nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A flaw in the security proof of BDOP-PEKS and PEKS-STAT
|
Zhang, Yajuan |
|
2007 |
12 |
1 |
p. 25-28 |
artikel |
2 |
A message-level security model consisting of multiple security-tokens mechanism
|
Liu, Zhenpeng |
|
2007 |
12 |
1 |
p. 1-4 |
artikel |
3 |
A method of processing-storage transmission model-based system survivability measure
|
Zhao, Qian |
|
2007 |
12 |
1 |
p. 143-146 |
artikel |
4 |
A method to implement full anonymous attestation for trusted computing platform
|
Hao, Liming |
|
2007 |
12 |
1 |
p. 101-104 |
artikel |
5 |
An authentication method of distinguishing proxy’s secure accident responsibility
|
Zhu, Shuren |
|
2007 |
12 |
1 |
p. 109-112 |
artikel |
6 |
An efficient real-time fault-tolerant scheduling algorithm based on multiprocessor systems
|
Yang, Fumin |
|
2007 |
12 |
1 |
p. 113-116 |
artikel |
7 |
A neural network method for reliability optimizations of complex systems
|
Pan, Zhongliang |
|
2007 |
12 |
1 |
p. 139-142 |
artikel |
8 |
A new approach of TPM construction based on J2810
|
Zhao, Bo |
|
2007 |
12 |
1 |
p. 21-24 |
artikel |
9 |
An improved identity-based society oriented signature scheme with anonymous signers
|
Tang, Chunming |
|
2007 |
12 |
1 |
p. 121-125 |
artikel |
10 |
An improved traitor tracing scheme based on bilinear map
|
Zhang, Xuejun |
|
2007 |
12 |
1 |
p. 5-8 |
artikel |
11 |
An intrusion detection method based on hierarchical hidden Markov models
|
Jia, Chunfu |
|
2007 |
12 |
1 |
p. 135-138 |
artikel |
12 |
Another ID-based proxy signature scheme and its extension
|
Zhang, Jianhong |
|
2007 |
12 |
1 |
p. 33-36 |
artikel |
13 |
A proxy blind signature scheme based on DLP
|
Yu, Baozheng |
|
2007 |
12 |
1 |
p. 83-86 |
artikel |
14 |
Authorization management framework based on joint trust-risk evaluation
|
Yang, Qiuwei |
|
2007 |
12 |
1 |
p. 9-12 |
artikel |
15 |
A weighted algorithm for watermarking relational databases
|
Cui, Xinchun |
|
2007 |
12 |
1 |
p. 79-82 |
artikel |
16 |
DCCS: A general-purpose distributed cryptographic computing system
|
Jiang, Zhonghua |
|
2007 |
12 |
1 |
p. 46-50 |
artikel |
17 |
Digital multi-signature based on the controlled quantum teleportation
|
Wen, Xiaojin |
|
2007 |
12 |
1 |
p. 29-32 |
artikel |
18 |
Efficient and provably secure multi-recipient signcryption from bilinear pairings
|
Li, Fagen |
|
2007 |
12 |
1 |
p. 17-20 |
artikel |
19 |
Efficient ID-based proxy blind signature scheme
|
Zhang, Qing |
|
2007 |
12 |
1 |
p. 105-108 |
artikel |
20 |
Elliptic curve scalar multiplication with x-coordinate
|
Zhang, Ning |
|
2007 |
12 |
1 |
p. 163-166 |
artikel |
21 |
Escrow-free certificate-based authenticated key agreement protocol from pairings
|
Wang, Shengbao |
|
2007 |
12 |
1 |
p. 63-66 |
artikel |
22 |
Evolutionary random sequence generators based on LFSR
|
Zhang, Huanguo |
|
2007 |
12 |
1 |
p. 75-78 |
artikel |
23 |
Fair e-payment protocol based on simple partially blind signature scheme
|
