Advanced Search

    column
    Protection Methods for Cloud Data Security
    Shen Jian, Zhou Tianqi, Cao Zhenfu
    2021, 58(10): 2079-2098. DOI: 10.7544/issn1000-1239.2021.20210805
    Abstract FullText HTML PDF
    Data Privacy-Preserving for Blockchain: State of the Art and Trends
    Wang Chenxu, Cheng Jiacheng, Sang Xinxin, Li Guodong, Guan Xiaohong
    2021, 58(10): 2099-2119. DOI: 10.7544/issn1000-1239.2021.20210804
    Abstract FullText HTML PDF
    Detection and Analysis Technology of Cybercrime
    Hong Geng, Yang Sen, Ye Han, Yang Zhemin, Yang Min
    2021, 58(10): 2120-2139. DOI: 10.7544/issn1000-1239.2021.20210855
    Abstract FullText HTML PDF
    Software Security Vulnerability Mining Based on Deep Learning
    Gu Mianxue, Sun Hongyu, Han Dan, Yang Su, Cao Wanying, Guo Zhen, Cao Chunjie, Wang Wenjie, Zhang Yuqing
    2021, 58(10): 2140-2162. DOI: 10.7544/issn1000-1239.2021.20210620
    Abstract FullText HTML PDF
    Secure Multiparty Computation and Application in Machine Learning
    Guo Juanjuan, Wang Qiongxiao, Xu Xin, Wang Tianyu, Lin Jingqiang
    2021, 58(10): 2163-2186. DOI: 10.7544/issn1000-1239.2021.20210626
    Abstract FullText HTML PDF
    Review of Coded Computing
    Zheng Tengfei, Zhou Tongqing, Cai Zhiping, Wu Hongjia
    2021, 58(10): 2187-2212. DOI: 10.7544/issn1000-1239.2021.20210496
    Abstract FullText HTML PDF
    Key-Recovery Attack on Reduced-Round AES-128 Using the Exchange-Equivalence
    Zhang Li, Wu Wenling, Zhang Lei, Zheng Yafei
    2021, 58(10): 2213-2221. DOI: 10.7544/issn1000-1239.2021.20210549
    Abstract FullText HTML PDF
    Flexible Fine-Grained Authorization Public Key Encryption with Equality Test Under Standard Model
    Deng Xiangtian, Qian Haifeng
    2021, 58(10): 2222-2237. DOI: 10.7544/issn1000-1239.2021.20210596
    Abstract FullText HTML PDF
    Multi-Platform Efficient Implementation and Optimization of Aigis-enc Algorithm
    Shen Shiyu, He Feng, Zhao Yunlei
    2021, 58(10): 2238-2252. DOI: 10.7544/issn1000-1239.2021.20210617
    Abstract FullText HTML PDF
    Provably Secure Traceable Attribute-Based Sanitizable Signature Scheme in the Standard Model
    Li Jiguo, Zhu Liufu, Liu Chengdong, Lu Yang, Han Jinguang, Wang Huaqun, Zhang Yichen
    2021, 58(10): 2253-2264. DOI: 10.7544/issn1000-1239.2021.20210669
    Abstract FullText HTML PDF
    Anonymous Authentication and Key Agreement Protocol for 5G-V2V Based on PUF
    Hou Wanyu, Sun Yu, Li Dawei, Cui Jian, Guan Zhenyu, Liu Jianwei
    2021, 58(10): 2265-2277. DOI: 10.7544/issn1000-1239.2021.20210486
    Abstract FullText HTML PDF
    Adaptor Signature Scheme Based on the SM2 Digital Signature Algorithm
    Peng Cong, Luo Min, He Debiao, Huang Xinyi
    2021, 58(10): 2278-2286. DOI: 10.7544/issn1000-1239.2021.20210645
    Abstract FullText HTML PDF
    A Multi-Pattern Hiding Dynamic Symmetric Searchable Encryption Based on Differential Privacy
    Zhao Ziting, Xu Yin, Song Xiangfu, Jiang Han
    2021, 58(10): 2287-2300. DOI: 10.7544/issn1000-1239.2021.20210614
    Abstract FullText HTML PDF
    SOTS: A Hash Function-Based Shorter Post-Quantum Digital Signature Scheme
    Wei Hongru, Huang Jingyi
    2021, 58(10): 2300-2309. DOI: 10.7544/issn1000-1239.2021.20210619
    Abstract FullText HTML PDF
    One-Time Chameleon Hash Function and Its Application in Redactable Blockchain
    Gao Wei, Chen Liqun, Tang Chunming, Zhang Guoyan, Li Fei
    2021, 58(10): 2310-2318. DOI: 10.7544/issn1000-1239.2021.20210653
    Abstract FullText HTML PDF