Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             78 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 Access request trustworthiness in weighted access control framework Lun-wei, Wang

10 1 p. 65-69
artikel
2 A cluster-based secure active network environment Xiao-lin, Chen

10 1 p. 142-146
artikel
3 Addition sequence method of scalar multiplication of elliptic curve over OEF Duo, Liu

10 1 p. 174-178
artikel
4 A family of RBAC-based workflow authorization models Fan, Hong

10 1 p. 324-328
artikel
5 A formal model for the security of proxy signature schemes Chun-xiang, Gu

10 1 p. 275-278
artikel
6 A geometrical transformations resistant digital watermarking based on quantization Lei, Shi

10 1 p. 319-323
artikel
7 Algebraic attack on Filter-Combiner model keystream generators Zhi-ping, Wu

10 1 p. 259-262
artikel
8 A Micro-payment based Isolation of Misbehavior secure routing for sensor network Hui, Li

10 1 p. 93-97
artikel
9 An adaptive trust model of web services Jin-dian, Su

10 1 p. 21-25
artikel
10 Analysis and application for integrity model on trusted platform Guo-qing, Tu

10 1 p. 35-38
artikel
11 An anonymous payment protocol with mobile agents in hostile environments Yi, Liu

10 1 p. 271-274
artikel
12 An efficient crash recovery technique for real-time main memory database Ying-yuan, Xiao

10 1 p. 61-64
artikel
13 An efficient threshold blind signature from weil pairing Xiang-guo, Cheng

10 1 p. 255-258
artikel
14 A network-based VPN architecture using virtual routing Bao-liang, Zhang

10 1 p. 161-164
artikel
15 A neural network approach for misuse and anomaly intrusion detection Yu, Yao

10 1 p. 115-118
artikel
16 A new communication scheme for threshold certificate authority in ad hoc networks Guang-song, Li

10 1 p. 123-126
artikel
17 A new images hiding scheme based on chaotic sequences Nian-sheng, Liu

10 1 p. 303-306
artikel
18 A new proxy signature scheme with message recovery using self-certified public key Ji-guo, Li

10 1 p. 219-222
artikel
19 A new threshold signature scheme using self-certified public keys Jun, Shao

10 1 p. 263-266
artikel
20 A new (t, n) threshold signature scheme withstanding the conspiracy attack Qi, Xie

10 1 p. 107-110
artikel
21 An FPGA implementation of GF (p) elliptic curve cryptographic coprocessor Yu-zhen, Liu

10 1 p. 31-34
artikel
22 An identity-based key-exchange protocol Ya-juan, Zhang

10 1 p. 235-238
artikel
23 An intrusion alarming system based on self-similarity of network traffic Fei, Yu

10 1 p. 169-173
artikel
24 A nominative multi-proxy signature scheme based on ECC Chuan-gui, Ma

10 1 p. 223-226
artikel
25 A novel digital audio watermarking scheme in the wavelet domain Xiang-yang, Wang

10 1 p. 311-314
artikel
26 A novel model of IDS based on fuzzy cluster and immune principle Xin-min, Tao

10 1 p. 157-160
artikel
27 A proxy signature scheme as secure as decisional Diffie-Hellman problem Rong-xing, Lu

10 1 p. 186-190
artikel
28 A role-based PMI security model for e-government Li-jun, Wu

10 1 p. 329-332
artikel
29 A secure and efficient (t, n) multi-secret sharing scheme Liao-jun, Pang

10 1 p. 191-194
artikel
30 A secure public-key image authentication plan Qing, Yang

10 1 p. 289-292
artikel
31 A security kernel architecture based trusted computing platform You-lei, Chen

10 1 p. 1-4
artikel
32 Atomic electronic contract protocol based on convertible signature Yi-chun, Liu

10 1 p. 227-230
artikel
33 Building intrusion tolerant software system Wen-ling, Peng

10 1 p. 47-50
artikel
34 Complex threshold key management for ad hoc network Wei, Guo

10 1 p. 132-136
artikel
35 Construction of resilient functions Jie, Zhang

10 1 p. 199-202
artikel
36 Correlation degree and correlation coefficient of multi-output functions Gui-zhi, Ju

10 1 p. 195-198
artikel
37 Cryptanalysis and improvement of signcryption schemes on elliptic curves Xiang-xue, Li

10 1 p. 231-234
artikel
38 Cryptanalysis of the one-time proxy signature scheme used in mobile agents Xiao-tong, Fu

10 1 p. 183-185
artikel
39 Data hiding and security for XML database: A TRBAC-based approach Wan-song, Zhang

10 1 p. 293-296
artikel
40 Distribution of random session key based on key-insulated public-key cryptosystems Hai-jun, Lu

