BBACIMA: A trustworthy integrity measurement architecture through behavior-based TPM access control Aimin YuDengguo Feng OriginalPaper 27 November 2008 Pages: 513 - 518
Formal analysis on an extended security model for database systems Hong ZhuYi ZhuYuanzhen Wang OriginalPaper 27 November 2008 Pages: 519 - 522
A Peer-to-Peer resource sharing scheme using trusted computing technology Lu ChenHuanguo ZhangLiang Cai OriginalPaper 27 November 2008 Pages: 523 - 527
A novel trust enhanced grid authentication mechanism Haiyan WangRuchuan Wang OriginalPaper 27 November 2008 Pages: 528 - 532
Survivability of components assembly in architecture Wei GuoYanyan ZhengRenzuo Xu OriginalPaper 27 November 2008 Pages: 533 - 538
TPM context manager and dynamic configuration management for trusted virtualization platform Yu QinDengguo FengChunyong Liu OriginalPaper 27 November 2008 Pages: 539 - 546
Trustworthy metrics models for internetware Yang ZhangBin FangChuanyun Xu OriginalPaper 27 November 2008 Pages: 547 - 552
Privacy-preserving trust negotiation with hidden credentials and hidden policies in a multi-party environment Shanqing GuoJuan WeiQiuliang Xu OriginalPaper 27 November 2008 Pages: 553 - 556
A new chaotic function and its cryptographic usage Xueguang ZhouHuanguo Zhang OriginalPaper 27 November 2008 Pages: 557 - 561
Breaking and repairing the certificateless key agreement protocol from ASIAN 2006 Liang XiaShengbao WangGuoming Xu OriginalPaper 27 November 2008 Pages: 562 - 566
An efficient certificateless ring signature scheme Lijun ZhuFutai Zhang OriginalPaper 27 November 2008 Pages: 567 - 571
Analysis and improvement of cross-realm client-to-client password authenticated key exchange protocols Xiaofei DingChuangui MaQingfeng Cheng OriginalPaper 27 November 2008 Pages: 572 - 576
On k-error linear complexity of some explicit nonlinear pseudorandom sequences Zhixiong ChenChenhuang Wu OriginalPaper 27 November 2008 Pages: 577 - 581
Forward-secure digital signature scheme with tamper evidence Han JiangQiuliang XuFengbo Lin OriginalPaper 27 November 2008 Pages: 582 - 586
Chrestenson spectrum and auto-correlation function of inverse permutations of quick trickle permutations Jue WangZhengchao LiYaqun Zhao OriginalPaper 27 November 2008 Pages: 587 - 590
An improved simple power attack against Camellia’s key schedule Shuanggen LiuHaiying NiYunyan Liao OriginalPaper 27 November 2009 Pages: 591 - 594
A binary images watermarking algorithm based on adaptable matrix Fan ZhangJunliang Zhang OriginalPaper 27 November 2008 Pages: 595 - 599
A mobile accessible closed multi-part group communication scheme in IPv6 network Yue ChenHongzhao KouYuanbo Guo OriginalPaper 27 November 2008 Pages: 600 - 604
A new provably-secure key agreement protocol for roaming in mobile networks Guangsong LiPenghai Wang OriginalPaper 27 November 2008 Pages: 605 - 608
A protocol for fair electronic purchase based on concurrent signatures Xiangdong LiQingxian WangLi Chen OriginalPaper 27 November 2008 Pages: 609 - 614
Static extracting method of software intended behavior based on API functions invoking Guojun PengXuanchen PanHuanguo Zhang OriginalPaper 27 November 2008 Pages: 615 - 620
Attribute-based re-encryption scheme in the standard model Shanqing GuoYingpei ZengQiuliang Xu OriginalPaper 27 November 2008 Pages: 621 - 625
An approach for handling conflicts in authorization Mingsheng ZhangMingyi Zhang OriginalPaper 27 November 2008 Pages: 626 - 630
Preventing dropping packets attack in sensor networks: A game theory approach Libin YangDejun MuXiaoyan Cai OriginalPaper 27 November 2008 Pages: 631 - 635
Secure localization algorithm based on node cooperative for sensor networks Jianguo MaBao Peng OriginalPaper 27 November 2008 Pages: 636 - 640