Liu, Jingwei |
|
2007 |
12 |
1 |
p. 181-184 |
artikel |
24 |
Genetic algorithm-based approaches for optimizing S-boxes
|
Yin, Xinchun |
|
2007 |
12 |
1 |
p. 131-134 |
artikel |
25 |
Improved non-sieving quadratic sieve
|
Huang, Qingfeng |
|
2007 |
12 |
1 |
p. 67-70 |
artikel |
26 |
Instant messaging worms propagation simulation and countermeasures
|
Hu, Huaping |
|
2007 |
12 |
1 |
p. 95-100 |
artikel |
27 |
Intrusion detection method for program vulnerability via library calls
|
Duan, Xuetao |
|
2007 |
12 |
1 |
p. 126-130 |
artikel |
28 |
Key management protocol of the IEEE 802.16e
|
Tian, Haibo |
|
2007 |
12 |
1 |
p. 59-62 |
artikel |
29 |
Learning vector quantization neural network method for network intrusion detection
|
Yang, Degang |
|
2007 |
12 |
1 |
p. 147-150 |
artikel |
30 |
Linear-differential cryptanalysis for SPN cipher structure and AES
|
Wei, Yongzhuang |
|
2007 |
12 |
1 |
p. 37-40 |
artikel |
31 |
Malicious code modeling and analysis in weighted scale-free networks
|
Wang, Changguang |
|
2007 |
12 |
1 |
p. 51-54 |
artikel |
32 |
Multi-agent network intrusion active defense model based on immune theory
|
Liu, Sunjun |
|
2007 |
12 |
1 |
p. 167-171 |
artikel |
33 |
Practical Internet voting protocol without strong physical assumption
|
Meng, Bo |
|
2007 |
12 |
1 |
p. 177-180 |
artikel |
34 |
Provable efficient certificateless group key exchange protocol
|
Cao, Chunjie |
|
2007 |
12 |
1 |
p. 41-45 |
artikel |
35 |
Provable security of ID-based proxy multi-signature schemes
|
Gu, Chunxiang |
|
2007 |
12 |
1 |
p. 87-90 |
artikel |
36 |
Provably secure convertible directed partially blind signatures
|
Huang, Zhenjie |
|
2007 |
12 |
1 |
p. 55-58 |
artikel |
37 |
Proxy multisignature scheme with (t, m) threshold shared verification
|
Wang, Xiaoming |
|
2007 |
12 |
1 |
p. 91-94 |
artikel |
38 |
Publicly verifiable distributed proxy blind signature scheme
|
Ma, Chuangui |
|
2007 |
12 |
1 |
p. 155-158 |
artikel |
39 |
Quantum secret sharing protocols with high efficiency
|
Gao, Fei |
|
2007 |
12 |
1 |
p. 117-120 |
artikel |
40 |
REESSE unified recursive algorithm for solving three computational problems
|
Su, Shenghui |
|
2007 |
12 |
1 |
p. 172-176 |
artikel |
41 |
Securing multicast route discovery for mobile ad hoc networks
|
Yang, Mingxi |
|
2007 |
12 |
1 |
p. 189-192 |
artikel |
42 |
Security architecture of trusted virtual machine monitor for trusted computing
|
Huang, Qiang |
|
2007 |
12 |
1 |
p. 13-16 |
artikel |
43 |
Spectral characteristics of the best affine approach of multi-output m-valued logical functions
|
Zhao, Yaqun |
|
2007 |
12 |
1 |
p. 185-188 |
artikel |
44 |
TCP/IP feature reduction in intrusion detection
|
Liu, Yuling |
|
2007 |
12 |
1 |
p. 151-154 |
artikel |
45 |
Two-party authenticated key agreement in certificateless public key cryptography
|
Shi, Yijuan |
|
2007 |
12 |
1 |
p. 71-74 |
artikel |
46 |
XEN virtual machine technology and its security analysis
|
Xue, Haifeng |
|
2007 |
12 |
1 |
p. 159-162 |
artikel |