Towards fast repackaging and dynamic authority management on Android Jun SongMohan ZhangHuanguo Zhang Security of Information System 09 January 2016 Pages: 1 - 9
SwordDTA: A dynamic taint analysis tool for software vulnerability detection Jun CaiPeng ZouJun He Security of Information System 09 January 2016 Pages: 10 - 20
A cross-domain access control model based on trust measurement Xiaohui YangHong Wang Security of Information System 09 January 2016 Pages: 21 - 28
A high-assurance trust model for digital community control system based on internet of things Hongtao LiJinsheng XingJianfeng Ma Security of Information System 09 January 2016 Pages: 29 - 36
A new relay attack on distance bounding protocols and its solution with time-stamped authentication for RFID Guoheng WeiHuanguo ZhangYa Wang Security of Information System 09 January 2016 Pages: 37 - 46
Probabilistic model of software approximate correctness Yanfang MaLiang Chen Security of Information System 09 January 2016 Pages: 47 - 55
Implementation of a TPM-based security enhanced browser password manager Yuchen HeRui WangWenchang Shi Security of Content and Network 09 January 2016 Pages: 56 - 62
Research on application’s credibility verification based on ABD Xuejun YuGuangzhi JiangYong Liang Security of Content and Network 09 January 2016 Pages: 63 - 68
Game theoretic simulation on the mimicry honeypot Leyi ShiJunnan ZhaoXin Liu Security of Content and Network 09 January 2016 Pages: 69 - 74
Improved differential attack on 30-round SIMON64 Gaoli WangNan GanYue Li Cryptology 09 January 2016 Pages: 75 - 83
A novel fully homomorphic encryption scheme bsed on LWE Yong DingXiumin LiXinguo Li Cryptology 09 January 2016 Pages: 84 - 92