Security considerations based on PKI/CA in manufacturing grid Yin YongLi Yu Trusted Architecture Pages: 1414 - 1418
A separated domain-based kernel model for trusted computing Fang YanxiangShen ChangxiangWu Gongyi Trusted Architecture Pages: 1424 - 1428
A trusted host's authentication access and control model faced on user action Zhang MiaoXu GuoaiYang Yixian Trusted Architecture Pages: 1429 - 1432
Protecting terminals by security domain mechanism based on trusted computing Zhou ZhengZhang JunLiu Yi Trusted Architecture Pages: 1437 - 1440
Establishment of the secure channel between broker nodes in pub/sub system Zhu Shuren Trusted Architecture Pages: 1441 - 1444
Testing cross-talk induced delay faults in digital circuit based on transient current analysis Wang YourenDeng XiaogianZhang Zhai Trusted Hardware Pages: 1445 - 1448
Design and implementation of a bootstrap trust chain Yu FajiangZhang Huanguo Trusted Hardware Pages: 1449 - 1452
A fault detection mechanism in Erasure-code Byzantine Fault-tolerance Quorum Liu GangZhou JingliQin Leihua Trusted Hardware Pages: 1453 - 1456
A new kind of subjective trust model Zhang GuangweiKang JianchuLi Deyi Trusted Hardware Pages: 1457 - 1461
Time-based dynamic trust model using ant colony algorithm Tang ZhuoLu ZhengdingLi Kai Trusted Software Pages: 1462 - 1466
Merkle tree digital signature and trusted computing platform Wang XiaofeiHong FanCui Guohua Trusted Software Pages: 1467 - 1472
Kernel rootkits implement and detection Li XiangheZhang LianchengLi Shuo Trusted Software Pages: 1473 - 1476
Probability simulation optimization approach using orthogonal genetic algorithm Wang YinlingXing LiningYan Shiliang Trusted Software Pages: 1481 - 1484
Threshold subliminal channel based on designated verifier signature Su LiCui GuohuaChen Jing Trusted Software Pages: 1485 - 1488
An extended hierarchical trusted model for wireless sensor networks Du RuiyingXu MingdiZhang Huanguo Trusted Software Pages: 1489 - 1492
Implementing operating system support for extended trusted path in TPM-capable environments Shi Wenchang Trusted Software Pages: 1493 - 1497
An improved model of attack probability prediction system Wang HuiLiu ShufenZhang Xinjia Trusted Software Pages: 1498 - 1502
Building hot snapshot copy based on windows file system Wang LinaGuo ChiZhu Qin Trusted Software Pages: 1503 - 1506
Binary sequences from a pair of elliptic curves Chen ZhixiongZhang NingXiao Guozhen Cryptography Pages: 1511 - 1515
Mechanical proofs about BW multi-party contract signing protocol Zhang NingrongZhang XingyuanWang Yuanyuan Cryptography Pages: 1516 - 1520
A chaotic block encryption scheme based on the piecewise nonlinear map Wei PengchengLiao XiaofengYang Huaqian Cryptography Pages: 1521 - 1524
Public key cryptography based on ergodic matrices over finite field Pei ShihuiZhao HongweiZhao Yongzhe Cryptography Pages: 1525 - 1528
Enhance confidentiality of threshold signature for MANET Guo WeiXiong Zhongwei Cryptography Pages: 1533 - 1536
A new forward-secure authenticated encryption scheme with message linkages Li YanpingSi GuangdongWang Yumin Cryptography Pages: 1537 - 1540
Subliminal channels in the NTRU and the subliminal-free methods Cai QingjunZhang Yuli Cryptography Pages: 1541 - 1544
Comment fail-stop blind signature scheme design based on pairings Hu XiaomingHuang Shangteng Cryptography Pages: 1545 - 1548
Thek-error linear complexity and the linear complexity forpq n-periodic binary sequences Zhu FengxiangQi Wenfeng Cryptography Pages: 1549 - 1553
Implementing broadcast encryption scheme using bilinear map and group characteristic Zhang YichunLiu JianboLi Jianzeng Cryptography Pages: 1554 - 1558
A new method for impossible differential cryptanalysis of 8-round advanced encryption standard Chen JieHu YupuWei Yongzhuang Cryptography Pages: 1559 - 1562
A power efficient aggregation of encrypted data in wireless sensor network Huang XingyangYang Ming Cryptography Pages: 1563 - 1568
Dynamically reconfigurable encryption system of the AES Wang YourenWang LiCui Jiang Cryptography Pages: 1569 - 1572
An efficient method against side-channel attacks on ECC Liu ShuanggenHu YupuXu Wensheng Cryptography Pages: 1573 - 1576
Security analysis of broadcaster group key exchange protocols Li LiZhang Huanguo Cryptography Pages: 1577 - 1580
Permutation code encryption—New achievement based on path encryption Wu JinmuLiu MaohuaGuo Lina Cryptography Pages: 1581 - 1584
The new concept of path contributing to the cryptographic strength exceeding 2N Wu JinmuFu GuiqinGuo Lina Cryptography Pages: 1585 - 1588
A generic solution to realize public verifiability of signcryption Lei FeiyuChen WenChen Kefei Cryptography Pages: 1589 - 1592
Eavesdropping on the orderly-encrypting multiparty quantum secret sharing protocols Qin SujuanWen QiaoyanZhu Fuchen Cryptography Pages: 1593 - 1596
A model of hierarchical key assignment scheme Zhang ZhigangZhao JingXu Maozhi Cryptography Pages: 1597 - 1600
A practical approach to attaining chosen ciphertext security Li JunCui GuohuaYang Muxiang Cryptography Pages: 1601 - 1604
Identity based group key agreement in multiple PKG environment Wang LimingWu Chuankun Cryptography Pages: 1605 - 1608
Secure order-specified multisignature scheme based on DSA Yang MuxiangSu LiHong Fan Cryptography Pages: 1613 - 1616
Efficient and robust two-party RSA key generation Yang MuxiangHong FanLi Jun Cryptography Pages: 1617 - 1620