nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Access request trustworthiness in weighted access control framework
|
Lun-wei, Wang |
|
|
10 |
1 |
p. 65-69 |
artikel |
2 |
A cluster-based secure active network environment
|
Xiao-lin, Chen |
|
|
10 |
1 |
p. 142-146 |
artikel |
3 |
Addition sequence method of scalar multiplication of elliptic curve over OEF
|
Duo, Liu |
|
|
10 |
1 |
p. 174-178 |
artikel |
4 |
A family of RBAC-based workflow authorization models
|
Fan, Hong |
|
|
10 |
1 |
p. 324-328 |
artikel |
5 |
A formal model for the security of proxy signature schemes
|
Chun-xiang, Gu |
|
|
10 |
1 |
p. 275-278 |
artikel |
6 |
A geometrical transformations resistant digital watermarking based on quantization
|
Lei, Shi |
|
|
10 |
1 |
p. 319-323 |
artikel |
7 |
Algebraic attack on Filter-Combiner model keystream generators
|
Zhi-ping, Wu |
|
|
10 |
1 |
p. 259-262 |
artikel |
8 |
A Micro-payment based Isolation of Misbehavior secure routing for sensor network
|
Hui, Li |
|
|
10 |
1 |
p. 93-97 |
artikel |
9 |
An adaptive trust model of web services
|
Jin-dian, Su |
|
|
10 |
1 |
p. 21-25 |
artikel |
10 |
Analysis and application for integrity model on trusted platform
|
Guo-qing, Tu |
|
|
10 |
1 |
p. 35-38 |
artikel |
11 |
An anonymous payment protocol with mobile agents in hostile environments
|
Yi, Liu |
|
|
10 |
1 |
p. 271-274 |
artikel |
12 |
An efficient crash recovery technique for real-time main memory database
|
Ying-yuan, Xiao |
|
|
10 |
1 |
p. 61-64 |
artikel |
13 |
An efficient threshold blind signature from weil pairing
|
Xiang-guo, Cheng |
|
|
10 |
1 |
p. 255-258 |
artikel |
14 |
A network-based VPN architecture using virtual routing
|
Bao-liang, Zhang |
|
|
10 |
1 |
p. 161-164 |
artikel |
15 |
A neural network approach for misuse and anomaly intrusion detection
|
Yu, Yao |
|
|
10 |
1 |
p. 115-118 |
artikel |
16 |
A new communication scheme for threshold certificate authority in ad hoc networks
|
Guang-song, Li |
|
|
10 |
1 |
p. 123-126 |
artikel |
17 |
A new images hiding scheme based on chaotic sequences
|
Nian-sheng, Liu |
|
|
10 |
1 |
p. 303-306 |
artikel |
18 |
A new proxy signature scheme with message recovery using self-certified public key
|
Ji-guo, Li |
|
|
10 |
1 |
p. 219-222 |
artikel |
19 |
A new threshold signature scheme using self-certified public keys
|
Jun, Shao |
|
|
10 |
1 |
p. 263-266 |
artikel |
20 |
A new (t, n) threshold signature scheme withstanding the conspiracy attack
|
Qi, Xie |
|
|
10 |
1 |
p. 107-110 |
artikel |
21 |
An FPGA implementation of GF (p) elliptic curve cryptographic coprocessor
|
Yu-zhen, Liu |
|
|
10 |
1 |
p. 31-34 |
artikel |
22 |
An identity-based key-exchange protocol
|
Ya-juan, Zhang |
|
|
10 |
1 |
p. 235-238 |
artikel |
23 |
An intrusion alarming system based on self-similarity of network traffic
|
Fei, Yu |
|
|
10 |
1 |
p. 169-173 |
artikel |
24 |
A nominative multi-proxy signature scheme based on ECC
|
Chuan-gui, Ma |
|
|
10 |
1 |
p. 223-226 |
artikel |
25 |
A novel digital audio watermarking scheme in the wavelet domain
|
Xiang-yang, Wang |
|
|
10 |
1 |
p. 311-314 |
artikel |
26 |
A novel model of IDS based on fuzzy cluster and immune principle
|
Xin-min, Tao |
|
|
10 |
1 |
p. 157-160 |
artikel |
27 |
A proxy signature scheme as secure as decisional Diffie-Hellman problem
|
Rong-xing, Lu |
|
|
10 |
1 |
p. 186-190 |
artikel |
28 |
A role-based PMI security model for e-government
|
Li-jun, Wu |
|
|
10 |
1 |
p. 329-332 |
artikel |
29 |
A secure and efficient (t, n) multi-secret sharing scheme
|
Liao-jun, Pang |
|
|
10 |
1 |
p. 191-194 |
artikel |
30 |
A secure public-key image authentication plan
|
Qing, Yang |
|
|
10 |
1 |
p. 289-292 |
artikel |
31 |
A security kernel architecture based trusted computing platform
|
You-lei, Chen |
|
|
10 |
1 |
p. 1-4 |
artikel |
32 |
Atomic electronic contract protocol based on convertible signature
|
Yi-chun, Liu |
|
|
10 |
1 |
p. 227-230 |
artikel |
33 |
Building intrusion tolerant software system
|
Wen-ling, Peng |
|
|
10 |
1 |
p. 47-50 |
artikel |
34 |
Complex threshold key management for ad hoc network
|
Wei, Guo |
|
|
10 |
1 |
p. 132-136 |
artikel |
35 |
Construction of resilient functions
|
Jie, Zhang |
|
|
10 |
1 |
p. 199-202 |
artikel |
36 |
Correlation degree and correlation coefficient of multi-output functions
|
Gui-zhi, Ju |
|
|
10 |
1 |
p. 195-198 |
artikel |
37 |
Cryptanalysis and improvement of signcryption schemes on elliptic curves
|
Xiang-xue, Li |
|
|
10 |
1 |
p. 231-234 |
artikel |
38 |
Cryptanalysis of the one-time proxy signature scheme used in mobile agents
|
Xiao-tong, Fu |
|
|
10 |
1 |
p. 183-185 |
artikel |
39 |
Data hiding and security for XML database: A TRBAC-based approach
|
Wan-song, Zhang |
|
|
10 |
1 |
p. 293-296 |
artikel |
40 |
Distribution of random session key based on key-insulated public-key cryptosystems
|
Hai-jun, Lu |
|
|
10 |
1 |
p. 251-254 |
artikel |
41 |
Efficient authenticated key agreement protocol using self-certified public keys from pairings
|
Zu-hua, Shao |
|
|
10 |
1 |
p. 267-270 |
artikel |
42 |
Efficient identity based signcryption scheme with public verifiability and forward security
|
Fei-yu, Lei |
|
|
10 |
1 |
p. 248-250 |
artikel |
43 |
Evolutionary design of boolean functions
|
Zhang-yi, Wang |
|
|
10 |
1 |
p. 179-182 |
artikel |
44 |
Extension of subjective logic for time-related trust
|
Chen-lin, Huang |
|
|
10 |
1 |
p. 56-60 |
artikel |
45 |
Fair electronic payment scheme based on DSA
|
Shao-bin, Wang |
|
|
10 |
1 |
p. 203-206 |
artikel |
46 |
Fault tolerant approach for data encryption and digital signature based on ECC system
|
Yong, Zeng |
|
|
10 |
1 |
p. 13-16 |
artikel |
47 |
Fault-tolerant design techniques in A CMP architecture
|
Wen-bin, Yao |
|
|
10 |
1 |
p. 5-8 |
artikel |
48 |
Formal verification under unknown constraints
|
Guang-hui, Li |
|
|
10 |
1 |
p. 43-46 |
artikel |
49 |
HermitFS: A secure storage system in the open environment
|
Qin, Long |
|
|
10 |
1 |
p. 26-30 |
artikel |
50 |
Immune based intrusion detector generating algorithm
|
Xiao-mei, Dong |
|
|
10 |
1 |
p. 147-151 |
artikel |
51 |
Implementation and performance evaluation of IPSec VPN based on netfilter
|
Da-yuan, Zhao |
|
|
10 |
1 |
p. 98-102 |
artikel |
52 |
Information-theoretic analysis for the difficulty of extracting hidden information
|
Wei-ming, Zhang |
|
|
10 |
1 |
p. 315-318 |
