论文题目 |
第一作者 |
发表年度 |
刊物/会议名称 |
PEDA: Comprehensive Damage Assessment for Production Environment Server Systems
|
贾晓启
|
2011
|
IEEE Transactions on Information Forensics and Security
|
安全协议:信息安全保障的灵魂--安全协议分析研究现状与发展趋势
|
薛锐
|
2011
|
中国科学院院刊
|
Network Security, Administration and Management (Chapter 6: Key management)
|
武传坤
|
2011
|
|
Visual Cryptography and Secret Image Sharing (Chapter 16: Resolve Alignment Problem in Visual Cryptography)
|
刘峰
|
2011
|
|
《中国密码学发展报告2010》(《视觉密码学研究进展》)
|
刘峰
|
2011
|
|
Robust Visual Cryptography-based Watermarking Scheme for Multiple Cover Images and Multiple Owners
|
刘峰
|
2011
|
IET Information Security
|
CBCR: 采用循环移位的CBC MAC
|
张立廷
|
2011
|
中国科学:信息科学
|
面向云存储的高效动态密文访问控制方法
|
洪澄
|
2011
|
通信学报
|
A generic framework for constructing cross-realm C2C-PAKA protocols based on the smart card
|
徐静
|
2011
|
Concurrency and Computation: Practice and Experience
|
On the nonexistence of bent functions
|
张寅
|
2011
|
International Journal of Foudations of Computer Science
|
Fast algebraic attacks and decomposition of symmetric Boolean functions
|
刘美成
|
2011
|
IEEE Transaction on Information Theory
|
云存储密文访问控制方案
|
吕志泉
|
2011
|
计算机科学与探索
|
Improved multi-pass fast correlation attacks with applications
|
张斌
|
2011
|
SCIENCE CHINA Information Sciences
|
三网融合下的信息安全问题
|
武传坤
|
2011
|
中国科学院院刊
|
CBCR: CBC MAC with rotating transformations
|
张立廷
|
2011
|
SCIENCE CHINA Information Sciences
|
多域环境下基于属性的授权委托模型
|
吴槟
|
2011
|
软件学报
|
对Bivium 流密码的变元猜测代数攻击
|
李昕
|
2011
|
电子学报
|
云计算数据安全支撑平台架构研究
|
张大鹏
|
2011
|
计算机研究与发展(增刊Ⅱ)
|
Video Steganalysis Exploiting Motion Vector Reversion-Based Features
|
曹纭
|
2011
|
IEEE Signal Processing Letters
|
分布式短事务系统中提交协议的研究
|
付艳艳
|
2011
|
计算机科学
|
云存储环境下文件完整性验证方案的设计与实现
|
付艳艳
|
2011
|
通信学报增刊
|
Provable secure authentication protocol with anonymity for roaming service in global mobility networks
|
徐静
|
2011
|
Computer Networks
|
An efficient mutual authentication and key agreement protocol preserving user anonymity in mobile networks
|
徐静
|
2011
|
Computer Communications
|
An efficient location-based compromise-tolerant key management scheme for sensor networks
|
段美姣
|
2011
|
Information Processing Letters
|
On EA-equivalence of certain permutations to power mappings
|
李永强
|
2011
|
Designs Codes and Cryptography
|
时间相关密码协议逻辑及其形式化语义
|
雷新锋
|
2011
|
软件学报
|
一种基于恶意主体的通用公平交换协议
|
雷新锋
|
2011
|
解放军理工大学学报(自然科学版)
|
基于多层次优化技术的XACML策略评估引擎
|
王雅哲
|
2011
|
软件学报
|
Embedded Extended Visual Cryptography Schemes
|
刘峰
|
2011
|
IEEE Transactions on Information Forensics & Security
|
Cheating immune visual cryptography scheme
|
刘峰
|
2011
|
IET Information Security
|