论文题目 |
第一作者 |
发表年度 |
刊物/会议名称 |
PEDA: Comprehensive Damage Assessment for Production Environment Server Systems |
贾晓启 |
2011 |
IEEE Transactions on Information Forensics and Security |
安全协议:信息安全保障的灵魂--安全协议分析研究现状与发展趋势 |
薛锐 |
2011 |
中国科学院院刊 |
Network Security, Administration and Management (Chapter 6: Key management) |
武传坤 |
2011 |
|
Visual Cryptography and Secret Image Sharing (Chapter 16: Resolve Alignment Problem in Visual Cryptography) |
刘峰 |
2011 |
|
《中国密码学发展报告2010》(《视觉密码学研究进展》) |
刘峰 |
2011 |
|
Robust Visual Cryptography-based Watermarking Scheme for Multiple Cover Images and Multiple Owners |
刘峰 |
2011 |
IET Information Security |
CBCR: 采用循环移位的CBC MAC |
张立廷 |
2011 |
中国科学:信息科学 |
面向云存储的高效动态密文访问控制方法 |
洪澄 |
2011 |
通信学报 |
A generic framework for constructing cross-realm C2C-PAKA protocols based on the smart card |
徐静 |
2011 |
Concurrency and Computation: Practice and Experience |
On the nonexistence of bent functions |
张寅 |
2011 |
International Journal of Foudations of Computer Science |
Fast algebraic attacks and decomposition of symmetric Boolean functions |
刘美成 |
2011 |
IEEE Transaction on Information Theory |
云存储密文访问控制方案 |
吕志泉 |
2011 |
计算机科学与探索 |
Improved multi-pass fast correlation attacks with applications |
张斌 |
2011 |
SCIENCE CHINA Information Sciences |
三网融合下的信息安全问题 |
武传坤 |
2011 |
中国科学院院刊 |
CBCR: CBC MAC with rotating transformations |
张立廷 |
2011 |
SCIENCE CHINA Information Sciences |
多域环境下基于属性的授权委托模型 |
吴槟 |
2011 |
软件学报 |
对Bivium 流密码的变元猜测代数攻击 |
李昕 |
2011 |
电子学报 |
云计算数据安全支撑平台架构研究 |
张大鹏 |
2011 |
计算机研究与发展(增刊Ⅱ) |
Video Steganalysis Exploiting Motion Vector Reversion-Based Features |
曹纭 |
2011 |
IEEE Signal Processing Letters |
分布式短事务系统中提交协议的研究 |
付艳艳 |
2011 |
计算机科学 |
云存储环境下文件完整性验证方案的设计与实现 |
付艳艳 |
2011 |
通信学报增刊 |
Provable secure authentication protocol with anonymity for roaming service in global mobility networks |
徐静 |
2011 |
Computer Networks |
An efficient mutual authentication and key agreement protocol preserving user anonymity in mobile networks |
徐静 |
2011 |
Computer Communications |
An efficient location-based compromise-tolerant key management scheme for sensor networks |
段美姣 |
2011 |
Information Processing Letters |
On EA-equivalence of certain permutations to power mappings |
李永强 |
2011 |
Designs Codes and Cryptography |
时间相关密码协议逻辑及其形式化语义 |
雷新锋 |
2011 |
软件学报 |
一种基于恶意主体的通用公平交换协议 |
雷新锋 |
2011 |
解放军理工大学学报(自然科学版) |
基于多层次优化技术的XACML策略评估引擎 |
王雅哲 |
2011 |
软件学报 |
Embedded Extended Visual Cryptography Schemes |
刘峰 |
2011 |
IEEE Transactions on Information Forensics & Security |
Cheating immune visual cryptography scheme |
刘峰 |
2011 |
IET Information Security |