[1] |
WANG Guohua, LI Tuo, ZHANG Sanguo, SHI Yishi.
Unconstrained optimization attack on double random phase cryptosystem
[J]. , 2016, 33(5): 604-611.
|
[2] |
HOU Jinzhong, ZHANG Libo, LUO Tiejian.
A distributed storage method of balancing video resources
[J]. , 2016, 33(5): 686-692.
|
[3] |
DONG Ying, ZHANG Yuqing, YUE Hongzhou.
Vulnerability exploitation for Joomla content management system
[J]. , 2015, 32(6): 825-835.
|
[4] |
LI Xiaoqi, LIU Qixu, ZHANG Yuqing.
Automatically exploiting system of kernel privilege escalation vulnerabilities based on imitating attack
[J]. , 2015, 32(3): 384-390.
|
[5] |
ZHANG Mingqing, ZHANG Can, CHEN Deyuan, ZHANG Kenan.
A mobile classification security method for SMS based on Android system
[J]. , 2015, 32(2): 281-287.
|
[6] |
FANG Zhejun, LIU Qixu, ZHANG Yuqing.
Design and implementation of capability leak detection for Android applications
[J]. , 2015, 32(1): 127-135.
|
[7] |
XIAO Jiujin, LU Changtai, MA Hongxing, ZHANG Jian, LI Xudong.
Evaluation of agricultural fertilizing-security based on hierarchical fuzzy recognition model
[J]. , 2014, 31(1): 85-91.
|
[8] |
TIAN Xue, XU Zhen, CHEN Chi.
Study on usage scenarios of several new database covert channels
[J]. , 2013, 30(3): 403-409.
|
[9] |
LI Zhao, YANG Li, ZHOU Rui-Rui.
Quantum dynamic password authentication scheme
[J]. , 2013, 30(1): 131-136.
|
[10] |
FU Chang-Ming, YANG Yu-Hua, LI Tuo, CHEN Yue-Dong, CHENG Dong, WANG Ya-Li, SHI Yi-Shi.
Construction method of three-dimensional information for image decryption based on the scalar diffraction theory
[J]. , 2012, (6): 757-766.
|
[11] |
CHEN Jing-Feng, WANG Yi-Ding, ZHANG Yu-Qing, LIU Qi-Xu.
Automatic generation of attack vectors for stored-XSS
[J]. , 2012, (6): 815-820.
|
[12] |
WANG Jia-Bin, LIAN Yi-Feng, CHEN Kai.
A quick network constructing method based on adaptive grouping
[J]. , 2012, 29(4): 536-542.
|
[13] |
XIE Tao, WU Chuan-Kun.
An authentication protocol without certificate for HNB
[J]. , 2012, 29(1): 141-144.
|
[14] |
WEI Yun, XIONG Guo-Hua, ZHANG Xing-Kai, BAO Wan-Su.
A strong blind signature scheme over the braid groups
[J]. , 2011, 28(6): 826-831.
|
[15] |
ZHAO Yong-Bin, FAN Tong-Rang.
Simple proof of bit security for NTRU
[J]. , 2011, 28(6): 832-836.
|