論文題目 |
第一作者 |
發表年度 |
刊物/會議名稱 |
PEDA: Comprehensive Damage Assessment for Production Environment Server Systems
|
賈曉啟
|
2011
|
IEEE Transactions on Information Forensics and Security
|
安全協議:信息安全保障的靈魂--安全協議分析研究現狀與發展趨勢
|
薛銳
|
2011
|
中國科學院院刊
|
Network Security, Administration and Management (Chapter 6: Key management)
|
武傳坤
|
2011
|
|
Visual Cryptography and Secret Image Sharing (Chapter 16: Resolve Alignment Problem in Visual Cryptography)
|
劉峰
|
2011
|
|
《中國密碼學發展報告2010》(《視覺密碼學研究進展》)
|
劉峰
|
2011
|
|
Robust Visual Cryptography-based Watermarking Scheme for Multiple Cover Images and Multiple Owners
|
劉峰
|
2011
|
IET Information Security
|
CBCR: 采用循環移位的CBC MAC
|
張立廷
|
2011
|
中國科學:信息科學
|
面向云存儲的高效動態密文訪問控制方法
|
洪澄
|
2011
|
通信學報
|
A generic framework for constructing cross-realm C2C-PAKA protocols based on the smart card
|
徐靜
|
2011
|
Concurrency and Computation: Practice and Experience
|
On the nonexistence of bent functions
|
張寅
|
2011
|
International Journal of Foudations of Computer Science
|
Fast algebraic attacks and decomposition of symmetric Boolean functions
|
劉美成
|
2011
|
IEEE Transaction on Information Theory
|
云存儲密文訪問控制方案
|
呂志泉
|
2011
|
計算機科學與探索
|
Improved multi-pass fast correlation attacks with applications
|
張斌
|
2011
|
SCIENCE CHINA Information Sciences
|
三網融合下的信息安全問題
|
武傳坤
|
2011
|
中國科學院院刊
|
CBCR: CBC MAC with rotating transformations
|
張立廷
|
2011
|
SCIENCE CHINA Information Sciences
|
多域環境下基于屬性的授權委托模型
|
吳檳
|
2011
|
軟件學報
|
對Bivium 流密碼的變元猜測代數攻擊
|
李昕
|
2011
|
電子學報
|
云計算數據安全支撐平臺架構研究
|
張大鵬
|
2011
|
計算機研究與發展(增刊Ⅱ)
|
Video Steganalysis Exploiting Motion Vector Reversion-Based Features
|
曹紜
|
2011
|
IEEE Signal Processing Letters
|
分布式短事務系統中提交協議的研究
|
付艷艷
|
2011
|
計算機科學
|
云存儲環境下文件完整性驗證方案的設計與實現
|
付艷艷
|
2011
|
通信學報增刊
|
Provable secure authentication protocol with anonymity for roaming service in global mobility networks
|
徐靜
|
2011
|
Computer Networks
|
An efficient mutual authentication and key agreement protocol preserving user anonymity in mobile networks
|
徐靜
|
2011
|
Computer Communications
|
An efficient location-based compromise-tolerant key management scheme for sensor networks
|
段美姣
|
2011
|
Information Processing Letters
|
On EA-equivalence of certain permutations to power mappings
|
李永強
|
2011
|
Designs Codes and Cryptography
|
時間相關密碼協議邏輯及其形式化語義
|
雷新鋒
|
2011
|
軟件學報
|
一種基于惡意主體的通用公平交換協議
|
雷新鋒
|
2011
|
解放軍理工大學學報(自然科學版)
|
基于多層次優化技術的XACML策略評估引擎
|
王雅哲
|
2011
|
軟件學報
|
Embedded Extended Visual Cryptography Schemes
|
劉峰
|
2011
|
IEEE Transactions on Information Forensics & Security
|
Cheating immune visual cryptography scheme
|
劉峰
|
2011
|
IET Information Security
|