• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search

Survey of Android Vulnerability Detection
Zhang Yuqing, Fang Zhejun, Wang Kai, Wang Zhiqiang, Yue Hongzhou, Liu Qixu, He Yuan, Li Xiaoqi, Yang Gang
2015, 52(10): 2167-2177. DOI: 10.7544/issn1000-1239.2015.20150572
Abstract PDF
A Cloud Model Based Trust Evaluation Model for Defense Agent
Yu Yang, Xia Chunhe, Wang Xinghe
2015, 52(10): 2178-2191. DOI: 10.7544/issn1000-1239.2015.20150417
Abstract PDF
An Auditing Protocol for Data Storage in Cloud Computing with Data Dynamics
Qin Zhiguang, Wang Shiyu, Zhao Yang, Xiong Hu, Wu Songyang
2015, 52(10): 2192-2199. DOI: 10.7544/issn1000-1239.2015.20150509
Abstract PDF
SPFPA: A Format Parsing Approach for Unknown Security Protocols
Zhu Yuna, Han Jihong, Yuan Lin, Chen Hantuo, Fan Yudan
2015, 52(10): 2200-2211. DOI: 10.7544/issn1000-1239.2015.20150568
Abstract PDF
pTrace: A Counter Technology of DDoS Attack Source for Controllable Cloud Computing
Li Baohui, Xu Kefu, Zhang Peng, Guo Li
2015, 52(10): 2212-2223. DOI: 10.7544/issn1000-1239.2015.20150577
Abstract PDF
A Trustzone-Based Trusted Code Execution with Strong Security Requirements
Zhang Yingjun, Feng Dengguo, Qin Yu, Yang Bo
2015, 52(10): 2224-2238. DOI: 10.7544/issn1000-1239.2015.20150582
Abstract PDF
Multi-Criteria Mathematical Programming Based Method on Network Intrusion Detection
Wang Bo, Nie Xiaowei
2015, 52(10): 2239-2246. DOI: 10.7544/issn1000-1239.2015.20150587
Abstract PDF
Advances in Key Techniques of Practical Secure Multi-Party Computation
Jiang Han, Xu Qiuliang
2015, 52(10): 2247-2257. DOI: 10.7544/issn1000-1239.2015.20150763
Abstract PDF
A Strongly Secure Lattice-Based Key Exchange Protocol
Wen Weiqiang, Wang Libin
2015, 52(10): 2258-2269. DOI: 10.7544/issn1000-1239.2015.20150518
Abstract PDF
Adaptively Secure Outsourcing Ciphertext-Policy Attribute-Based Encryption
Wang Hao, Zheng Zhihua, Wu Lei, Wang Yilei
2015, 52(10): 2270-2280. DOI: 10.7544/issn1000-1239.2015.20150497
Abstract PDF
A Privacy Preserving Attribute-Based Encryption Scheme with User Revocation
Li Jiguo, Shi Yuerong, Zhang Yichen
2015, 52(10): 2281-2292. DOI: 10.7544/issn1000-1239.2015.20150580
Abstract PDF
Accountable Attribute-Based Encryption Scheme Without Key Escrow
Zhang Xing, Wen Zilong, Shen Qingni, Fang Yuejian, Wu Zhonghai
2015, 52(10): 2293-2303. DOI: 10.7544/issn1000-1239.2015.20150550
Abstract PDF
A Trustee-Based and Efficient Divisible E-Cash Scheme
Yu Yulei, Dong Xiaolei, Cao Zhenfu
2015, 52(10): 2304-2312. DOI: 10.7544/issn1000-1239.2015.20150596
Abstract PDF
A Discretionary Searchable Encryption Scheme in Multi-User Settings
Li Zhen, Jiang Han, Zhao Minghao
2015, 52(10): 2313-2322. DOI: 10.7544/issn1000-1239.2015.20150504
Abstract PDF
A Universally Composable Secure Group Ownership Transfer Protocol for RFID Tags
Yuan Bianqing, Liu Jiqiang
2015, 52(10): 2323-2331. DOI: 10.7544/issn1000-1239.2015.20150555
Abstract PDF
Rational Secret Sharing Scheme Based on Reconstruction Order Adjustment Mechanism
Liu Hai, Li Xinghua, Ma Jianfeng
2015, 52(10): 2332-2340. DOI: 10.7544/issn1000-1239.2015.20150511
Abstract PDF
Advances of Privacy Preservation in Internet of Things
Dong Xiaolei
2015, 52(10): 2341-2352. DOI: 10.7544/issn1000-1239.2015.20150764
Abstract PDF
Privacy-Preserving Public Auditing for Multiple Managers Shared Data in the Cloud
Fu Anmin, Qin Ningyuan, Song Jianye, Su Mang
2015, 52(10): 2353-2362. DOI: 10.7544/issn1000-1239.2015.20150544
Abstract PDF
A Community Detecting Method Based on the Node Intimacy and Degree in Social Network
Liu Yao, Kang Xiaohui, Gao Hong, Liu Qiao, Wu Zufeng, Qin Zhiguang
2015, 52(10): 2363-2372. DOI: 10.7544/issn1000-1239.2015.20150407
Abstract PDF
Towards Measuring Unobservability in Anonymous Communication Systems
Tan Qingfeng, Shi Jinqiao, Fang Binxing, Guo Li, Zhang Wentao, Wang Xuebin, Wei Bingjie
2015, 52(10): 2373-2381. DOI: 10.7544/issn1000-1239.2015.20150562
Abstract PDF
Study on Semi-Homogenous Algorithm Based on Ring Generalization
He Xianmang, Chen Yindong, Li Dong, Hao Yanni
2015, 52(10): 2382-2394. DOI: 10.7544/issn1000-1239.2015.20150494
Abstract PDF
Privacy Requirement Modeling and Consistency Checking in Cloud Computing
Wang Jin, Huang Zhiqiu
2015, 52(10): 2395-2410. DOI: 10.7544/issn1000-1239.2015.20150513
Abstract PDF
Collaboration Supported Mandatory Access Control Model
Fan Yanfang, Cai Ying
2015, 52(10): 2411-2421. DOI: 10.7544/issn1000-1239.2015.20150574
Abstract PDF
Provable Data Possession by Partial Delegation
Zhong Ting, Han Xiao, Zhao Yulong
2015, 52(10): 2422-2430. DOI: 10.7544/issn1000-1239.2015.20150515
Abstract PDF