Advanced Search

    column
    Survey of Android OS Security
    Zhang Yuqing, Wang Kai, Yang Huan, Fang Zhejun, Wang Zhiqiang, and Cao Chen
    2014, 51(7): 1385-1396.
    Abstract PDF
    Secure and Privacy-Preserving Data Storage Service in Public Cloud
    Li Hui, Sun Wenhai, Li Fenghua, Wang Boyang
    2014, 51(7): 1397-1409.
    Abstract PDF
    Proofs of Data Possession of Multiple Copies
    Fu Yanyan, Zhang Min, Chen Kaiqu, Feng Dengguo
    2014, 51(7): 1410-1416.
    Abstract PDF
    A Secure Electronic Document Self-Destructing Scheme in Cloud Computing
    Yao Zhiqiang, Xiong Jinbo, Ma Jianfeng, Li Qi, Liu Ximeng
    2014, 51(7): 1417-1423.
    Abstract PDF
    CACDP: A Cryptographic Access Control for Dynamic Policy in Cloud Storage
    Zhang Hao, Zhao Lei, Feng Bo, Yu Rongwei, and Liu Weijie
    2014, 51(7): 1424-1435.
    Abstract PDF
    Research on Direct Anonymous Attestation Scheme Based on Trusted Mobile Platform
    Yang Bo, Feng Dengguo, Qin Yu, Zhang Qianying, Xi Li, Zheng Changwen
    2014, 51(7): 1436-1445.
    Abstract PDF
    An Anti-Obfuscation Method for Detecting Similarity Among Android Applications in Large Scale
    Jiao Sibei, Ying Lingyun, Yang Yi, Cheng Yao, Su Purui, and Feng Dengguo
    2014, 51(7): 1446-1457.
    Abstract PDF
    Description of Android Malware Feature Based on Dalvik Instructions
    Li Ting, Dong Hang, Yuan Chunyang, Du Yuejin, Xu Guo'ai
    2014, 51(7): 1458-1466.
    Abstract PDF
    Modified Matrix Encoding Based on the Spatial Distortion Model and Its Improvement
    Han Tao, Zhu Yuefei, Lin Sisi, Wu Yang
    2014, 51(7): 1467-1475.
    Abstract PDF
    A Distributed Rational Secret Sharing Scheme with Hybrid Preference Model
    Peng Changgen, Liu Hai, Tian Youliang, Lü Zhen, Liu Rongfei
    2014, 51(7): 1476-1485.
    Abstract PDF
    A Secure Routing Protocol for MWNs Based on Cross-Layer Dynamic Reputation Mechanism
    Lin Hui, Ma Jianfeng, Xu Li
    2014, 51(7): 1486-1496.
    Abstract PDF
    Efficient and Provably-Secure Certificate-Based Key Encapsulation Mechanism in the Standard Model
    Lu Yang and Li Jiguo
    2014, 51(7): 1497-1505.
    Abstract PDF
    RFID Lightweight Authentication Protocol Based on PRF
    Jin Yongming, Wu Qiying, Shi Zhiqiang, Lu Xiang, Sun Limin
    2014, 51(7): 1506-1514.
    Abstract PDF
    LWE Problem with Uniform Secret and Errors and Its Application
    Sun Xiaochao, Li Bao, and Lu Xianhui
    2014, 51(7): 1515-1519.
    Abstract PDF
    Related-Key Impossible Differential Cryptanalysis on LBlock
    Wei Hongru and Yin Guangli
    2014, 51(7): 1520-1526.
    Abstract PDF
    Rational Fair Computation with Computational Sequential Equilibrium
    Wang Yilei, Zheng Zhihua, Wang Hao, Xu Qiuliang
    2014, 51(7): 1527-1537.
    Abstract PDF
    A Tor Anonymous Communication System with Security Enhancements
    Zhou Yanwei, Yang Qiliang, Yang Bo, Wu Zhenqiang
    2014, 51(7): 1538-1546.
    Abstract PDF
    Plaintext Recovery Based on Memory Dependence Measurement
    Wei Qiang, Wu Zehui, and Wang Qingxian
    2014, 51(7): 1547-1554.
    Abstract PDF
    Towards Analysis of Security in I2P’s Path Selection
    Liu Peipeng, Wang Lihong, Shi Jinqiao, Tan Qingfeng
    2014, 51(7): 1555-1564.
    Abstract PDF
    Algorithm of Optimal Security Hardening Measures Against Insider Threat
    Chen Xiaojun, Shi Jinqiao, Xu Fei, Pu Yiguo, Guo Li
    2014, 51(7): 1565-1577.
    Abstract PDF
    UML-Based Modeling Method of Network Security Infrastructure
    Bu Ning, Liu Yuling, Lian Yifeng, Huang Liang
    2014, 51(7): 1578-1593.
    Abstract PDF
    Multi-Addresses Amplification DoS Attacks by Native IPv6 and IPv6Tunnels
    Cui Yu, Zhang Hongli, Tian Zhihong, and Fang Binxing
    2014, 51(7): 1594-1603.
    Abstract PDF
    Action-Based Multi-level Access Control Model
    Su Mang, Li Fenghua, Shi Guozhen
    2014, 51(7): 1604-1613.
    Abstract PDF
    Sybil Group Attack Detection in Kad Network
    Li Qiang, Li Zhoujun, Zhou Changbin, Yu Jie
    2014, 51(7): 1614-1623.
    Abstract PDF
    Detection of XSS Vulnerabilities in Online Flash
    Liu Qixu, Wen Tao, Wen Guanxing
    2014, 51(7): 1624-1632.
    Abstract PDF
    Security Architecture to Deal with APT Attacks: Abnormal Discovery
    Du Yuejin, Zhai Lidong, Li Yue, Jia Zhaopeng
    2014, 51(7): 1633-1645.
    Abstract PDF