A message-level security model consisting of multiple security-tokens mechanism Liu ZhenpengSong XiaojingZhou Dongdong OriginalPaper Pages: 1 - 4
Authorization management framework based on joint trust-risk evaluation Yang QiuweiWu SunyongLiao Junguo OriginalPaper Pages: 9 - 12
Security architecture of trusted virtual machine monitor for trusted computing Huang QiangShen ChangxiangFang Yanxiang OriginalPaper Pages: 13 - 16
Efficient and provably secure multi-recipient signcryption from bilinear pairings Li FagenHu YupuLiu Shuanggen OriginalPaper Pages: 17 - 20
A new approach of TPM construction based on J2810 Zhao BoZhang HuanguoHuang Rui OriginalPaper Pages: 21 - 24
A flaw in the security proof of BDOP-PEKS and PEKS-STAT Zhang YajuanZhu YuefeiFu Changchun OriginalPaper Pages: 25 - 28
Digital multi-signature based on the controlled quantum teleportation Wen XiaojinLiu YunZhang Pengyun OriginalPaper Pages: 29 - 32
Another ID-based proxy signature scheme and its extension Zhang JianhongZou Wei OriginalPaper Pages: 33 - 36
Linear-differential cryptanalysis for SPN cipher structure and AES Wei YongzhuangHu Yupu OriginalPaper Pages: 37 - 40
Provable efficient certificateless group key exchange protocol Cao ChunjieMa JianfengMoon Sangjae OriginalPaper Pages: 41 - 45
DCCS: A general-purpose distributed cryptographic computing system Jiang ZhonghuaLin DongdaiLin Lei OriginalPaper Pages: 46 - 50
Malicious code modeling and analysis in weighted scale-free networks Wang ChangguangWang FangweiMa Jianfeng OriginalPaper Pages: 51 - 54
Provably secure convertible directed partially blind signatures Huang ZhenjieChen KefeiWang Yumin OriginalPaper Pages: 55 - 58
Key management protocol of the IEEE 802.16e Tian HaiboPang LiaojunWang Yumin OriginalPaper Pages: 59 - 62
Escrow-free certificate-based authenticated key agreement protocol from pairings Wang ShengbaoCao Zhenfu OriginalPaper Pages: 63 - 66
Improved non-sieving quadratic sieve Huang QingfengLi ZhitangYang Xiangdong OriginalPaper Pages: 67 - 70
Two-party authenticated key agreement in certificateless public key cryptography Shi YijuanLi Jianhua OriginalPaper Pages: 71 - 74
Evolutionary random sequence generators based on LFSR Zhang HuanguoWang YuhuaWu Xiaoping OriginalPaper Pages: 75 - 78
A weighted algorithm for watermarking relational databases Cui XinchunQin XiaolinSheng Gang OriginalPaper Pages: 79 - 82
Provable security of ID-based proxy multi-signature schemes Gu ChunxiangZhu YuefeiZhao Tao OriginalPaper Pages: 87 - 90
Proxy multisignature scheme with (t, m) threshold shared verification Wang XiaomingChen HuoyanZhang Zhen OriginalPaper Pages: 91 - 94
Instant messaging worms propagation simulation and countermeasures Hu HuapingWei Jianli OriginalPaper Pages: 95 - 100
A method to implement full anonymous attestation for trusted computing platform Hao LimingSun XunLu Songnian OriginalPaper Pages: 101 - 104
Efficient ID-based proxy blind signature scheme Zhang QingWen QiaoyanChen Gengli OriginalPaper Pages: 105 - 108
An authentication method of distinguishing proxy’s secure accident responsibility Zhu Shuren OriginalPaper Pages: 109 - 112
An efficient real-time fault-tolerant scheduling algorithm based on multiprocessor systems Yang FuminLuo WeiPang Liping OriginalPaper Pages: 113 - 116
Quantum secret sharing protocols with high efficiency Gao FeiWen QiaoyanZhu Fuchen OriginalPaper Pages: 117 - 120
An improved identity-based society oriented signature scheme with anonymous signers Tang Chunming OriginalPaper Pages: 121 - 125
Intrusion detection method for program vulnerability via library calls Duan XuetaoZhong AnmingJia Chunfu OriginalPaper Pages: 126 - 130
Genetic algorithm-based approaches for optimizing S-boxes Yin XinchunYang JieXie Li OriginalPaper Pages: 131 - 134
An intrusion detection method based on hierarchical hidden Markov models Jia ChunfuYang Feng OriginalPaper Pages: 135 - 138
A neural network method for reliability optimizations of complex systems Pan ZhongliangChen LingZhang Guangzhao OriginalPaper Pages: 139 - 142
A method of processing-storage transmission model-based system survivability measure Zhao QianWang HuiqiangFeng Guangsheng OriginalPaper Pages: 143 - 146
Learning vector quantization neural network method for network intrusion detection Yang DegangChen GuoLiao Xiaofeng OriginalPaper Pages: 147 - 150
TCP/IP feature reduction in intrusion detection Liu YulingWang HuiranTian Junfeng OriginalPaper Pages: 151 - 154
Publicly verifiable distributed proxy blind signature scheme Ma ChuanguiCheng RuiZhang Rurun OriginalPaper Pages: 155 - 158
XEN virtual machine technology and its security analysis Xue HaifengQing SihanZhang Huanguo OriginalPaper Pages: 159 - 162
Elliptic curve scalar multiplication with x-coordinate Zhang NingPei QingqiXiao Guozhen OriginalPaper Pages: 163 - 166
Multi-agent network intrusion active defense model based on immune theory Liu SunjunLi TaoXu Chun OriginalPaper Pages: 167 - 171
REESSE unified recursive algorithm for solving three computational problems Su ShenghuiYang Bingru OriginalPaper Pages: 172 - 176
Practical Internet voting protocol without strong physical assumption Meng BoZhang Huanguo OriginalPaper Pages: 177 - 180
Fair e-payment protocol based on simple partially blind signature scheme Liu JingweiSun RongKou Weidong OriginalPaper Pages: 181 - 184
Spectral characteristics of the best affine approach of multi-output m-valued logical functions Zhao YaqunYing DinghaiFeng Dengguo OriginalPaper Pages: 185 - 188
Securing multicast route discovery for mobile ad hoc networks Yang MingxiLi LayuanFang Yiwei OriginalPaper Pages: 189 - 192