no |
title |
author |
magazine |
year |
volume |
issue |
page(s) |
type |
1 |
A biometric-based user authentication for wireless sensor networks
|
Yuan, Jianjun |
|
2010 |
15 |
3 |
p. 272-276 |
article |
2 |
A dynamic ID-based authenticated group key exchange protocol without pairings
|
Xie, Liyun |
|
2010 |
15 |
3 |
p. 255-260 |
article |
3 |
A message digest disposing algorithm based on RC4
|
Liu, Yabin |
|
2010 |
15 |
3 |
p. 251-254 |
article |
4 |
An efficient two-party key exchange protocol with strong security
|
Deng, Shaofeng |
|
2010 |
15 |
3 |
p. 267-271 |
article |
5 |
A security patch for a three-party key exchange protocol
|
Zhao, Jianjie |
|
2010 |
15 |
3 |
p. 242-246 |
article |
6 |
A trustworthiness-based distribution model for data leakage prevention
|
Fan, Yin |
|
2010 |
15 |
3 |
p. 205-209 |
article |
7 |
A usable selection range standard based on test suite reduction algorithms
|
Ma, Yanjun |
|
2010 |
15 |
3 |
p. 261-266 |
article |
8 |
Construction of high dependable distributed access control architecture based on quorum system
|
Xiong, Tinggang |
|
2010 |
15 |
3 |
p. 210-216 |
article |
9 |
Efficient broadcast encryption scheme based on number theory research unit
|
Zhang, Weidong |
|
2010 |
15 |
3 |
p. 247-250 |
article |
10 |
Fault-tolerant rate-monotonic compact-factor-driven scheduling in hard-real-time systems
|
Zhu, Ping |
|
2010 |
15 |
3 |
p. 217-221 |
article |
11 |
Generation algorithm of a sort of P-permutations
|
Han, Haiqing |
|
2010 |
15 |
3 |
p. 237-241 |
article |
12 |
Massive data covert transmission scheme based on Shamir threshold
|
Zhang, Tao |
|
2010 |
15 |
3 |
p. 227-231 |
article |
13 |
New constructions of identity-based threshold decryption
|
Zhang, Leyou |
|
2010 |
15 |
3 |
p. 222-226 |
article |
14 |
Remote attestation-based access control on trusted computing platform
|
Liu, Xian’gang |
|
2010 |
15 |
3 |
p. 190-194 |
article |
15 |
11-Round impossible differential algebraic attack for serpent encryption algorithm
|
Hu, Zhihua |
|
2010 |
15 |
3 |
p. 232-236 |
article |
16 |
Static analysis-based behavior model building for trusted computing dynamic verification
|
Yu, Fajiang |
|
2010 |
15 |
3 |
p. 195-200 |
article |
17 |
Trust asymmetry in grid authentication
|
Wang, Haiyan |
|
2010 |
15 |
3 |
p. 201-204 |
article |
18 |
vCerberus: A DRTM system based on virtualization technology
|
Chen, Wenzhi |
|
2010 |
15 |
3 |
p. 185-189 |
article |