Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             46 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A flaw in the security proof of BDOP-PEKS and PEKS-STAT Zhang, Yajuan
2007
12 1 p. 25-28
artikel
2 A message-level security model consisting of multiple security-tokens mechanism Liu, Zhenpeng
2007
12 1 p. 1-4
artikel
3 A method of processing-storage transmission model-based system survivability measure Zhao, Qian
2007
12 1 p. 143-146
artikel
4 A method to implement full anonymous attestation for trusted computing platform Hao, Liming
2007
12 1 p. 101-104
artikel
5 An authentication method of distinguishing proxy’s secure accident responsibility Zhu, Shuren
2007
12 1 p. 109-112
artikel
6 An efficient real-time fault-tolerant scheduling algorithm based on multiprocessor systems Yang, Fumin
2007
12 1 p. 113-116
artikel
7 A neural network method for reliability optimizations of complex systems Pan, Zhongliang
2007
12 1 p. 139-142
artikel
8 A new approach of TPM construction based on J2810 Zhao, Bo
2007
12 1 p. 21-24
artikel
9 An improved identity-based society oriented signature scheme with anonymous signers Tang, Chunming
2007
12 1 p. 121-125
artikel
10 An improved traitor tracing scheme based on bilinear map Zhang, Xuejun
2007
12 1 p. 5-8
artikel
11 An intrusion detection method based on hierarchical hidden Markov models Jia, Chunfu
2007
12 1 p. 135-138
artikel
12 Another ID-based proxy signature scheme and its extension Zhang, Jianhong
2007
12 1 p. 33-36
artikel
13 A proxy blind signature scheme based on DLP Yu, Baozheng
2007
12 1 p. 83-86
artikel
14 Authorization management framework based on joint trust-risk evaluation Yang, Qiuwei
2007
12 1 p. 9-12
artikel
15 A weighted algorithm for watermarking relational databases Cui, Xinchun
2007
12 1 p. 79-82
artikel
16 DCCS: A general-purpose distributed cryptographic computing system Jiang, Zhonghua
2007
12 1 p. 46-50
artikel
17 Digital multi-signature based on the controlled quantum teleportation Wen, Xiaojin
2007
12 1 p. 29-32
artikel
18 Efficient and provably secure multi-recipient signcryption from bilinear pairings Li, Fagen
2007
12 1 p. 17-20
artikel
19 Efficient ID-based proxy blind signature scheme Zhang, Qing
2007
12 1 p. 105-108
artikel
20 Elliptic curve scalar multiplication with x-coordinate Zhang, Ning
2007
12 1 p. 163-166
artikel
21 Escrow-free certificate-based authenticated key agreement protocol from pairings Wang, Shengbao
2007
12 1 p. 63-66
artikel
22 Evolutionary random sequence generators based on LFSR Zhang, Huanguo
2007
12 1 p. 75-78
artikel
23 Fair e-payment protocol based on simple partially blind signature scheme Liu, Jingwei
2007
12 1 p. 181-184
artikel
24 Genetic algorithm-based approaches for optimizing S-boxes Yin, Xinchun
2007
12 1 p. 131-134
artikel
25 Improved non-sieving quadratic sieve Huang, Qingfeng
2007
12 1 p. 67-70
artikel
26 Instant messaging worms propagation simulation and countermeasures Hu, Huaping
2007
12 1 p. 95-100
artikel
27 Intrusion detection method for program vulnerability via library calls Duan, Xuetao
2007
12 1 p. 126-130
artikel
28 Key management protocol of the IEEE 802.16e Tian, Haibo
2007
12 1 p. 59-62
artikel
29 Learning vector quantization neural network method for network intrusion detection Yang, Degang
2007
12 1 p. 147-150
artikel
30 Linear-differential cryptanalysis for SPN cipher structure and AES Wei, Yongzhuang
2007
12 1 p. 37-40
artikel
31 Malicious code modeling and analysis in weighted scale-free networks Wang, Changguang
2007
12 1 p. 51-54
artikel
32 Multi-agent network intrusion active defense model based on immune theory Liu, Sunjun
2007
12 1 p. 167-171
artikel
33 Practical Internet voting protocol without strong physical assumption Meng, Bo
2007
12 1 p. 177-180
artikel
34 Provable efficient certificateless group key exchange protocol Cao, Chunjie
2007
12 1 p. 41-45
artikel
35 Provable security of ID-based proxy multi-signature schemes Gu, Chunxiang
2007
12 1 p. 87-90
artikel
36 Provably secure convertible directed partially blind signatures Huang, Zhenjie
2007
12 1 p. 55-58
artikel
37 Proxy multisignature scheme with (t, m) threshold shared verification Wang, Xiaoming
2007
12 1 p. 91-94
artikel
38 Publicly verifiable distributed proxy blind signature scheme Ma, Chuangui
2007
12 1 p. 155-158
artikel
39 Quantum secret sharing protocols with high efficiency Gao, Fei
2007
12 1 p. 117-120
artikel
40 REESSE unified recursive algorithm for solving three computational problems Su, Shenghui
2007
12 1 p. 172-176
artikel
41 Securing multicast route discovery for mobile ad hoc networks Yang, Mingxi
2007
12 1 p. 189-192
artikel
42 Security architecture of trusted virtual machine monitor for trusted computing Huang, Qiang
2007
12 1 p. 13-16
artikel
43 Spectral characteristics of the best affine approach of multi-output m-valued logical functions Zhao, Yaqun
2007
12 1 p. 185-188
artikel
44 TCP/IP feature reduction in intrusion detection Liu, Yuling
2007
12 1 p. 151-154
artikel
45 Two-party authenticated key agreement in certificateless public key cryptography Shi, Yijuan
2007
12 1 p. 71-74
artikel
46 XEN virtual machine technology and its security analysis Xue, Haifeng
2007
12 1 p. 159-162
artikel
                             46 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland