Advanced Search

    column
    Research Advances on Big Data Security and Privacy Preserving
    Cao Zhenfu, Dong Xiaolei, Zhou Jun, Shen Jiachen, Ning Jianting, Gong Junqing
    2016, 53(10): 2137-2151. DOI: 10.7544/issn1000-1239.2016.20160684
    Abstract PDF
    Secure Multiparty Computation in Cloud Computing
    Jiang Han, Xu Qiuliang
    2016, 53(10): 2152-2162. DOI: 10.7544/issn1000-1239.2016.20160685
    Abstract PDF
    Survey of HTML5 New Features Security
    Zhang Yuqing, Jia Yan, Lei Kenan, Lü Shaoqing, Yue Hongzhou
    2016, 53(10): 2163-2172. DOI: 10.7544/issn1000-1239.2016.20160686
    Abstract PDF
    Advances in Password Security
    Wang Ping, Wang Ding, Huang Xinyi
    2016, 53(10): 2173-2188. DOI: 10.7544/issn1000-1239.2016.20160483
    Abstract PDF
    Study of Botnets Trends
    Li Ke, Fang Binxing, Cui Xiang, Liu Qixu
    2016, 53(10): 2189-2206. DOI: 10.7544/issn1000-1239.2016.20160419
    Abstract PDF
    Decentralized Attribute-Based Encryption Scheme with Constant-Size Ciphertexts
    Xiao Siyu, Ge Aijun, Ma Chuangui
    2016, 53(10): 2207-2215. DOI: 10.7544/issn1000-1239.2016.20160459
    Abstract PDF
    A Multi-Bit Fully Homomorphic Encryption with Better Key Size from LWE
    Chen Zhigang, Song Xinxia, Zhao Xiufeng
    2016, 53(10): 2216-2223. DOI: 10.7544/issn1000-1239.2016.20160431
    Abstract PDF
    Multi-Point Joint Power Analysis Attack Against SM4
    Du Zhibo, Wu Zhen, Wang Min, Rao Jintao
    2016, 53(10): 2224-2229. DOI: 10.7544/issn1000-1239.2016.20160420
    Abstract PDF
    Verifier-Based Three-Party Password Authenticated Key Exchange Protocol
    Yang Xiaoyan, Hou Mengbo, Wei Xiaochao
    2016, 53(10): 2230-2238. DOI: 10.7544/issn1000-1239.2016.20160463
    Abstract PDF
    An Efficient and Expressive Attribute-Based Encryption Scheme with Chosen Ciphertext Security
    Zhang Kai, Wei Lifei, Li Xiangxue, Chen Jie, Qian Haifeng
    2016, 53(10): 2239-2247. DOI: 10.7544/issn1000-1239.2016.20160430
    Abstract PDF
    Security Analysis and Evaluation for the Usage of Settings Mechanism in Android
    Lu Yemian, Ying Lingyun, Su Purui, Feng Dengguo, Jing Erxia, Gu Yacong
    2016, 53(10): 2248-2261. DOI: 10.7544/issn1000-1239.2016.20160449
    Abstract PDF
    SQL Injection Prevention Based on Sensitive Characters
    Zhang Huilin, Ding Yu, Zhang Lihua, Duan Lei, Zhang Chao, Wei Tao, Li Guancheng, Han Xinhui
    2016, 53(10): 2262-2276. DOI: 10.7544/issn1000-1239.2016.20160443
    Abstract PDF
    A Code Reuse Attack Protection Technique Based on Code Anti-Leakage
    Wang Ye, Li Qingbao, Zeng Guangyu, Chen Zhifeng
    2016, 53(10): 2277-2287. DOI: 10.7544/issn1000-1239.2016.20160423
    Abstract PDF
    VDNS: An Algorithm for Cross-Platform Vulnerability Searching in Binary Firmware
    Chang Qing, Liu Zhongjin, Wang Mengtao, Chen Yu, Shi Zhiqiang, Sun Limin
    2016, 53(10): 2288-2298. DOI: 10.7544/issn1000-1239.2016.20160442
    Abstract PDF
    Maldetect: An Android Malware Detection System Based on Abstraction of Dalvik Instructions
    Chen Tieming, Yang Yimin, Chen Bo
    2016, 53(10): 2299-2306. DOI: 10.7544/issn1000-1239.2016.20160348
    Abstract PDF
    A Novel Multiple Bits Reversible Data Hiding in Encrypted Domain Based on R-LWE
    Ke Yan, Zhang Minqing, Su Tingting
    2016, 53(10): 2307-2322. DOI: 10.7544/issn1000-1239.2016.20160444
    Abstract PDF
    Anonymous Mutual Authentication and Key Agreement Protocol in Multi-Server Architecture for VANETs
    Xie Yong, Wu Libing, Zhang Yubo, Ye Luyao
    2016, 53(10): 2323-2333. DOI: 10.7544/issn1000-1239.2016.20160428
    Abstract PDF
    Privacy-Preserving Public Auditing for Dynamic Group Based on Hierarchical Tree
    Huang Longxia, Zhang Gongxuan, Fu Anmin
    2016, 53(10): 2334-2342. DOI: 10.7544/issn1000-1239.2016.20160429
    Abstract PDF
    Privacy Preserving Data Publishing via Weighted Bayesian Networks
    Wang Liang, Wang Weiping, Meng Dan
    2016, 53(10): 2343-2353. DOI: 10.7544/issn1000-1239.2016.20160465
    Abstract PDF
    A Graph-Clustering Anonymity Method Implemented by Genetic Algorithm for Privacy-Preserving
    Jiang Huowen, Zeng Guosun, Hu Kekun
    2016, 53(10): 2354-2364. DOI: 10.7544/issn1000-1239.2016.20160435
    Abstract PDF
    Online/Offline Ciphertext-Policy Attribute-Based Searchable Encryption
    Chen Dongdong, Cao Zhenfu, Dong Xiaolei
    2016, 53(10): 2365-2375. DOI: 10.7544/issn1000-1239.2016.20160416
    Abstract PDF
    TSNP: A Novel PCLSecure and Efficient Group Authentication Protocol in Space Information Network
    Li Xuefeng, Zhang Junwei, Ma Jianfeng, Liu Hai
    2016, 53(10): 2376-2392. DOI: 10.7544/issn1000-1239.2016.20160453
    Abstract PDF
    Multi-Authority CP-ABE with Policy Update in Cloud Storage
    Wu Guangqiang
    2016, 53(10): 2393-2399. DOI: 10.7544/issn1000-1239.2016.20160432
    Abstract PDF
    A New Password Authentication Method Based on Fingerprint and Mobile Phone Assistance
    An Di, Yang Chao, Jiang Qi, Ma Jianfeng
    2016, 53(10): 2400-2411. DOI: 10.7544/issn1000-1239.2016.20160439
    Abstract PDF
    Improved Endorsed E-Cash System with DAA-A
    Liu Xin, Zhang Bo
    2016, 53(10): 2412-2429. DOI: 10.7544/issn1000-1239.2016.20160413
    Abstract PDF