Research on trusted computing and its development ChangXiang ShenHuanGuo ZhangMingDi Xu Review 26 March 2010 Pages: 405 - 433
Research on theory and key technology of trusted computing platform security testing and evaluation HuanGuo ZhangFei YanJing Zhan Research Papers 26 March 2010 Pages: 434 - 453
A property-based attestation protocol for TCM DengGuo FengYu Qin Research Papers 01 March 2010 Pages: 454 - 464
Universally composable secure TNC model and EAP-TNC protocol in IF-T JunWei ZhangJianFeng MaSangJae Moon Research Papers 01 March 2010 Pages: 465 - 482
Embedded DHT overlays in virtual computing environments YiMing ZhangXiCheng LuDongSheng Li Research Papers 28 January 2010 Pages: 483 - 493
Bayesian cognitive trust model based self-clustering algorithm for MANETs Wei WangGuoSun Zeng Research Papers 01 March 2010 Pages: 494 - 505
Asymmetric encryption and signature method with DNA technology XueJia LaiMingXin LuXiWen Fang Research Papers 26 March 2010 Pages: 506 - 514
Constructing quantum error correcting code via logic function ShuQin ZhongZhi MaYaJie Xu Research Papers 01 March 2010 Pages: 515 - 523
Conjugate adjoining problem in braid groups and new design of braid-based signatures LiCheng WangLiHua WangXinXin Niu Research Papers 01 March 2010 Pages: 524 - 536
On the number of rotation symmetric Boolean functions ShaoJing FuChao LiLongJiang Qu Research Papers 01 March 2010 Pages: 537 - 545
Differential-algebraic cryptanalysis of reduced-round of Serpent-256 MeiQin WangXiaoYun WangLucas C.K. Hui Research Papers 01 March 2010 Pages: 546 - 556
Efficient signcryption between TPKC and IDPKC and its multi-receiver construction YinXia SunHui Li Research Papers 26 March 2010 Pages: 557 - 566
Universally composable one-time signature and broadcast authentication JunWei ZhangJianFeng MaSangJae Moon Research Papers 26 March 2010 Pages: 567 - 580
A more efficient accountable authority IBE scheme under the DL assumption Peng XuGuoHua CuiXueMing Tang Research Papers 01 March 2010 Pages: 581 - 592
CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles Jian WengMinRong ChenFeng Bao Research Papers 01 March 2010 Pages: 593 - 606
Centroid-based semi-fragile audio watermarking in hybrid domain HongXia WangMingQuan Fan Research Papers 26 March 2010 Pages: 619 - 633
Image universal steganalysis based on best wavelet packet decomposition XiangYang LuoFenLin LiuDaoShun Wang Research Papers 01 March 2010 Pages: 634 - 647
Secure network coding in the presence of eavesdroppers MingXing LuoYiXian YangXinXin Niu Research Papers 01 March 2010 Pages: 648 - 658
Identifying heavy hitters in high-speed network monitoring Yu ZhangBinXing FangYongZheng Zhang Research Papers 26 March 2010 Pages: 659 - 676