Survey of information security Shen ChangXiangZhang HuangGuoHuang JiWu OriginalPaper Pages: 273 - 298
Analysis of affinely equivalent Boolean functions Meng QingShuZhang HuanGuoWang ZhangYi OriginalPaper Pages: 299 - 306
Boolean functions of an odd number of variables with maximum algebraic immunity Li NaQi WenFeng OriginalPaper Pages: 307 - 317
Pirate decoder for the broadcast encryption schemes from Crypto 2005 Weng JianLiu ShengLiChen KeFei OriginalPaper Pages: 318 - 323
Symmetric-key cryptosystem with DNA technology Lu MingXinLai XueJiaQin Lei OriginalPaper Pages: 324 - 333
A chaos-based image encryption algorithm using alternate structure Zhang YiWeiWang YuMinShen XuBang OriginalPaper Pages: 334 - 341
Impossible differential cryptanalysis of Advanced Encryption Standard Chen JieHu YuPuZhang YueYu OriginalPaper Pages: 342 - 350
Classification and counting on multi-continued fractions and its application to multi-sequences Dai ZongDuoFeng XiuTao OriginalPaper Pages: 351 - 358
A trinomial type of σ-LFSR oriented toward software implementation Zeng GuangHe KaiChengHan WenBao OriginalPaper Pages: 359 - 372
Identity-based signature scheme based on quadratic residues Chai ZhenChuanCao ZhenFuDong XiaoLei OriginalPaper Pages: 373 - 380
Modular approach to the design and analysis of password-based security protocols Feng DengGuoChen WeiDong OriginalPaper Pages: 381 - 398
Design of secure operating systems with high security levels Qing SiHanShen ChangXiang OriginalPaper Pages: 399 - 418
A formal model for access control with supporting spatial context Zhang HongHe YePingShi ZhiGuo OriginalPaper Pages: 419 - 439
Universally composable anonymous Hash certification model Zhang FanMa JianFengSangJae Moon OriginalPaper Pages: 440 - 455
Trusted dynamic level scheduling based on Bayes trust model Wang WeiZeng GuoSun OriginalPaper Pages: 456 - 469
Log-scaling magnitude modulated watermarking scheme Ling HeFeiYuan WuGangLu ZhengDing OriginalPaper Pages: 470 - 490
A digital authentication watermarking scheme for JPEG images with superior localization and security Yu MiaoHe HongJieZhang JiaShu OriginalPaper Pages: 491 - 509
Blind reconnaissance of the pseudo-random sequence in DS/SS signal with negative SNR Huang XianGaoHuang WeiHu YanHua OriginalPaper Pages: 510 - 520