[1] |
WANG Guohua, LI Tuo, ZHANG Sanguo, SHI Yishi.
Unconstrained optimization attack on double random phase cryptosystem
[J]. , 2016, 33(5): 604-611.
|
[2] |
DONG Ying, ZHANG Yuqing, YUE Hongzhou.
Vulnerability exploitation for Joomla content management system
[J]. , 2015, 32(6): 825-835.
|
[3] |
LI Xiaoqi, LIU Qixu, ZHANG Yuqing.
Automatically exploiting system of kernel privilege escalation vulnerabilities based on imitating attack
[J]. , 2015, 32(3): 384-390.
|
[4] |
WEI Jing, WANG Juyun, YU Hua.
Terrorism threat assessment with multi-module Bayesian network
[J]. , 2015, 32(2): 264-272.
|
[5] |
ZHANG Mingqing, ZHANG Can, CHEN Deyuan, ZHANG Kenan.
A mobile classification security method for SMS based on Android system
[J]. , 2015, 32(2): 281-287.
|
[6] |
FANG Zhejun, LIU Qixu, ZHANG Yuqing.
Design and implementation of capability leak detection for Android applications
[J]. , 2015, 32(1): 127-135.
|
[7] |
XIONG Kai, ZHANG Yuqing, LÜ Shaiqing.
Automatic Sybil attack method for online social network
[J]. , 2014, 31(4): 548-554.
|
[8] |
ZHANG Lei, SHANG Yali, SUN Bo.
A meet-in-the-middle attack on Lblock
[J]. , 2014, 31(4): 564-569.
|
[9] |
XIAO Jiujin, LU Changtai, MA Hongxing, ZHANG Jian, LI Xudong.
Evaluation of agricultural fertilizing-security based on hierarchical fuzzy recognition model
[J]. , 2014, 31(1): 85-91.
|
[10] |
TIAN Xue, XU Zhen, CHEN Chi.
Study on usage scenarios of several new database covert channels
[J]. , 2013, 30(3): 403-409.
|
[11] |
LENG Xiao-Xu, XIAO Jun.
A robust zero-watermarking algorithm based on Haar wavelet and normalization
[J]. , 2013, 30(3): 410-416.
|
[12] |
LI Zhao, YANG Li, ZHOU Rui-Rui.
Quantum dynamic password authentication scheme
[J]. , 2013, 30(1): 131-136.
|
[13] |
FU Chang-Ming, YANG Yu-Hua, LI Tuo, CHEN Yue-Dong, CHENG Dong, WANG Ya-Li, SHI Yi-Shi.
Construction method of three-dimensional information for image decryption based on the scalar diffraction theory
[J]. , 2012, (6): 757-766.
|
[14] |
CHEN Jing-Feng, WANG Yi-Ding, ZHANG Yu-Qing, LIU Qi-Xu.
Automatic generation of attack vectors for stored-XSS
[J]. , 2012, (6): 815-820.
|
[15] |
JIA Wei, FENG Deng-Guo, LIAN Yi-Feng.
Network-vulnerability evaluation method based on network centrality
[J]. , 2012, 29(4): 529-535.
|