Loading...
导航切换
JUST
Home
About
About Journal
Editorial Board
Staff
Authors
Submit an Article
Manuscript Tracking
Guide to Authors
Copyright Agreement
Templates
Previous Manuscript Central
Referees
Review Policy
Referee Login
Editor in Chief Login
Editor Login
Office Login
Browse
Just Accepted
Current Issue
Highlights
Archive
Most Cited Articles
Most Read Articles
Most Download Articles
Subscribe
News
Contact us
Chinese
Table of Content
31 July 2011, Volume 41 Issue 7
Previous Issue
Next Issue
For Selected:
Download Citations
EndNote
Ris
BibTeX
Toggle Thumbnails
2011, 41 (7): 565-575. doi:
10.3969/j.issn.0253-2778.2011.07.001
Security issues and solutions on social networks
LIU Jianwei, LI Weiyu, SUN Yu
Abstract
(
551
)
PDF
(
605KB
)(
160
)
2011, 41 (7): 576-581. doi:
10.3969/j.issn.0253-2778.2011.07.002
A lossless data coding and hiding scheme for fingerprint templates
HU Xiaocheng, ZHANG Weiming, YU Nenghai
Abstract
(
215
)
PDF
(
952KB
)(
54
)
2011, 41 (7): 582-588. doi:
10.3969/j.issn.0253-2778.2011.07.003
Hybrid group key management scheme based on STR unbalanced tree structure
MA Changsha, XUE Kaiping, HONG Peilin, DING Rong
Abstract
(
215
)
PDF
(
1032KB
)(
35
)
2011, 41 (7): 589-593. doi:
10.3969/j.issn.0253-2778.2011.07.004
A password-authenticated key agreement scheme with perfect forward secrecy
HAO Zhuo, YU Nenghai
Abstract
(
233
)
PDF
(
974KB
)(
54
)
2011, 41 (7): 594-598. doi:
10.3969/j.issn.0253-2778.2011.07.005
RFID cryptographic protocol based on two-dimensional region Hash chain
XIONG Wanxing, XUE Kaiping, HONG Peilin, MA Changsha
Abstract
(
213
)
PDF
(
977KB
)(
53
)
2011, 41 (7): 599-606. doi:
10.3969/j.issn.0253-2778.2011.07.006
A tamper-proof software watermark using code-based encryption
TANG Zhanyong, FANG Dingyi, SU Lin
Abstract
(
221
)
PDF
(
1052KB
)(
42
)
2011, 41 (7): 607-614. doi:
10.3969/j.issn.0253-2778.2011.07.007
Adaptive adjustment weighted text classification
LAI Yingxu, XU Xin, YANG Zhen
Abstract
(
207
)
PDF
(
1300KB
)(
41
)
2011, 41 (7): 615-618. doi:
10.3969/j.issn.0253-2778.2011.07.008
Multivariate group signature scheme withstanding conspiracy attacks
TAO Yu, YANG Yatao,LI Zichen, ZHENG Xin
Abstract
(
235
)
PDF
(
886KB
)(
37
)
2011, 41 (7): 619-625. doi:
10.3969/j.issn.0253-2778.2011.07.009
Multiple-authority-key KP-ABE scheme with adaptive security
YANG Xiaoyuan, WANG Zhiqiang, CAI Weiyi
Abstract
(
253
)
PDF
(
1842KB
)(
36
)
2011, 41 (7): 626-635. doi:
10.3969/j.issn.0253-2778.2011.07.010
Intrusion detection approach towards software behavior trustworthiness
WANG Xinzhi, SUN Lechang, LU Yuliang, ZHANG Min
Abstract
(
214
)
PDF
(
1130KB
)(
44
)
2011, 41 (7): 636-641. doi:
10.3969/j.issn.0253-2778.2011.07.011
A new family of p-ary low correlation sequences with large family size
XIA Yongbo
Abstract
(
194
)
PDF
(
1138KB
)(
35
)
2011, 41 (7): 642-650. doi:
10.3969/j.issn.0253-2778.2011.07.012
An audio digital watermarking algorithm in DCT domain for air-channel transmitting
ZHANG Xia, CHANG Di,,HUANG Qian, YANG Wanyi, GUO Wei
Abstract
(
210
)
PDF
(
1483KB
)(
47
)
2011, 41 (7): 651-658. doi:
10.3969/j.issn.0253-2778.2011.07.013
A seamless switching method based on reverse route redirection
ZHANG Jianwei, HAN Feng, LIU Si, LI Chaoyang, CAI Zengyu
Abstract
(
188
)
PDF
(
1208KB
)(
32
)
News
More...
ISSN 0253-2778 34-1054/N
Table of Contents
Cover Illustration
×
Cover Illustration
Current Issue
, Vol. 51, No. 12
Previous Issues
2009 - present
Highlights
Top Cited
Top Downloaded
E-mail Alert
RSS