[1] |
MIAO Dong, MA Rui, SUN Xinkai, SHI Yishi.
Chosen-plaintext attack to linear unitary optical encryption systems
[J]. Journal of University of Chinese Academy of Sciences, 0, (): 53-53.
|
[2] |
LANG Huan, ZHANG Lei, WU Wenling.
Fast software implementation of SM4
[J]. , 2018, 35(2): 180-187.
|
[3] |
YIN Zhiyi, SHEN Jiahui, GUO Xiaobo, ZHA Daren.
A software behavior model based on dynamic taint analysis
[J]. , 2017, 34(5): 647-656.
|
[4] |
LI Congwu, PAN Wuqiong, LIN Jingqiang.
An AD-based private cloud storage access control scheme
[J]. , 2015, 32(5): 676-681.
|
[5] |
WANG Lei, WANG Pingjian, XIANG Ji.
Unified authentication technology in cloud storage environment
[J]. , 2015, 32(5): 682-688.
|
[6] |
WANG Xueqiang, LEI Lingguang, WANG Yuewu.
An easy-to-deploy behavior monitoring scheme for Android applications
[J]. , 2015, 32(5): 689-694.
|
[7] |
JIA Shijie, XIA Luning, WEN Nan.
Signature private key generation method based on the physical properties of Nand Flash and its applications
[J]. , 2015, 32(5): 695-700.
|
[8] |
LIN Xueyan, LIN Jingqiang, GUAN Le, WANG Lei.
China standard cryptographic algorithm implementation in virtual desktop system
[J]. , 2015, 32(5): 701-707.
|
[9] |
LI Fenghai, ZHANG Bailong, DU Jiao, SONG Yan, LI Shuang.
An anti-lost scheme for confidential files based on trusted computation
[J]. , 2015, 32(5): 714-720.
|
[10] |
LIU Bo, CHEN Hua.
A security analysis algorithm for cryptographic module API using term rewriting system
[J]. , 2013, 30(5): 699-705.
|
[11] |
YI Jin, LUO Xun, AO Jian-Xun, YANG Guang-Yu, LUO Ping.
Software fault classification prediction model based on Markov chain
[J]. , 2013, 30(4): 562-567.
|
[12] |
TIAN Xue, XU Zhen, CHEN Chi.
Study on usage scenarios of several new database covert channels
[J]. , 2013, 30(3): 403-409.
|
[13] |
LENG Xiao-Xu, XIAO Jun.
A robust zero-watermarking algorithm based on Haar wavelet and normalization
[J]. , 2013, 30(3): 410-416.
|
[14] |
HUANG Gui-Fang, HU Lei.
Statistically binding non-interactive non-mallebale commitment
[J]. , 2013, 30(2): 264-271.
|
[15] |
LI Zhao, WANG Yue-Wu, LEI Ling-Guang, ZHANG Zhong-Wen.
Android SMS encryption scheme based on dynamic key
[J]. , 2013, 30(2): 272-277.
|