• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search

Survey of Android OS Security
Zhang Yuqing, Wang Kai, Yang Huan, Fang Zhejun, Wang Zhiqiang, and Cao Chen
2014, 51(7): 1385-1396.
Abstract PDF
Secure and Privacy-Preserving Data Storage Service in Public Cloud
Li Hui, Sun Wenhai, Li Fenghua, Wang Boyang
2014, 51(7): 1397-1409.
Abstract PDF
Proofs of Data Possession of Multiple Copies
Fu Yanyan, Zhang Min, Chen Kaiqu, Feng Dengguo
2014, 51(7): 1410-1416.
Abstract PDF
A Secure Electronic Document Self-Destructing Scheme in Cloud Computing
Yao Zhiqiang, Xiong Jinbo, Ma Jianfeng, Li Qi, Liu Ximeng
2014, 51(7): 1417-1423.
Abstract PDF
CACDP: A Cryptographic Access Control for Dynamic Policy in Cloud Storage
Zhang Hao, Zhao Lei, Feng Bo, Yu Rongwei, and Liu Weijie
2014, 51(7): 1424-1435.
Abstract PDF
Research on Direct Anonymous Attestation Scheme Based on Trusted Mobile Platform
Yang Bo, Feng Dengguo, Qin Yu, Zhang Qianying, Xi Li, Zheng Changwen
2014, 51(7): 1436-1445.
Abstract PDF
An Anti-Obfuscation Method for Detecting Similarity Among Android Applications in Large Scale
Jiao Sibei, Ying Lingyun, Yang Yi, Cheng Yao, Su Purui, and Feng Dengguo
2014, 51(7): 1446-1457.
Abstract PDF
Description of Android Malware Feature Based on Dalvik Instructions
Li Ting, Dong Hang, Yuan Chunyang, Du Yuejin, Xu Guo'ai
2014, 51(7): 1458-1466.
Abstract PDF
Modified Matrix Encoding Based on the Spatial Distortion Model and Its Improvement
Han Tao, Zhu Yuefei, Lin Sisi, Wu Yang
2014, 51(7): 1467-1475.
Abstract PDF
A Distributed Rational Secret Sharing Scheme with Hybrid Preference Model
Peng Changgen, Liu Hai, Tian Youliang, Lü Zhen, Liu Rongfei
2014, 51(7): 1476-1485.
Abstract PDF
A Secure Routing Protocol for MWNs Based on Cross-Layer Dynamic Reputation Mechanism
Lin Hui, Ma Jianfeng, Xu Li
2014, 51(7): 1486-1496.
Abstract PDF
Efficient and Provably-Secure Certificate-Based Key Encapsulation Mechanism in the Standard Model
Lu Yang and Li Jiguo
2014, 51(7): 1497-1505.
Abstract PDF
RFID Lightweight Authentication Protocol Based on PRF
Jin Yongming, Wu Qiying, Shi Zhiqiang, Lu Xiang, Sun Limin
2014, 51(7): 1506-1514.
Abstract PDF
LWE Problem with Uniform Secret and Errors and Its Application
Sun Xiaochao, Li Bao, and Lu Xianhui
2014, 51(7): 1515-1519.
Abstract PDF
Related-Key Impossible Differential Cryptanalysis on LBlock
Wei Hongru and Yin Guangli
2014, 51(7): 1520-1526.
Abstract PDF
Rational Fair Computation with Computational Sequential Equilibrium
Wang Yilei, Zheng Zhihua, Wang Hao, Xu Qiuliang
2014, 51(7): 1527-1537.
Abstract PDF
A Tor Anonymous Communication System with Security Enhancements
Zhou Yanwei, Yang Qiliang, Yang Bo, Wu Zhenqiang
2014, 51(7): 1538-1546.
Abstract PDF
Plaintext Recovery Based on Memory Dependence Measurement
Wei Qiang, Wu Zehui, and Wang Qingxian
2014, 51(7): 1547-1554.
Abstract PDF
Towards Analysis of Security in I2P’s Path Selection
Liu Peipeng, Wang Lihong, Shi Jinqiao, Tan Qingfeng
2014, 51(7): 1555-1564.
Abstract PDF
Algorithm of Optimal Security Hardening Measures Against Insider Threat
Chen Xiaojun, Shi Jinqiao, Xu Fei, Pu Yiguo, Guo Li
2014, 51(7): 1565-1577.
Abstract PDF
UML-Based Modeling Method of Network Security Infrastructure
Bu Ning, Liu Yuling, Lian Yifeng, Huang Liang
2014, 51(7): 1578-1593.
Abstract PDF
Multi-Addresses Amplification DoS Attacks by Native IPv6 and IPv6Tunnels
Cui Yu, Zhang Hongli, Tian Zhihong, and Fang Binxing
2014, 51(7): 1594-1603.
Abstract PDF
Action-Based Multi-level Access Control Model
Su Mang, Li Fenghua, Shi Guozhen
2014, 51(7): 1604-1613.
Abstract PDF
Sybil Group Attack Detection in Kad Network
Li Qiang, Li Zhoujun, Zhou Changbin, Yu Jie
2014, 51(7): 1614-1623.
Abstract PDF
Detection of XSS Vulnerabilities in Online Flash
Liu Qixu, Wen Tao, Wen Guanxing
2014, 51(7): 1624-1632.
Abstract PDF
Security Architecture to Deal with APT Attacks: Abnormal Discovery
Du Yuejin, Zhai Lidong, Li Yue, Jia Zhaopeng
2014, 51(7): 1633-1645.
Abstract PDF