunchuan
    2011, 48(8): 1370-1380.
    Abstract PDF
    Algorithmic Complexity Attacks Against WuManber
    Zhang Yu, Liu Ping, Liu Yanbing, Tan Jianlong, Guo Li
    2011, 48(8): 1381-1389.
    Abstract PDF
    A Modular Approach Towards Design and Analysis of Authenticated Key Exchange Protocol Based on Extended Canetti-Krawczyk Model
    Pan Jiaxin and Wang Libin
    2011, 48(8): 1390-1399.
    Abstract PDF
    Ownership Transfer Protocol for RFID Tag
    Jin Yongming, Sun Huiping, Guan Zhi, Chen Zhong
    2011, 48(8): 1400-1405.
    Abstract PDF
    A Secure Routing Protocol Based on D-S Evidence Theory in Ad Hoc Networks
    Li Xiaoqing, Li Hui, Yang Kai, and Ma Jianfeng
    2011, 48(8): 1406-1413.
    Abstract PDF
    TRBAC: Trust Based Access Control Model
    Liu Wu, Duan Haixin, Zhang Hong, Ren Ping, Wu Jianping
    2011, 48(8): 1414-1420.
    Abstract PDF
    Formal Security Analysis on Trusted Platform Module Based on Applied π Calculus
    Xu Shiwei, Zhang Huanguo
    2011, 48(8): 1421-1429.
    Abstract PDF
    Static Analysis of TOCTTOU Vulnerabilities in Unix-Style File System
    Han Wei, He Yeping
    2011, 48(8): 1430-1437.
    Abstract PDF
    Software Integrity Verification Based on VMM-Level System Call Analysis Technique
    Li Bo, Li Jianxin, Hu Chunming, Wo Tianyu, and Huai Jinpeng
    2011, 48(8): 1438-1446.
    Abstract PDF
    An Design Approach of Trustworthy Software and Its Trustworthiness Evaluation
    Tian Junfeng, Li Zhen, Liu Yuling
    2011, 48(8): 1447-1454.
    Abstract PDF
    Detecting the Vulnerability Pattern of Writing Tainted Value to Tainted Address
    Hu Chaojian, Li Zhoujun, Guo Tao, Shi Zhiwei
    2011, 48(8): 1455-1463.
    Abstract PDF
    Trusted Dynamic Measurement Based on Interactive Markov Chains
    Zhuang Lu, Cai Mian, and Shen Changxiang
    2011, 48(8): 1464-1472.
    Abstract PDF
    GoodRep Attack and Defense in P2P Reputation Systems
    Feng Jingyu, Zhang Yuqing, Chen Shenlong, Fu Anmin
    2011, 48(8): 1473-1480.
    Abstract PDF
    A Secure Routing Scheme for Opportunistic Networks Based on Identity-Based Encryption
    Chen Xi, Ma Jianfeng
    2011, 48(8): 1481-1487.
    Abstract PDF
    MRRbot: A Multi-Role and Redundancy-Based P2P Botnet Model
    Li Shuhao, Yun Xiaochun, Hao Zhiyu, Zhai Lidong
    2011, 48(8): 1488-1496.
    Abstract PDF
    Analysis of Attack Graphs Based on Network Flow Method
    Wu Jinyu, Jin Shuyuan, Yang Zhi
    2011, 48(8): 1497-1505.
    Abstract PDF
    Anomaly Detection Using Multi-Level and Multi-Dimensional Analyzing of Network Traffic
    Zheng Liming, Zou Peng, Jia Yan
    2011, 48(8): 1506-1516.
    Abstract PDF
    An Algorithm Based on LRU and SCBF for Elephant Flows Identification and Its Application in DDoS Defense
    Xie Dongqing, Zhou Zaihong, Luo Jiawei
    2011, 48(8): 1517-1523.
    Abstract PDF
    An Authorization Model and Implementation for Vector Data in Spatial DBMS
    Zhang Desheng, Feng Dengguo, Chen Chi
    2011, 48(8): 1524-1533.
    Abstract PDF
    Detecting and Managing Hidden Process via Hypervisor
    Wang Lina, Gao Hanjun, Liu Wei, Peng Yang
    2011, 48(8): 1534-1541.
    Abstract PDF
    Detecion Approach for Covert Channel Based on Concurrency Conflict Interval Time
    Wang Yongji, Wu Jingzheng, Ding Liping, Zeng Haitao
    2011, 48(8): 1542-1553.
    Abstract PDF
    The Research and Application of a Specific Instruction Processor for AES
    Xia Hui, Jia Zhiping, Zhang Feng, Li Xin, Chen Renhai, Edwin H.-M. Sha
    2011, 48(8): 1554-1562.
    Abstract PDF
    Histograms Difference and Quantitative Steganalysis of JPEG Steganography Based on Relative Entropy
    Yang Chunfang, Liu Fenlin, and Luo Xiangyang
    2011, 48(8): 1563-1569.
    Abstract PDF