A new process and framework for direct anonymous attestation based on symmetric bilinear maps Liang TanMingtian Zhou OriginalPaper 03 September 2011 Pages: 369 - 375
Using new fusion operations to improve trust expressiveness of subjective logic Hongwei ZhouWenchang ShiBin Liang OriginalPaper 03 September 2011 Pages: 376 - 382
A trusted environment construction method for security-sensitive software Jing LiHuanguo ZhangLingling Fang OriginalPaper 03 September 2011 Pages: 383 - 390
An approach of trustworthy software design with automatically adapting software update Zhen LiJunfeng Tian OriginalPaper 03 September 2011 Pages: 391 - 398
Improved verifiability scheme for data storage in cloud computing Xiaoyuan YangShuaishuai ZhuXiaozhong Pan OriginalPaper 03 September 2011 Pages: 399 - 404
A mechanism based on reputation in P2P networks to counter malicious packet dropping Hao PengSongnian LuDandan Zhao OriginalPaper 03 September 2011 Pages: 405 - 408
A novel intrusion detection method based on improved SVM by combining PCA and PSO Hui WangGuiling ZhangNa Sun OriginalPaper 03 September 2011 Pages: 409 - 413
A nonparametric adaptive CUSUM method and its application in source-end defense against SYN flooding attacks Ming Yu OriginalPaper 03 September 2011 Pages: 414 - 418
Research of session initial protocol security mechanism on public key technique Jian HuYuxiang LiJiuchao Feng OriginalPaper 03 September 2011 Pages: 419 - 422
A broadcast signcryption protocol for ad hoc networks Xiaoming WangGuoqing YaoZhiwei Liao OriginalPaper 03 September 2011 Pages: 423 - 429
One-time rational secret sharing scheme based on bayesian game Youliang TianJianfeng MaWenjiang Ji OriginalPaper 03 September 2011 Pages: 430 - 434
A complete set of addition laws for twisted jacobi intersection curves Hongfeng WuRongquan Feng OriginalPaper 03 September 2011 Pages: 435 - 438
An ideal lattice based IBE scheme in the standard model Xiaoyuan YangLiqiang WuLixian Wei OriginalPaper 03 September 2011 Pages: 439 - 446
High-order bit independence criterion test for the s-boxes Sheng GaoWenping MaJiwei Zhu OriginalPaper 03 September 2011 Pages: 447 - 451
Construction of k-ary pseudorandom elliptic curve sequences Chenhuang WuXin WengZhixiong Chen OriginalPaper 03 September 2011 Pages: 452 - 456
On the structure of cyclic codes over F q + uF q + vF q + uvF q Xiaofang XuXiusheng Liu OriginalPaper 03 September 2011 Pages: 457 - 460