Advanced Search

    column
    Research Advances on Secure Searchable Encryption
    Dong Xiaolei, Zhou Jun, Cao Zhenfu
    2017, 54(10): 2107-2120. DOI: 10.7544/issn1000-1239.2017.20170627
    Abstract FullText HTML PDF
    Recent Advances in Lattice-Based Cryptography
    Zhang Pingyuan, Jiang Han, Cai Jie, Wang Chenguang, Zheng Zhihua, Xu Qiuliang
    2017, 54(10): 2121-2129. DOI: 10.7544/issn1000-1239.2017.20170628
    Abstract FullText HTML PDF
    Survey of Internet of Things Security
    Zhang Yuqing, Zhou Wei, Peng Anni
    2017, 54(10): 2130-2143. DOI: 10.7544/issn1000-1239.2017.20170470
    Abstract FullText HTML PDF
    Survey on Redactable Signatures
    Ma Jinhua, Liu Jianghua, Wu Wei, Huang Xinyi
    2017, 54(10): 2144-2152. DOI: 10.7544/issn1000-1239.2017.20170646
    Abstract FullText HTML PDF
    Survey on Private Preserving Set Intersection Technology
    Shen Liyan, Chen Xiaojun, Shi Jinqiao, Hu Lanlan
    2017, 54(10): 2153-2169. DOI: 10.7544/issn1000-1239.2017.20170461
    Abstract FullText HTML PDF
    Survey on Privacy Preserving Techniques for Blockchain Technology
    Zhu Liehuang, Gao Feng, Shen Meng, Li Yandong, Zheng Baokun, Mao Hongliang, Wu Zhen
    2017, 54(10): 2170-2186. DOI: 10.7544/issn1000-1239.2017.20170471
    Abstract FullText HTML PDF
    RAKA: New Authenticated Key Agreement Protocol Based on Ring-LWE
    Yang Yatao, Zhang Yaze, Li Zichen, Zhang Fengjuan, Liu Boya
    2017, 54(10): 2187-2192. DOI: 10.7544/issn1000-1239.2017.20170477
    Abstract FullText HTML PDF
    Efficient Hierarchical Identity-Based Encryption Scheme from Learning with Errors
    Ye Qing, Hu Mingxing, Tang Yongli, Liu Kun, Yan Xixi
    2017, 54(10): 2193-2204. DOI: 10.7544/issn1000-1239.2017.20170394
    Abstract FullText HTML PDF
    Research on the LED Lightweight Cipher Against the Statistical Fault Analysis in Internet of Things
    Li Wei, Ge Chenyu, Gu Dawu, Liao Linfeng, Gao Zhiyong, Guo Zheng, Liu Ya, Liu Zhiqiang, Shi Xiujin
    2017, 54(10): 2205-2214. DOI: 10.7544/issn1000-1239.2017.20170437
    Abstract FullText HTML PDF
    An Efficient Single Server-Aided k-out-of-n Oblivious Transfer Protocol
    Zhao Shengnan, Jiang Han, Wei Xiaochao, Ke Junming, Zhao Minghao
    2017, 54(10): 2215-2223. DOI: 10.7544/issn1000-1239.2017.20170463
    Abstract FullText HTML PDF
    Security Analysis of Lightweight Block Cipher ESF
    Yin Jun, Ma Chuyan, Song Jian, Zeng Guang, Ma Chuangui
    2017, 54(10): 2224-2231. DOI: 10.7544/issn1000-1239.2017.20170455
    Abstract FullText HTML PDF
    Dual Server Identity-Based Encryption with Equality Test for Cloud Computing
    Wu Libing, Zhang Yubo, He Debiao
    2017, 54(10): 2232-2243. DOI: 10.7544/issn1000-1239.2017.20170446
    Abstract FullText HTML PDF
    Generic Tightly Secure Signature Schemes from Strong Chameleon Hash Functions
    Li Fei, Gao Wei, Wang Guilin, Xie Dongqing, Tang Chunming
    2017, 54(10): 2244-2254. DOI: 10.7544/issn1000-1239.2017.20170422
    Abstract FullText HTML PDF
    An Intrusion Detection Scheme Based on Semi-Supervised Learning and Information Gain Ratio
    Xu Mengfan, Li Xinghua, Liu Hai, Zhong Cheng, Ma Jianfeng
    2017, 54(10): 2255-2267. DOI: 10.7544/issn1000-1239.2017.20170456
    Abstract FullText HTML PDF
    A TrustZone Based Application Protection Scheme in Highly Open Scenarios
    Zhang Yingjun, Feng Dengguo, Qin Yu, Yang Bo
    2017, 54(10): 2268-2283. DOI: 10.7544/issn1000-1239.2017.20170387
    Abstract FullText HTML PDF
    A Method of Constructing the Model of Trusted Virtual Machine Migration
    Shi Yuan, Zhang Huanguo, Wu Fusheng
    2017, 54(10): 2284-2295. DOI: 10.7544/issn1000-1239.2017.20170465
    Abstract FullText HTML PDF
    A System for Scoring the Exploitability of Vulnerability Based Types
    Lei Kenan, Zhang Yuqing, Wu Chensi, Ma Hua
    2017, 54(10): 2296-2309. DOI: 10.7544/issn1000-1239.2017.20170457
    Abstract FullText HTML PDF
    A Virtual Machine Introspection Triggering Mechanism Based on VMFUNC
    Liu Weijie, Wang Lina, Tan Cheng, Xu Lai
    2017, 54(10): 2310-2320. DOI: 10.7544/issn1000-1239.2017.20170452
    Abstract FullText HTML PDF
    Design and Implementation of Mimic Network Operating System
    Wang Zhenpeng, Hu Hongchao, Cheng Guozhen
    2017, 54(10): 2321-2333. DOI: 10.7544/issn1000-1239.2017.20170444
    Abstract FullText HTML PDF
    Detection of Covert and Suspicious DNS Behavior in Advanced Persistent Threats
    Wang Xiaoqi, Li Qiang, Yan Guanghua, Xuan Guangzhe, Guo Dong
    2017, 54(10): 2334-2343. DOI: 10.7544/issn1000-1239.2017.20170403
    Abstract FullText HTML PDF
    Advanced Persistent Threats Detection Game with Expert System for Cloud
    Hu Qing, Lü Shichao, Shi Zhiqiang, Sun Limin, Xiao Liang
    2017, 54(10): 2344-2355. DOI: 10.7544/issn1000-1239.2017.20170433
    Abstract FullText HTML PDF
    A Dynamic Defense Mechanism for SDN DoS Attacks Based on Network Resource Management Technology
    Wang Tao, Chen Hongchang, Cheng Guozhen
    2017, 54(10): 2356-2368. DOI: 10.7544/issn1000-1239.2017.20170389
    Abstract FullText HTML PDF
    Attribute-Based Encryption with Keyword Search in Mobile Cloud Storage
    Su Hang, Zhu Zhiqiang, Sun Lei
    2017, 54(10): 2369-2377. DOI: 10.7544/issn1000-1239.2017.20170431
    Abstract FullText HTML PDF
    A Secure Outsourced Fusion Denoising Scheme in Multiple Encrypted Remote Sensing Images
    Huang Dongmei, Dai Liang, Wei Lifei, Wei Quanmiao, Wu Guojian
    2017, 54(10): 2378-2389. DOI: 10.7544/issn1000-1239.2017.20170427
    Abstract FullText HTML PDF
    Research on Scaling Technology of Bitcoin Blockchain
    Yu Hui, Zhang Zongyang, Liu Jianwei
    2017, 54(10): 2390-2403. DOI: 10.7544/issn1000-1239.2017.20170416
    Abstract FullText HTML PDF
    Compliance Analysis of Authorization Constraints in Business Process
    Bo Yang, Xia Chunhe
    2017, 54(10): 2404-2418. DOI: 10.7544/issn1000-1239.2017.20170397
    Abstract FullText HTML PDF