Advanced Search

    column
    Survey of Android Vulnerability Detection
    Zhang Yuqing, Fang Zhejun, Wang Kai, Wang Zhiqiang, Yue Hongzhou, Liu Qixu, He Yuan, Li Xiaoqi, Yang Gang
    2015, 52(10): 2167-2177. DOI: 10.7544/issn1000-1239.2015.20150572
    Abstract PDF
    A Cloud Model Based Trust Evaluation Model for Defense Agent
    Yu Yang, Xia Chunhe, Wang Xinghe
    2015, 52(10): 2178-2191. DOI: 10.7544/issn1000-1239.2015.20150417
    Abstract PDF
    An Auditing Protocol for Data Storage in Cloud Computing with Data Dynamics
    Qin Zhiguang, Wang Shiyu, Zhao Yang, Xiong Hu, Wu Songyang
    2015, 52(10): 2192-2199. DOI: 10.7544/issn1000-1239.2015.20150509
    Abstract PDF
    SPFPA: A Format Parsing Approach for Unknown Security Protocols
    Zhu Yuna, Han Jihong, Yuan Lin, Chen Hantuo, Fan Yudan
    2015, 52(10): 2200-2211. DOI: 10.7544/issn1000-1239.2015.20150568
    Abstract PDF
    pTrace: A Counter Technology of DDoS Attack Source for Controllable Cloud Computing
    Li Baohui, Xu Kefu, Zhang Peng, Guo Li
    2015, 52(10): 2212-2223. DOI: 10.7544/issn1000-1239.2015.20150577
    Abstract PDF
    A Trustzone-Based Trusted Code Execution with Strong Security Requirements
    Zhang Yingjun, Feng Dengguo, Qin Yu, Yang Bo
    2015, 52(10): 2224-2238. DOI: 10.7544/issn1000-1239.2015.20150582
    Abstract PDF
    Multi-Criteria Mathematical Programming Based Method on Network Intrusion Detection
    Wang Bo, Nie Xiaowei
    2015, 52(10): 2239-2246. DOI: 10.7544/issn1000-1239.2015.20150587
    Abstract PDF
    Advances in Key Techniques of Practical Secure Multi-Party Computation
    Jiang Han, Xu Qiuliang
    2015, 52(10): 2247-2257. DOI: 10.7544/issn1000-1239.2015.20150763
    Abstract PDF
    A Strongly Secure Lattice-Based Key Exchange Protocol
    Wen Weiqiang, Wang Libin
    2015, 52(10): 2258-2269. DOI: 10.7544/issn1000-1239.2015.20150518
    Abstract PDF
    Adaptively Secure Outsourcing Ciphertext-Policy Attribute-Based Encryption
    Wang Hao, Zheng Zhihua, Wu Lei, Wang Yilei
    2015, 52(10): 2270-2280. DOI: 10.7544/issn1000-1239.2015.20150497
    Abstract PDF
    A Privacy Preserving Attribute-Based Encryption Scheme with User Revocation
    Li Jiguo, Shi Yuerong, Zhang Yichen
    2015, 52(10): 2281-2292. DOI: 10.7544/issn1000-1239.2015.20150580
    Abstract PDF
    Accountable Attribute-Based Encryption Scheme Without Key Escrow
    Zhang Xing, Wen Zilong, Shen Qingni, Fang Yuejian, Wu Zhonghai
    2015, 52(10): 2293-2303. DOI: 10.7544/issn1000-1239.2015.20150550
    Abstract PDF
    A Trustee-Based and Efficient Divisible E-Cash Scheme
    Yu Yulei, Dong Xiaolei, Cao Zhenfu
    2015, 52(10): 2304-2312. DOI: 10.7544/issn1000-1239.2015.20150596
    Abstract PDF
    A Discretionary Searchable Encryption Scheme in Multi-User Settings
    Li Zhen, Jiang Han, Zhao Minghao
    2015, 52(10): 2313-2322. DOI: 10.7544/issn1000-1239.2015.20150504
    Abstract PDF
    A Universally Composable Secure Group Ownership Transfer Protocol for RFID Tags
    Yuan Bianqing, Liu Jiqiang
    2015, 52(10): 2323-2331. DOI: 10.7544/issn1000-1239.2015.20150555
    Abstract PDF
    Rational Secret Sharing Scheme Based on Reconstruction Order Adjustment Mechanism
    Liu Hai, Li Xinghua, Ma Jianfeng
    2015, 52(10): 2332-2340. DOI: 10.7544/issn1000-1239.2015.20150511
    Abstract PDF
    Advances of Privacy Preservation in Internet of Things
    Dong Xiaolei
    2015, 52(10): 2341-2352. DOI: 10.7544/issn1000-1239.2015.20150764
    Abstract PDF
    Privacy-Preserving Public Auditing for Multiple Managers Shared Data in the Cloud
    Fu Anmin, Qin Ningyuan, Song Jianye, Su Mang
    2015, 52(10): 2353-2362. DOI: 10.7544/issn1000-1239.2015.20150544
    Abstract PDF
    A Community Detecting Method Based on the Node Intimacy and Degree in Social Network
    Liu Yao, Kang Xiaohui, Gao Hong, Liu Qiao, Wu Zufeng, Qin Zhiguang
    2015, 52(10): 2363-2372. DOI: 10.7544/issn1000-1239.2015.20150407
    Abstract PDF
    Towards Measuring Unobservability in Anonymous Communication Systems
    Tan Qingfeng, Shi Jinqiao, Fang Binxing, Guo Li, Zhang Wentao, Wang Xuebin, Wei Bingjie
    2015, 52(10): 2373-2381. DOI: 10.7544/issn1000-1239.2015.20150562
    Abstract PDF
    Study on Semi-Homogenous Algorithm Based on Ring Generalization
    He Xianmang, Chen Yindong, Li Dong, Hao Yanni
    2015, 52(10): 2382-2394. DOI: 10.7544/issn1000-1239.2015.20150494
    Abstract PDF
    Privacy Requirement Modeling and Consistency Checking in Cloud Computing
    Wang Jin, Huang Zhiqiu
    2015, 52(10): 2395-2410. DOI: 10.7544/issn1000-1239.2015.20150513
    Abstract PDF
    Collaboration Supported Mandatory Access Control Model
    Fan Yanfang, Cai Ying
    2015, 52(10): 2411-2421. DOI: 10.7544/issn1000-1239.2015.20150574
    Abstract PDF
    Provable Data Possession by Partial Delegation
    Zhong Ting, Han Xiao, Zhao Yulong
    2015, 52(10): 2422-2430. DOI: 10.7544/issn1000-1239.2015.20150515
    Abstract PDF