An unknown Trojan detection method based on software network behavior Yu LiangGuojun PengYing Wang OriginalPaper 19 October 2013 Pages: 369 - 376
Information transfer model of virtual machine based on storage covert channel Xiaorui WangQingxian WangJianping Lu OriginalPaper 19 October 2013 Pages: 377 - 384
An anonymous data collection framework for digital community Hongtao LiJianfeng MaShuai Fu OriginalPaper 19 October 2013 Pages: 385 - 392
A novel fuzzy keyword retrieval scheme over encrypted cloud data Ke TianWeiming ZhangNenghai Yu OriginalPaper 19 October 2013 Pages: 393 - 401
Formulations of some bit switching functions in DES Lin YouYilin YangWanli Wen OriginalPaper 19 October 2013 Pages: 402 - 406
A novel secret sharing scheme based on minimal linear codes Zhihui LiJianhong SunJing Li OriginalPaper 19 October 2013 Pages: 407 - 412
A quantum error-correction circuit based on cyclic code Hongjun LüZhike ZhangGuangjun Xie OriginalPaper 19 October 2013 Pages: 413 - 417
Application of improved PSO-LSSVM on network threat detection Fumin QiXiaoyao XieFengxuan Jing OriginalPaper 19 October 2013 Pages: 418 - 426
An adaptive push-styled command and control mechanism in mobile botnets Wei ChenPeihua GongGeng Yang OriginalPaper 19 October 2013 Pages: 427 - 434
Homomorphic MAC-based scheme against pollution attacks in network coding Yujie ZhangYing CaiYanfang Fan OriginalPaper 19 October 2013 Pages: 435 - 442
G bytes data hiding method based on cluster chain structure Xiaopeng NiuQingbao LiYulong Wang OriginalPaper 19 October 2013 Pages: 443 - 448
A privacy protection method for continuous query based on location services Wenling HuYongli WangGongxuan Zhang OriginalPaper 19 October 2013 Pages: 449 - 454
Reversible audio watermarking algorithm using non-causal prediction Yongjin HuoShijun XiangZhongliang Bai OriginalPaper 19 October 2013 Pages: 455 - 460