• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search

Research Advances on Secure Searchable Encryption
Dong Xiaolei, Zhou Jun, Cao Zhenfu
2017, 54(10): 2107-2120. DOI: 10.7544/issn1000-1239.2017.20170627
Abstract PDF
Recent Advances in Lattice-Based Cryptography
Zhang Pingyuan, Jiang Han, Cai Jie, Wang Chenguang, Zheng Zhihua, Xu Qiuliang
2017, 54(10): 2121-2129. DOI: 10.7544/issn1000-1239.2017.20170628
Abstract PDF
Survey of Internet of Things Security
Zhang Yuqing, Zhou Wei, Peng Anni
2017, 54(10): 2130-2143. DOI: 10.7544/issn1000-1239.2017.20170470
Abstract PDF
Survey on Redactable Signatures
Ma Jinhua, Liu Jianghua, Wu Wei, Huang Xinyi
2017, 54(10): 2144-2152. DOI: 10.7544/issn1000-1239.2017.20170646
Abstract PDF
Survey on Private Preserving Set Intersection Technology
Shen Liyan, Chen Xiaojun, Shi Jinqiao, Hu Lanlan
2017, 54(10): 2153-2169. DOI: 10.7544/issn1000-1239.2017.20170461
Abstract PDF
Survey on Privacy Preserving Techniques for Blockchain Technology
Zhu Liehuang, Gao Feng, Shen Meng, Li Yandong, Zheng Baokun, Mao Hongliang, Wu Zhen
2017, 54(10): 2170-2186. DOI: 10.7544/issn1000-1239.2017.20170471
Abstract PDF
RAKA: New Authenticated Key Agreement Protocol Based on Ring-LWE
Yang Yatao, Zhang Yaze, Li Zichen, Zhang Fengjuan, Liu Boya
2017, 54(10): 2187-2192. DOI: 10.7544/issn1000-1239.2017.20170477
Abstract PDF
Efficient Hierarchical Identity-Based Encryption Scheme from Learning with Errors
Ye Qing, Hu Mingxing, Tang Yongli, Liu Kun, Yan Xixi
2017, 54(10): 2193-2204. DOI: 10.7544/issn1000-1239.2017.20170394
Abstract PDF
Research on the LED Lightweight Cipher Against the Statistical Fault Analysis in Internet of Things
Li Wei, Ge Chenyu, Gu Dawu, Liao Linfeng, Gao Zhiyong, Guo Zheng, Liu Ya, Liu Zhiqiang, Shi Xiujin
2017, 54(10): 2205-2214. DOI: 10.7544/issn1000-1239.2017.20170437
Abstract PDF
An Efficient Single Server-Aided k-out-of-n Oblivious Transfer Protocol
Zhao Shengnan, Jiang Han, Wei Xiaochao, Ke Junming, Zhao Minghao
2017, 54(10): 2215-2223. DOI: 10.7544/issn1000-1239.2017.20170463
Abstract PDF
Security Analysis of Lightweight Block Cipher ESF
Yin Jun, Ma Chuyan, Song Jian, Zeng Guang, Ma Chuangui
2017, 54(10): 2224-2231. DOI: 10.7544/issn1000-1239.2017.20170455
Abstract PDF
Dual Server Identity-Based Encryption with Equality Test for Cloud Computing
Wu Libing, Zhang Yubo, He Debiao
2017, 54(10): 2232-2243. DOI: 10.7544/issn1000-1239.2017.20170446
Abstract PDF
Generic Tightly Secure Signature Schemes from Strong Chameleon Hash Functions
Li Fei, Gao Wei, Wang Guilin, Xie Dongqing, Tang Chunming
2017, 54(10): 2244-2254. DOI: 10.7544/issn1000-1239.2017.20170422
Abstract PDF
An Intrusion Detection Scheme Based on Semi-Supervised Learning and Information Gain Ratio
Xu Mengfan, Li Xinghua, Liu Hai, Zhong Cheng, Ma Jianfeng
2017, 54(10): 2255-2267. DOI: 10.7544/issn1000-1239.2017.20170456
Abstract PDF
A TrustZone Based Application Protection Scheme in Highly Open Scenarios
Zhang Yingjun, Feng Dengguo, Qin Yu, Yang Bo
2017, 54(10): 2268-2283. DOI: 10.7544/issn1000-1239.2017.20170387
Abstract PDF
A Method of Constructing the Model of Trusted Virtual Machine Migration
Shi Yuan, Zhang Huanguo, Wu Fusheng
2017, 54(10): 2284-2295. DOI: 10.7544/issn1000-1239.2017.20170465
Abstract PDF
A System for Scoring the Exploitability of Vulnerability Based Types
Lei Kenan, Zhang Yuqing, Wu Chensi, Ma Hua
2017, 54(10): 2296-2309. DOI: 10.7544/issn1000-1239.2017.20170457
Abstract PDF
A Virtual Machine Introspection Triggering Mechanism Based on VMFUNC
Liu Weijie, Wang Lina, Tan Cheng, Xu Lai
2017, 54(10): 2310-2320. DOI: 10.7544/issn1000-1239.2017.20170452
Abstract PDF
Design and Implementation of Mimic Network Operating System
Wang Zhenpeng, Hu Hongchao, Cheng Guozhen
2017, 54(10): 2321-2333. DOI: 10.7544/issn1000-1239.2017.20170444
Abstract PDF
Detection of Covert and Suspicious DNS Behavior in Advanced Persistent Threats
Wang Xiaoqi, Li Qiang, Yan Guanghua, Xuan Guangzhe, Guo Dong
2017, 54(10): 2334-2343. DOI: 10.7544/issn1000-1239.2017.20170403
Abstract PDF
Advanced Persistent Threats Detection Game with Expert System for Cloud
Hu Qing, Lü Shichao, Shi Zhiqiang, Sun Limin, Xiao Liang
2017, 54(10): 2344-2355. DOI: 10.7544/issn1000-1239.2017.20170433
Abstract PDF
A Dynamic Defense Mechanism for SDN DoS Attacks Based on Network Resource Management Technology
Wang Tao, Chen Hongchang, Cheng Guozhen
2017, 54(10): 2356-2368. DOI: 10.7544/issn1000-1239.2017.20170389
Abstract PDF
Attribute-Based Encryption with Keyword Search in Mobile Cloud Storage
Su Hang, Zhu Zhiqiang, Sun Lei
2017, 54(10): 2369-2377. DOI: 10.7544/issn1000-1239.2017.20170431
Abstract PDF
A Secure Outsourced Fusion Denoising Scheme in Multiple Encrypted Remote Sensing Images
Huang Dongmei, Dai Liang, Wei Lifei, Wei Quanmiao, Wu Guojian
2017, 54(10): 2378-2389. DOI: 10.7544/issn1000-1239.2017.20170427
Abstract PDF
Research on Scaling Technology of Bitcoin Blockchain
Yu Hui, Zhang Zongyang, Liu Jianwei
2017, 54(10): 2390-2403. DOI: 10.7544/issn1000-1239.2017.20170416
Abstract PDF
Compliance Analysis of Authorization Constraints in Business Process
Bo Yang, Xia Chunhe
2017, 54(10): 2404-2418. DOI: 10.7544/issn1000-1239.2017.20170397
Abstract PDF