nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A binary images watermarking algorithm based on adaptable matrix
|
Zhang, Fan |
|
2008 |
13 |
5 |
p. 595-599 |
artikel |
2 |
A mobile accessible closed multi-part group communication scheme in IPv6 network
|
Chen, Yue |
|
2008 |
13 |
5 |
p. 600-604 |
artikel |
3 |
Analysis and improvement of cross-realm client-to-client password authenticated key exchange protocols
|
Ding, Xiaofei |
|
2008 |
13 |
5 |
p. 572-576 |
artikel |
4 |
An approach for handling conflicts in authorization
|
Zhang, Mingsheng |
|
2008 |
13 |
5 |
p. 626-630 |
artikel |
5 |
An efficient certificateless ring signature scheme
|
Zhu, Lijun |
|
2008 |
13 |
5 |
p. 567-571 |
artikel |
6 |
A new chaotic function and its cryptographic usage
|
Zhou, Xueguang |
|
2008 |
13 |
5 |
p. 557-561 |
artikel |
7 |
A new provably-secure key agreement protocol for roaming in mobile networks
|
Li, Guangsong |
|
2008 |
13 |
5 |
p. 605-608 |
artikel |
8 |
An improved simple power attack against Camellia’s key schedule
|
Liu, Shuanggen |
|
2008 |
13 |
5 |
p. 591-594 |
artikel |
9 |
A novel trust enhanced grid authentication mechanism
|
Wang, Haiyan |
|
2008 |
13 |
5 |
p. 528-532 |
artikel |
10 |
A Peer-to-Peer resource sharing scheme using trusted computing technology
|
Chen, Lu |
|
2008 |
13 |
5 |
p. 523-527 |
artikel |
11 |
A protocol for fair electronic purchase based on concurrent signatures
|
Li, Xiangdong |
|
2008 |
13 |
5 |
p. 609-614 |
artikel |
12 |
Attribute-based re-encryption scheme in the standard model
|
Guo, Shanqing |
|
2008 |
13 |
5 |
p. 621-625 |
artikel |
13 |
BBACIMA: A trustworthy integrity measurement architecture through behavior-based TPM access control
|
Yu, Aimin |
|
2008 |
13 |
5 |
p. 513-518 |
artikel |
14 |
Breaking and repairing the certificateless key agreement protocol from ASIAN 2006
|
Xia, Liang |
|
2008 |
13 |
5 |
p. 562-566 |
artikel |
15 |
Chrestenson spectrum and auto-correlation function of inverse permutations of quick trickle permutations
|
Wang, Jue |
|
2008 |
13 |
5 |
p. 587-590 |
artikel |
16 |
Formal analysis on an extended security model for database systems
|
Zhu, Hong |
|
2008 |
13 |
5 |
p. 519-522 |
artikel |
17 |
Forward-secure digital signature scheme with tamper evidence
|
Jiang, Han |
|
2008 |
13 |
5 |
p. 582-586 |
artikel |
18 |
On k-error linear complexity of some explicit nonlinear pseudorandom sequences
|
Chen, Zhixiong |
|
2008 |
13 |
5 |
p. 577-581 |
artikel |
19 |
Preventing dropping packets attack in sensor networks: A game theory approach
|
Yang, Libin |
|
2008 |
13 |
5 |
p. 631-635 |
artikel |
20 |
Privacy-preserving trust negotiation with hidden credentials and hidden policies in a multi-party environment
|
Guo, Shanqing |
|
2008 |
13 |
5 |
p. 553-556 |
artikel |
21 |
Secure localization algorithm based on node cooperative for sensor networks
|
Ma, Jianguo |
|
2008 |
13 |
5 |
p. 636-640 |
artikel |
22 |
Static extracting method of software intended behavior based on API functions invoking
|
Peng, Guojun |
|
2008 |
13 |
5 |
p. 615-620 |
artikel |
23 |
Survivability of components assembly in architecture
|
Guo, Wei |
|
2008 |
13 |
5 |
p. 533-538 |
artikel |
24 |
TPM context manager and dynamic configuration management for trusted virtualization platform
|
Qin, Yu |
|
2008 |
13 |
5 |
p. 539-546 |
artikel |
25 |
Trustworthy metrics models for internetware
|
Zhang, Yang |
|
2008 |
13 |
5 |
p. 547-552 |
artikel |