artikel |
53 |
Intelligent intrusion detection system model using rough neural network
|
Huai-zhi, Yan |
|
|
10 |
1 |
p. 119-122 |
artikel |
54 |
Investigation on relationship between cost and software reliability
|
Ren-zuo, Xu |
|
|
10 |
1 |
p. 9-12 |
artikel |
55 |
MA-IDS: A distributed intrusion detection system based on data mining
|
Jian-hua, Sun |
|
|
10 |
1 |
p. 111-114 |
artikel |
56 |
Masquerade detection using support vector machine
|
Min, Yang |
|
|
10 |
1 |
p. 103-106 |
artikel |
57 |
Mechanism and defense on malicious code
|
Wei-ping, Wen |
|
|
10 |
1 |
p. 83-88 |
artikel |
58 |
Methods for increasing creditability of anomaly detection system
|
Giao, Yan |
|
|
10 |
1 |
p. 79-82 |
artikel |
59 |
Model checking electronic commerce security protocols based on CTL
|
De-qin, Xiao |
|
|
10 |
1 |
p. 333-337 |
artikel |
60 |
Polynomial analysis of DH secrete key and bit security
|
Zheng-tao, Jiang |
|
|
10 |
1 |
p. 239-242 |
artikel |
61 |
Privilege flow oriented intrusion detection based on Hidden semi-Markov model
|
An-ming, Zhong |
|
|
10 |
1 |
p. 137-141 |
artikel |
62 |
Research on fault tolerant scheduling algorithms of web cluster based on probability
|
An-feng, Liu |
|
|
10 |
1 |
p. 70-74 |
artikel |
63 |
Robustness proof on a united watermarking based on CRT theorem
|
Li-gang, Liu |
|
|
10 |
1 |
p. 307-310 |
artikel |
64 |
Robust threshold Guillou-Quisquater signature scheme
|
Hong, Wang |
|
|
10 |
1 |
p. 207-210 |
artikel |
65 |
Security communication model of wireless trade system
|
Wen-kai, Zhang |
|
|
10 |
1 |
p. 152-156 |
artikel |
66 |
Semi-fragile watermarking for copyright protection and image authentication
|
Ji-feng, Huang |
|
|
10 |
1 |
p. 284-288 |
artikel |
67 |
Simultaneous multithreading fault tolerance processor
|
Lan, Dong |
|
|
10 |
1 |
p. 17-20 |
artikel |
68 |
SLEACH: Secure low-energy adaptive clustering hierarchy protocol for wireless sensor networks
|
Xiao-yun, Wang |
|
|
10 |
1 |
p. 127-131 |
artikel |
69 |
SLID: A secure lowest-ID clustering algorithm
|
Guang-ming, Hu |
|
|
10 |
1 |
p. 39-42 |
artikel |
70 |
Statistical characteristics of the complexity for prime-periodic sequences
|
Zhi-hua, Niu |
|
|
10 |
1 |
p. 211-213 |
artikel |
71 |
Survivability specification framework for dependability-functionality codesign of ERTS
|
Yong-xian, Jin |
|
|
10 |
1 |
p. 75-78 |
artikel |
72 |
Threshold decryption scheme with multiple policies
|
Ru-chun, Fei |
|
|
10 |
1 |
p. 243-247 |
artikel |
73 |
Towards the idealization procedure of BAN-like logics
|
Li-li, Cao |
|
|
10 |
1 |
p. 214-218 |
artikel |
74 |
TRSTR: A fault-tolerant microprocessor architecture based on SMT
|
Hua, Yang |
|
|
10 |
1 |
p. 51-55 |
artikel |
75 |
Turbo-based DNW algorithm for compressed video in VLC domain
|
He-fei, Ling |
|
|
10 |
1 |
p. 297-302 |
artikel |
76 |
Two-stage algorithm for correlating the intrusion alerts
|
Liang-min, Wang |
|
|
10 |
1 |
p. 89-92 |
artikel |
77 |
Verifiable (t, n) threshold signature scheme based on elliptic curve
|
Hua-qun, Wang |
|
|
10 |
1 |
p. 165-168 |
artikel |
78 |
Wavelet-based denoising attack on image watermarking
|
Jian-hui, Xuan |
|
|
10 |
1 |
p. 279-283 |
artikel |