论文
    论文题目 第一作者 发表年度 刊物/会议名称
    a spectral method on tetrahedra using rational basis functions 李会元 2010 INTERNATIONAL JOURNAL OF NUMERICAL ANALYSIS AND MODELING
    一类非张量积区域快速傅立叶变换算法在国产并行机上的可扩展性测试 张云泉 2010 数值计算与计算机应用
    optimal error estimates in jacobi-weighted sobolev spaces for polynomial approximations on the triangle 李会元 2010 MATHEMATICS OF COMPUTATION
    Acquiring Key Privacy from Data Privacy 张锐 2010
    Formal Verification of HMQV using ASM-SPV 黄丹青 2010 2010 IEEE
    A Language For Secure Requirement Description Based on Information Flow 程亮 2010 2010 IEEE
    DepSim: A Dependency-based Malware Similarity Comparison System 杨轶 2010 The 6th China International Conference on Information Security and Cryptology (Inscrypt 2010)
    Towards A Flexible Spatially Aware Access Control Model 张德胜 2010
    cryptanalysis of mame compression function 薛宇 2010 2010 international conference on computer design and appliations
    Constructing Rate-1 MACs from Related-Key Unpredictable Block Ciphers: PGV Model Revisited 张立廷 2010 International Association for Cryptologic Research 2010
    Privacy Preserving of Trust Management Credentials Based on Trusted Computing 吴槟 2010 Springer-Verlag Berlin Heidelberg 2010
    基于信任度的信任链模型 汪丹 2010 第七届中国信息和通信安全学术会议论文集
    Real-Time Remote Attestation with Privacy Protection 于爱民 2010 Springer-Verlag Berlin Heidelberg 2010
    measuring the effectiveness of dpa attacks- from the perspective of distinguishers' statistical characteristics 黄金刚 2010 ICCSIT 2010
    trusted channels with password-based authentication and tpm-based attestation 周玲丽 2010 CMC 2010
    a novel vector edge sampling scheme for ip traceback against ddos attacks 陈恺 2010 ICMLC 2010
    practical rebound attack on 12-round cheetah-256 吴双 2010 Springer-Verlag Berlin Heidelberg 2010
    controlling data disclosure in computational pir protocols 周永彬 2010 Copyright 2010 ACM 978-1-60558-936-7 ...$10.00.
    A Hypervisor-Based Secure Storage Scheme 汪丹 2010 The 2nd International Conference on Networks Security, Wireless Communications and Trusted Computing
    fine-grained cloud db damage examination based on bloom filters 张敏 2010
    Accelerating Inverse of GF(2n) with Precomputation 徐磊 2010 Lecture Notes in Computer Science, 2010, Volume 6047/2010, 85-95
    Threshold Password-Based Authenticated Group Key Exchange in Gateway-Oriented Setting 李徽 2010 Springer-Verlag Berlin Heidelberg 2010
    refinement of miller's algorithm over edwards curves 徐磊 2010
    Congestion Control with Fixed Cost at the Domain Border 石志强 2010 The 2010 International Conference on Future Computer and Communication
    Efficient Address Updating for Seamless Handover in Multi-homed Mobile Wnvironments 乔元松 2010 IFIP会刊
    Collusion Attack on a Self-healing Key Distribution with Revocation in Wireless Sensor 鲍克华 2010
    MANET下位置感知的服务发现 张扶桑 2010 PCC 2010,第6届全国普适计算学术会议
    面向终端用户的 Web 信息集成系统 于翔斐 2010 中国计算机学会 2010年全国软件与应用学术会议(NASAC 2010)
    一种基于MapReduce的数据处理流程开发方法 易小华 2010 中国计算机学会 2010年全国软件与应用学术会议(NASAC 2010)
    一种面向运环境的自适应集群调整方法 周欢云 2010 中国计算机学会 2010年全国软件与应用学术会议(NASAC 2010)