A security kernel architecture based trusted computing platform Chen You-leiShen Chang-xiang Trusted Computing Architecture Pages: 1 - 4
Fault-tolerant design techniques in A CMP architecture Yao Wen-binWang Dong-sheng Trusted Computing Architecture Pages: 5 - 8
Investigation on relationship between cost and software reliability Xu Ren-zuoHan Yi-fanYao Jun-feng Trusted Computing Architecture Pages: 9 - 12
Fault tolerant approach for data encryption and digital signature based on ECC system Zeng YongMa Jian-feng Trusted Computing Architecture Pages: 13 - 16
Simultaneous multithreading fault tolerance processor Dong LanHu Ming-zengHe Feng Trusted Computing Architecture Pages: 17 - 20
An adaptive trust model of web services Su Jin-dianGuo He-qingGao Yin Trusted Computing Architecture Pages: 21 - 25
HermitFS: A secure storage system in the open environment Long QinZeng Feng-pingPan Ai-min Trusted Software and Hardware Pages: 26 - 30
An FPGA implementation of GF (p) elliptic curve cryptographic coprocessor Liu Yu-zhenQin Zhong-pingZhang Huan-guo Trusted Software and Hardware Pages: 31 - 34
Analysis and application for integrity model on trusted platform Tu Guo-qingZhang Huan-guoYu Dan-dan Trusted Software and Hardware Pages: 35 - 38
SLID: A secure lowest-ID clustering algorithm Hu Guang-mingHuang Zun-guoGong Zheng-hu Trusted Software and Hardware Pages: 39 - 42
Formal verification under unknown constraints Li Guang-huiLi Xiao-wei Trusted Software and Hardware Pages: 43 - 46
Building intrusion tolerant software system Peng Wen-lingWang Li-naChen Wei Trusted Software and Hardware Pages: 47 - 50
TRSTR: A fault-tolerant microprocessor architecture based on SMT Yang HuaCui GangYang Xiao-zong Trusted Software and Hardware Pages: 51 - 55
Extension of subjective logic for time-related trust Huang Chen-linHu Hua-ping Trusted Software and Hardware Pages: 56 - 60
An efficient crash recovery technique for real-time main memory database Xiao Ying-yuanLiu Yun-shengLiang Ping Trusted Software and Hardware Pages: 61 - 64
Access request trustworthiness in weighted access control framework Wang Lun-weiLiao Xiang-keWang Huai-min Trusted Software and Hardware Pages: 65 - 69
Research on fault tolerant scheduling algorithms of web cluster based on probability Liu An-fengChen Zhi-gangLong Guo-ping Trusted Software and Hardware Pages: 70 - 74
Survivability specification framework for dependability-functionality codesign of ERTS Jin Yong-xian Trusted Software and Hardware Pages: 75 - 78
Methods for increasing creditability of anomaly detection system Yan Giao Security of Network and Communication Pages: 79 - 82
Mechanism and defense on malicious code Wen Wei-pingQing Si-han Security of Network and Communication Pages: 83 - 88
Two-stage algorithm for correlating the intrusion alerts Wang Liang-minMa Jian-feng Security of Network and Communication Pages: 89 - 92
A Micro-payment based Isolation of Misbehavior secure routing for sensor network Li HuiWei WeiChen Ke-fei Security of Network and Communication Pages: 93 - 97
Implementation and performance evaluation of IPSec VPN based on netfilter Zhao Da-yuanJiang Yi-xinLi Yan-xi Security of Network and Communication Pages: 98 - 102
Masquerade detection using support vector machine Yang MinWang Li-naChen Wei Security of Network and Communication Pages: 103 - 106
A new (t, n) threshold signature scheme withstanding the conspiracy attack Xie QiYu Xiu-yuan Security of Network and Communication Pages: 107 - 110
MA-IDS: A distributed intrusion detection system based on data mining Sun Jian-huaJin HaiHan Zong-fen Security of Network and Communication Pages: 111 - 114
A neural network approach for misuse and anomaly intrusion detection Yao YuYu GeGao Fu-xiang Security of Network and Communication Pages: 115 - 118
Intelligent intrusion detection system model using rough neural network Yan Huai-zhiHu Chang-zhenTan Hui-min Security of Network and Communication Pages: 119 - 122
A new communication scheme for threshold certificate authority in ad hoc networks Li Guang-songLi HongHan Wen-bao Security of Network and Communication Pages: 123 - 126
SLEACH: Secure low-energy adaptive clustering hierarchy protocol for wireless sensor networks Wang Xiao-yunYang Li-zhenChen Ke-fei Security of Network and Communication Pages: 127 - 131
Complex threshold key management for ad hoc network Guo WeiXiong Zhong-weiLi Zhi-tang Security of Network and Communication Pages: 132 - 136
Privilege flow oriented intrusion detection based on Hidden semi-Markov model Zhong An-mingJia Chun-fu Security of Network and Communication Pages: 137 - 141
A cluster-based secure active network environment Chen Xiao-linZhou Jing-yangChen Gui-hai Security of Network and Communication Pages: 142 - 146
Immune based intrusion detector generating algorithm Dong Xiao-meiYu GeXiang Guang Security of Network and Communication Pages: 147 - 151
Security communication model of wireless trade system Zhang Wen-kaiZhang Si-yu Security of Network and Communication Pages: 152 - 156
A novel model of IDS based on fuzzy cluster and immune principle Tao Xin-minLiu Fu-rong Security of Network and Communication Pages: 157 - 160
A network-based VPN architecture using virtual routing Zhang Bao-liangHu Han-pingKong Tao Security of Network and Communication Pages: 161 - 164
Verifiable (t, n) threshold signature scheme based on elliptic curve Wang Hua-qunZhao Jun-xiZhang Li-jun Security of Network and Communication Pages: 165 - 168
An intrusion alarming system based on self-similarity of network traffic Yu FeiZhu Miao-liangXu Cheng Security of Network and Communication Pages: 169 - 173
Addition sequence method of scalar multiplication of elliptic curve over OEF Liu DuoDai Yi-qi Cryptography Pages: 174 - 178
Evolutionary design of boolean functions Wang Zhang-yiZhang Huan-guoMeng Qing-shu Cryptography Pages: 179 - 182
Cryptanalysis of the one-time proxy signature scheme used in mobile agents Fu Xiao-tongXiao HongXiao Guo-zhen Cryptography Pages: 183 - 185
A proxy signature scheme as secure as decisional Diffie-Hellman problem Lu Rong-xingCao Zhen-fu Cryptography Pages: 186 - 190
A secure and efficient (t, n) multi-secret sharing scheme Pang Liao-junWang Yu-min Cryptography Pages: 191 - 194
Correlation degree and correlation coefficient of multi-output functions Ju Gui-zhiZhao Ya-qun Cryptography Pages: 195 - 198
Fair electronic payment scheme based on DSA Wang Shao-binHong FanZhu Xian Cryptography Pages: 203 - 206
Robust threshold Guillou-Quisquater signature scheme Wang HongZhang Zhen-fengFeng Deng-guo Cryptography Pages: 207 - 210
Statistical characteristics of the complexity for prime-periodic sequences Niu Zhi-huaLi Nai-chengXiao Guo-zhen Cryptography Pages: 211 - 213
Towards the idealization procedure of BAN-like logics Cao Li-liChen Ke-fei Cryptography Pages: 214 - 218