vCerberus: A DRTM system based on virtualization technology Wenzhi ChenZhipeng ZhangQinming He OriginalPaper 13 May 2010 Pages: 185 - 189
Remote attestation-based access control on trusted computing platform Xian’gang LiuXing ZhangChangxiang Shen OriginalPaper 13 May 2010 Pages: 190 - 194
Static analysis-based behavior model building for trusted computing dynamic verification Fajiang YuYue Yu OriginalPaper 13 May 2010 Pages: 195 - 200
Trust asymmetry in grid authentication Haiyan WangRuchuan Wang OriginalPaper 13 May 2010 Pages: 201 - 204
A trustworthiness-based distribution model for data leakage prevention Yin FanYu WangRongwei Yu OriginalPaper 13 May 2010 Pages: 205 - 209
Construction of high dependable distributed access control architecture based on quorum system Tinggang XiongZhengding LuZhong Ma OriginalPaper 13 May 2010 Pages: 210 - 216
Fault-tolerant rate-monotonic compact-factor-driven scheduling in hard-real-time systems Ping ZhuFumin YangGang Tu OriginalPaper 13 May 2010 Pages: 217 - 221
New constructions of identity-based threshold decryption Leyou ZhangYupu HuYang Yang OriginalPaper 13 May 2010 Pages: 222 - 226
Massive data covert transmission scheme based on Shamir threshold Tao ZhangYadi WangXing Rong OriginalPaper 13 May 2010 Pages: 227 - 231
11-Round impossible differential algebraic attack for serpent encryption algorithm Zhihua HuZhongping Qin OriginalPaper 13 May 2010 Pages: 232 - 236
Generation algorithm of a sort of P-permutations Haiqing HanHuanguo ZhangYan Tong OriginalPaper 13 May 2010 Pages: 237 - 241
A security patch for a three-party key exchange protocol Jianjie ZhaoDawu Gu OriginalPaper 13 May 2010 Pages: 242 - 246
Efficient broadcast encryption scheme based on number theory research unit Weidong ZhangXixiang LüHui Li OriginalPaper 13 May 2010 Pages: 247 - 250
A message digest disposing algorithm based on RC4 Yabin LiuJing ChenHuanguo Zhang OriginalPaper 13 May 2010 Pages: 251 - 254
A dynamic ID-based authenticated group key exchange protocol without pairings Liyun XieMingxing He OriginalPaper 13 May 2010 Pages: 255 - 260
A usable selection range standard based on test suite reduction algorithms Yanjun MaZhigang ZhaoMaojin Yun OriginalPaper 13 May 2010 Pages: 261 - 266
An efficient two-party key exchange protocol with strong security Shaofeng DengYifa LiYiqun Deng OriginalPaper 13 May 2010 Pages: 267 - 271
A biometric-based user authentication for wireless sensor networks Jianjun YuanChangjun JiangZuowen Jiang OriginalPaper 13 May 2010 Pages: 272 - 276