nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A more efficient accountable authority IBE scheme under the DL assumption
|
Xu, Peng |
|
2010 |
53 |
3 |
p. 581-592 |
artikel |
2 |
A property-based attestation protocol for TCM
|
Feng, DengGuo |
|
2010 |
53 |
3 |
p. 454-464 |
artikel |
3 |
Asymmetric encryption and signature method with DNA technology
|
Lai, XueJia |
|
2010 |
53 |
3 |
p. 506-514 |
artikel |
4 |
Bayesian cognitive trust model based self-clustering algorithm for MANETs
|
Wang, Wei |
|
2010 |
53 |
3 |
p. 494-505 |
artikel |
5 |
CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles
|
Weng, Jian |
|
2010 |
53 |
3 |
p. 593-606 |
artikel |
6 |
Centroid-based semi-fragile audio watermarking in hybrid domain
|
Wang, HongXia |
|
2010 |
53 |
3 |
p. 619-633 |
artikel |
7 |
Conjugate adjoining problem in braid groups and new design of braid-based signatures
|
Wang, LiCheng |
|
2010 |
53 |
3 |
p. 524-536 |
artikel |
8 |
Constructing quantum error correcting code via logic function
|
Zhong, ShuQin |
|
2010 |
53 |
3 |
p. 515-523 |
artikel |
9 |
Differential-algebraic cryptanalysis of reduced-round of Serpent-256
|
Wang, MeiQin |
|
2010 |
53 |
3 |
p. 546-556 |
artikel |
10 |
Efficient signcryption between TPKC and IDPKC and its multi-receiver construction
|
Sun, YinXia |
|
2010 |
53 |
3 |
p. 557-566 |
artikel |
11 |
Embedded DHT overlays in virtual computing environments
|
Zhang, YiMing |
|
2010 |
53 |
3 |
p. 483-493 |
artikel |
12 |
Identifying heavy hitters in high-speed network monitoring
|
Zhang, Yu |
|
2010 |
53 |
3 |
p. 659-676 |
artikel |
13 |
Image universal steganalysis based on best wavelet packet decomposition
|
Luo, XiangYang |
|
2010 |
53 |
3 |
p. 634-647 |
artikel |
14 |
On the number of rotation symmetric Boolean functions
|
Fu, ShaoJing |
|
2010 |
53 |
3 |
p. 537-545 |
artikel |
15 |
Research on theory and key technology of trusted computing platform security testing and evaluation
|
Zhang, HuanGuo |
|
2010 |
53 |
3 |
p. 434-453 |
artikel |
16 |
Research on trusted computing and its development
|
Shen, ChangXiang |
|
2010 |
53 |
3 |
p. 405-433 |
artikel |
17 |
Robust AVS audio watermarking
|
Wang, Yong |
|
2010 |
53 |
3 |
p. 607-618 |
artikel |
18 |
Secure network coding in the presence of eavesdroppers
|
Luo, MingXing |
|
2010 |
53 |
3 |
p. 648-658 |
artikel |
19 |
Universally composable one-time signature and broadcast authentication
|
Zhang, JunWei |
|
2010 |
53 |
3 |
p. 567-580 |
artikel |
20 |
Universally composable secure TNC model and EAP-TNC protocol in IF-T
|
Zhang, JunWei |
|
2010 |
53 |
3 |
p. 465-482 |
artikel |