nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A chaos-based image encryption algorithm using alternate structure
|
Zhang, YiWei |
|
2007 |
50 |
3 |
p. 334-341 |
artikel |
2 |
A digital authentication watermarking scheme for JPEG images with superior localization and security
|
Yu, Miao |
|
2007 |
50 |
3 |
p. 491-509 |
artikel |
3 |
A formal model for access control with supporting spatial context
|
Zhang, Hong |
|
2007 |
50 |
3 |
p. 419-439 |
artikel |
4 |
Analysis of affinely equivalent Boolean functions
|
Meng, QingShu |
|
2007 |
50 |
3 |
p. 299-306 |
artikel |
5 |
A trinomial type of σ-LFSR oriented toward software implementation
|
Zeng, Guang |
|
2007 |
50 |
3 |
p. 359-372 |
artikel |
6 |
Blind reconnaissance of the pseudo-random sequence in DS/SS signal with negative SNR
|
Huang, XianGao |
|
2007 |
50 |
3 |
p. 510-520 |
artikel |
7 |
Boolean functions of an odd number of variables with maximum algebraic immunity
|
Li, Na |
|
2007 |
50 |
3 |
p. 307-317 |
artikel |
8 |
Classification and counting on multi-continued fractions and its application to multi-sequences
|
Dai, ZongDuo |
|
2007 |
50 |
3 |
p. 351-358 |
artikel |
9 |
Design of secure operating systems with high security levels
|
Qing, SiHan |
|
2007 |
50 |
3 |
p. 399-418 |
artikel |
10 |
Identity-based signature scheme based on quadratic residues
|
Chai, ZhenChuan |
|
2007 |
50 |
3 |
p. 373-380 |
artikel |
11 |
Impossible differential cryptanalysis of Advanced Encryption Standard
|
Chen, Jie |
|
2007 |
50 |
3 |
p. 342-350 |
artikel |
12 |
Log-scaling magnitude modulated watermarking scheme
|
Ling, HeFei |
|
2007 |
50 |
3 |
p. 470-490 |
artikel |
13 |
Modular approach to the design and analysis of password-based security protocols
|
Feng, DengGuo |
|
2007 |
50 |
3 |
p. 381-398 |
artikel |
14 |
Pirate decoder for the broadcast encryption schemes from Crypto 2005
|
Weng, Jian |
|
2007 |
50 |
3 |
p. 318-323 |
artikel |
15 |
Survey of information security
|
Shen, ChangXiang |
|
2007 |
50 |
3 |
p. 273-298 |
artikel |
16 |
Symmetric-key cryptosystem with DNA technology
|
Lu, MingXin |
|
2007 |
50 |
3 |
p. 324-333 |
artikel |
17 |
Trusted dynamic level scheduling based on Bayes trust model
|
Wei, Wang |
|
2007 |
50 |
3 |
p. 456-469 |
artikel |
18 |
Universally composable anonymous Hash certification model
|
Zhang, Fan |
|
2007 |
50 |
3 |
p. 440-455 |
artikel |