273 | -- | 298 | ChangXiang Shen, HuangGuo Zhang, Dengguo Feng, Zhenfu Cao, Jiwu Huang. Survey of information security |
299 | -- | 306 | Qingshu Meng, Huanguo Zhang, Min Yang, Zhang-yi Wang. Analysis of affinely equivalent Boolean functions |
307 | -- | 317 | Na Li, Wen-Feng Qi. Boolean functions of an odd number of variables with maximum algebraic immunity |
318 | -- | 323 | Jian Weng, Shengli Liu, Kefei Chen. Pirate decoder for the broadcast encryption schemes from Crypto 2005 |
324 | -- | 333 | MingXin Lu, Xuejia Lai, Guozhen Xiao, Lei Qin. Symmetric-key cryptosystem with DNA technology |
334 | -- | 341 | YiWei Zhang, YuMin Wang, XuBang Shen. A chaos-based image encryption algorithm using alternate structure |
342 | -- | 350 | Jie Chen, Yupu Hu, YueYu Zhang. Impossible differential cryptanalysis of Advanced Encryption Standard |
351 | -- | 358 | Zongduo Dai, Xiutao Feng. Classification and counting on multi-continued fractions and its application to multi-sequences |
359 | -- | 372 | Guang Zeng, Kaicheng He, Wenbao Han. A trinomial type of σ-LFSR oriented toward software implementation |
373 | -- | 380 | Zhenchuan Chai, Zhenfu Cao, Xiaolei Dong. Identity-based signature scheme based on quadratic residues |
381 | -- | 398 | Dengguo Feng, Weidong Chen. Modular approach to the design and analysis of password-based security protocols |
399 | -- | 418 | Sihan Qing, ChangXiang Shen. Design of secure operating systems with high security levels |
419 | -- | 439 | Hong Zhang, Yeping He, Zhiguo Shi. A formal model for access control with supporting spatial context |
440 | -- | 455 | Fan Zhang, Jianfeng Ma, Sang-Jae Moon. Universally composable anonymous Hash certification model |
456 | -- | 469 | Wei Wang, Guosun Zeng. Trusted dynamic level scheduling based on Bayes trust model |
470 | -- | 490 | Hefei Ling, Wugang Yuan, Fuhao Zou, Zhengding Lu. Log-scaling magnitude modulated watermarking scheme |
491 | -- | 509 | Miao Yu, HongJie He, Jiashu Zhang. A digital authentication watermarking scheme for JPEG images with superior localization and security |
510 | -- | 520 | Xiangao Huang, Wei Huang, Chao Wang, ZeJun Lü, YanHua Hu. Blind reconnaissance of the pseudo-random sequence in DS/SS signal with negative SNR |