10 1 p. 251-254
artikel
41 Efficient authenticated key agreement protocol using self-certified public keys from pairings Zu-hua, Shao

10 1 p. 267-270
artikel
42 Efficient identity based signcryption scheme with public verifiability and forward security Fei-yu, Lei

10 1 p. 248-250
artikel
43 Evolutionary design of boolean functions Zhang-yi, Wang

10 1 p. 179-182
artikel
44 Extension of subjective logic for time-related trust Chen-lin, Huang

10 1 p. 56-60
artikel
45 Fair electronic payment scheme based on DSA Shao-bin, Wang

10 1 p. 203-206
artikel
46 Fault tolerant approach for data encryption and digital signature based on ECC system Yong, Zeng

10 1 p. 13-16
artikel
47 Fault-tolerant design techniques in A CMP architecture Wen-bin, Yao

10 1 p. 5-8
artikel
48 Formal verification under unknown constraints Guang-hui, Li

10 1 p. 43-46
artikel
49 HermitFS: A secure storage system in the open environment Qin, Long

10 1 p. 26-30
artikel
50 Immune based intrusion detector generating algorithm Xiao-mei, Dong

10 1 p. 147-151
artikel
51 Implementation and performance evaluation of IPSec VPN based on netfilter Da-yuan, Zhao

10 1 p. 98-102
artikel
52 Information-theoretic analysis for the difficulty of extracting hidden information Wei-ming, Zhang

10 1 p. 315-318
artikel
53 Intelligent intrusion detection system model using rough neural network Huai-zhi, Yan

10 1 p. 119-122
artikel
54 Investigation on relationship between cost and software reliability Ren-zuo, Xu

10 1 p. 9-12
artikel
55 MA-IDS: A distributed intrusion detection system based on data mining Jian-hua, Sun

10 1 p. 111-114
artikel
56 Masquerade detection using support vector machine Min, Yang

10 1 p. 103-106
artikel
57 Mechanism and defense on malicious code Wei-ping, Wen

10 1 p. 83-88
artikel
58 Methods for increasing creditability of anomaly detection system Giao, Yan

10 1 p. 79-82
artikel
59 Model checking electronic commerce security protocols based on CTL De-qin, Xiao

10 1 p. 333-337
artikel
60 Polynomial analysis of DH secrete key and bit security Zheng-tao, Jiang

10 1 p. 239-242
artikel
61 Privilege flow oriented intrusion detection based on Hidden semi-Markov model An-ming, Zhong

10 1 p. 137-141
artikel
62 Research on fault tolerant scheduling algorithms of web cluster based on probability An-feng, Liu

10 1 p. 70-74
artikel
63 Robustness proof on a united watermarking based on CRT theorem Li-gang, Liu

10 1 p. 307-310
artikel
64 Robust threshold Guillou-Quisquater signature scheme Hong, Wang

10 1 p. 207-210
artikel
65 Security communication model of wireless trade system Wen-kai, Zhang

10 1 p. 152-156
artikel
66 Semi-fragile watermarking for copyright protection and image authentication Ji-feng, Huang

10 1 p. 284-288
artikel
67 Simultaneous multithreading fault tolerance processor Lan, Dong

10 1 p. 17-20
artikel
68 SLEACH: Secure low-energy adaptive clustering hierarchy protocol for wireless sensor networks Xiao-yun, Wang

10 1 p. 127-131
artikel
69 SLID: A secure lowest-ID clustering algorithm Guang-ming, Hu

10 1 p. 39-42
artikel
70 Statistical characteristics of the complexity for prime-periodic sequences Zhi-hua, Niu

10 1 p. 211-213
artikel
71 Survivability specification framework for dependability-functionality codesign of ERTS Yong-xian, Jin

10 1 p. 75-78
artikel
72 Threshold decryption scheme with multiple policies Ru-chun, Fei

10 1 p. 243-247
artikel
73 Towards the idealization procedure of BAN-like logics Li-li, Cao

10 1 p. 214-218
artikel
74 TRSTR: A fault-tolerant microprocessor architecture based on SMT Hua, Yang

10 1 p. 51-55
artikel
75 Turbo-based DNW algorithm for compressed video in VLC domain He-fei, Ling

10 1 p. 297-302
artikel
76 Two-stage algorithm for correlating the intrusion alerts Liang-min, Wang

10 1 p. 89-92
artikel
77 Verifiable (t, n) threshold signature scheme based on elliptic curve Hua-qun, Wang

10 1 p. 165-168
artikel
78 Wavelet-based denoising attack on image watermarking Jian-hui, Xuan

10 1 p. 279-283
artikel
                             78 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland