互联网 qkzz.net
全刊杂志网:首页 > 大学学报 > 《武汉大学学报(英文版)》 > 2005年第01期
《武汉大学学报(英文版)》
武汉大学学报(英文版)2005年第01期封面 购买
收藏
投稿

《武汉大学学报(英文版)》2005年第01期

[Trusted Computing Architecture]
A Security Kernel Architecture Based Trusted Computing PlatformCHEN You-lei, SHEN Chang-xiang 我来编辑
Fault. Tolerant Design Techniques in A CMP ArchitectureYAO Wen-bin WANG Dong-sheng 我来编辑
Investigation on Relationship between Cost and Software ReliabilityXU Ren-zuo HAN Yi-fan HUANG Can YAO Jun-feng 我来编辑
Fault Tolerant Approach for Data Encryption and Digital Signature Based on ECC SystemZENG Yong MA Jian-fengt 我来编辑
Simultaneous Multithreading Fault Tolerance ProcessorDONG Lan HU Ming-zengn Jl Zhen-zhouI CUI Guang-zuo TANG Xin-min HE Feng 我来编辑
An Adaptive Trust Model of Web ServicesSU Jin-dian GUO He-qingt GAO Yin 我来编辑
[Trusted Software and Hardware]
HermitFS: A Secure Storage System in the Open EnvironmentLONG Qin ZENG Feng-ping WU Si-lian PAN Ai-mint 我来编辑
An FPGA Implementation of GF(p) Elliptic Curve Cryptographic CoprocessorLIU Yu-zhen QIN Zhong-ping ZHANG Huan-guo 我来编辑
Analysis and Application for Integrity Model on Trusted PlatformTU Guo-qing ZHANG Huan-guot WANG Li-na YU Dan-dan 我来编辑
SLID: A Secure Lowest. ID Clustering AlgorithmHU Guang-ming HUANG Zun-guo HU Hua-ping GONG Zheng-hut 我来编辑
Formal Verification under Unknown ConstraintsLI Guang-hui LI Xiao-wei 我来编辑
Building Intrusion Tolerant Software SystemPENG Wen-ling WANG Li-naI ZHANG Huan-guoit CHEN Wei 我来编辑
TRSTR: A Fault. Tolerant Microprocessor Architecture Based on SMTYANG Hua CUI Gangt YANG Xiao-zong 我来编辑
Extension of Subjective Logic for Time. Related TrustHUANG Chen-lin HU Hua-pingt 我来编辑
An Efficient Crash Recovery Technique for Real- Time Main Memory DatabaseXIAO Ying-yuan LIU Yun-sheng LIAO Guo-qiong LIANG Ping 我来编辑
Access Request Trustworthiness in Weighted Access Control FrameworkWANG Lun-wei LIAO Xiang-ke WANG Huai-min 我来编辑
Research on Fault Tolerant Scheduling Algorithms of Web Cluster Based on ProbabilityLIU An-feng CHEN Zhi-gang LONG Guo-pingt 我来编辑
Survivability Specification Framework for Dependability. Functionality Codesign of ERTSJIN Yong-xian 我来编辑
[Security of Network and Communication]
Methods for Increasing Creditability of Anomaly Detection SystemYAN Qiao 我来编辑
Mechanism and Defense on Malicious CodeWEN Wet-ping CLING Si-han 我来编辑
Two.Stage Algorithm for Correlating the Intrusion AlertsWANG Liang-min MA Jian-fengit 我来编辑
A Micro-Payment Based Isolation of Misbehavior Secure Routing for Sensor NetworkLI Hui WEI Wei CHEN Ke-fei 我来编辑
Implementation and Performance Evaluation of IPSec VPN Based on NetfilterZHAO Da-yuan JIANG Yi-xin LIN Chuangt LI Yan-xi 我来编辑
Masquerade Detection Using Support Vector MachineYANG Min WANG Lima ZHANG Huan-guo CHEN Wei 我来编辑
ANew(t, n) Threshold Signature Scheme Withstanding the Conspiracy AttackXIE Qi YU Xiu-yuan 我来编辑
MA-IDS: A Distributed Intrusion Detection System Based on Data MiningSUN Jian-hua JIN Hait CHEN Hao HAN Zong-fen 我来编辑
A Neural Network Approach for Misuse and Anomaly Intrusion DetectionYAO Yu YU Get GAO Fu-xiang 我来编辑
Intelligent Intrusion Detection System Model Using Rough Neural NetworkYAN Huai-zhi HU Chang-zhen TAN Hui-min 我来编辑
A New Communication Scheme for Threshold Certificate Authority in Ad Hoc NetworksLI Guang-songI LI Hong HAN Wen- bao 我来编辑
SLEACH: Secure Low. Energy Adaptive Clustering Hierarchy Protocol for Wireless Sensor NetworksWANG Xiao-yun YANG Li-zhenI CHEN Ke-fei 我来编辑
Complex Threshold Key Management for Ad Hoc NetworkGUO Wei XIONG Zhong-wei LI Zhi-tang 我来编辑
Privilege Flow Oriented Intrusion Detection Based on Hidden Semi. Markov ModelZHONG An-ming JlA Chun-fu 我来编辑
A Cluster. Based Secure Active Network EnvironmentCHEN Xiao-lin ZHOU Jing-yang DAI Han LU Sang-lu CHEN Gui-hai 我来编辑
Immune Based Intrusion Detector Generating AlgorithmDONG Xiao-mei YU Ge XIANG Guang 我来编辑
Security Communication Model of Wireless Trade SystemZHANG Wen-kaiI ZHANG Si-yu 我来编辑
A Novel Model of IDS Based on Fuzzy Cluster and Immune PrincipleTAO Xin-min LIU Fu-rong 我来编辑
A Network. Based VPN Architecture Using Virtual RoutingZHANG Bao-liang HU Han-ping WU Xiao-gang KONG Tao 我来编辑
Verifiable (t, n) Threshold Signature Scheme Based on Elliptic CurveWANG Hua-qun ZHAO Jun-xi ZHANG Li-jun 我来编辑
An Intrusion Alarming System Based on Self. Similarity of Network TrafficYU Fei ZHU Miao-liang CHEN Yu-feng LI Ren-fa XU Cheng 我来编辑
[Cryptography]
Addition Sequence Method of Scalar Multiplication of Elliptic Curve over OEFLIU Duo DAI Yi-qit 我来编辑
Evolutionary Design of Boolean FunctionsWANG Zhang-yiI ZHANG Huan-guo QIN Zhong-ping MENG Qing-shu 我来编辑
Cryptanalysis of the One. Time Proxy Signature Scheme Used in Mobile AgentsFU Xiao-tong XIAO Hong XIAO Guo-zhen 我来编辑
A Proxy Signature Scheme as Secure as Decisional Diffie. Hellman ProblemLU Rong-xing CAO Zhen-fut 我来编辑
A Secure and Efficient (t, n) Multi. Secret Sharing SchemePANG Liao-jun WANG Yu-mint 我来编辑
Correlation Degree and Correlation Coefficient of Multi. Output FunctionsJU Gui-zhiI ZHAO Ya-qun 我来编辑
Construction of Resilient FunctionsZHANG Jie WEN Qiao-yan 我来编辑
Fair Electronic Payment Scheme Based on DSAWANG Shao-bin HONG Fant ZHU Xian 我来编辑
Robust Threshold Guillou. Quisquater Signature SchemeWANG Hong ZHANG Zhen-feng FENG Deng-guo 我来编辑
Statistical Characteristics of the Complexity for Prime. Periodic SequencesNIU Zhi-huaI LI Nai-cheng XIAO Guo-zhenit 我来编辑
Towards the Idealization Procedure of BAN. Like LogicsCAO Li-li CHEN Ke-fei 我来编辑
A New Proxy Signature Scheme with Message Recovery Using Self. Certified Public KeyLI Ji-guo ZHANG Yi-chen ZHU Yue-long 我来编辑
A Nominative Multi-Proxy Signature Scheme Based on ECCMA Chuan-gui GAO Feng-xiu WANG Yan 我来编辑
Atomic Electronic Contract Protocol Based on Convertible SignatureLIU Yi-chun WANG Li-na ZHANG Huan-guot 我来编辑
Cryptanalysis and Improvement of Signcryption Schemes on Elliptic CurvesLI Xiang-xue CHEN Ke-fei LI Shi-qun 我来编辑
An Identity. Based Key. Exchange ProtocolZHANG Ya-juan ZHU Yue-fei HUANG Qiu-sheng 我来编辑
Polynomial Analysis of DH Secrete Key and Bit SecurityJIANG Zheng-tao XU Wen-Ii WANG Yu-mint 我来编辑
Threshold Decryption Scheme with Multiple PoliciesFEI Ru-chun WANG Li-nat 我来编辑
Efficient Identity Based Signcryption Scheme with Public Verifiability and Forward SecurityLEI Fei-yu CHEN Wen CHEN Ke-fei MA Chang-she 我来编辑
Distribution of Random Session Key Based on Key-Insulated Public-Key CryptosystemsLU Hai-jun SU Yun-xue ZHU Yue-fei 我来编辑
An Efficient Threshold Blind Signature from Weil PairingCHENG Xiang-guo XU Wei-dong WANG Xin-mei 我来编辑
Algebraic Attack on Filter. Combiner Model Keystream GeneratorsWU Zhi-ping YE Ding-fengt MA Wei-ju 我来编辑
A New Threshold Signature Scheme Using Self-Certified Public KeysSHAO Jun LU Rong-xing CAO Zhen-fut 我来编辑
Efficient Authenticated Key Agreement Protocol Using Self. Certified Public Keys from PairingsSHAO Zu-hua 我来编辑
An Anonymous Payment Protocol with Mobile Agents in Hostile EnvironmentsLIU Yi XIANG Ming-sen WANG Yu-mint 我来编辑
A Formal Model for the Security of Proxy Signature SchemesGU Chun-xiang ZHU Yue-feit ZHANG Ya-juan 我来编辑
[Information Secutity Techologyand Application]
Wavelet. Based Denoising Attack on Image WatermarkingXUAN Jian-hui WANG Li-na ZHANG Huan-guo 我来编辑
Semi. Fragile Watermarking for Copyright Protection and Image AuthenticationHUANG Ji-feng 我来编辑
A Secure Public. key Image Authentication PlanYANG Qing CHEN Ke-fei 我来编辑
Data Hiding and Security for XML Database: A TRBAC. Based ApproachZHANG Wan-song SUN Weit LIU Da-xin 我来编辑
Turbo.Based DNW Algorithm for Compressed Video in VLC DomainLING He-fei LU Zheng-dingt ZOU Fu-hao 我来编辑
A New Images Hiding Scheme Based on Chaotic SequencesLIU Nian-sheng GUO Dong-hui WU Bo-xi Parr G 我来编辑
Robustness Proof on A United Watermarking Based on CRT TheoremLIU Li-gang CHEN Xiao-sut XIAO Dao-ju HU Lei 我来编辑
AA Novel Digital Audio Watermarking Scheme in the Wavelet DomainWANG Xiang-yang YANG Hong-ying ZHAO Hong 我来编辑
Information. Theoretic Analysis for the Difficulty of Extracting Hidden InformationZHANG Wei-ming LI Shi-qu CAO Jia LIU Jiu-fen 我来编辑
A Geometrical Transformations Resistant Digital Watermarking Based on QuantizationSHI Lei HONG Fan LIU Wei-qun HU Yu-ping CHEN Zhuo 我来编辑
A Family of RBAC. Based Workflow Authorization ModelsHONG Fan XING Guang-lin 我来编辑
A Role. Based PMI Security Model for E. GovernmentWU U-jun SU Kai-let YANG Zhi-hua 我来编辑
Model Checking Electronic Commerce Security Protocols Based on CTLXIAO De-qin ZHANG Huan-guo 我来编辑
购买 收藏 投稿
往期回顾
2005年第06期
2005年第05期
2005年第04期
2005年第03期
2005年第01期
2004年第04期
2004年第03期
2004年第02期
2004年第01期
2003年第04期
2003年第03期
2003年第02期
关键字
支持中国杂志产业发展,请购买、订阅纸质杂志,欢迎杂志社提供过刊、样刊及电子版。
关于我们 | 网站声明 | 刊社管理 | 网站地图 | 联系方式 | 中图分类法 | RSS 2.0订阅 | EMS快递查询
全刊杂志赏析网 2017