405 | -- | 433 | ChangXiang Shen, Huanguo Zhang, Huaimin Wang, Ji Wang, Bo Zhao, Fei Yan, Fajiang Yu, Liqiang Zhang, Mingdi Xu. Research on trusted computing and its development |
434 | -- | 453 | Huanguo Zhang, Fei Yan, Jianming Fu, Mingdi Xu, Yang Yang, Fan He, Jing Zhan. Research on theory and key technology of trusted computing platform security testing and evaluation |
454 | -- | 464 | Dengguo Feng, Yu Qin. A property-based attestation protocol for TCM |
465 | -- | 482 | Junwei Zhang, Jianfeng Ma, Sang-Jae Moon. Universally composable secure TNC model and EAP-TNC protocol in IF-T |
483 | -- | 493 | Yiming Zhang, Xicheng Lu, Dongsheng Li. Embedded DHT overlays in virtual computing environments |
494 | -- | 505 | Wei Wang, Guosun Zeng. Bayesian cognitive trust model based self-clustering algorithm for MANETs |
506 | -- | 514 | Xuejia Lai, MingXin Lu, Lei Qin, Junsong Han, Xiwen Fang. Asymmetric encryption and signature method with DNA technology |
515 | -- | 523 | Shuqin Zhong, Zhi Ma, Yajie Xu. Constructing quantum error correcting code via logic function |
524 | -- | 536 | Licheng Wang, Lihua Wang, Zhenfu Cao, Yixian Yang, Xinxin Niu. Conjugate adjoining problem in braid groups and new design of braid-based signatures |
537 | -- | 545 | Shaojing Fu, Chao Li, Longjiang Qu. On the number of rotation symmetric Boolean functions |
546 | -- | 556 | Meiqin Wang, Xiaoyun Wang, Lucas Chi Kwong Hui. Differential-algebraic cryptanalysis of reduced-round of Serpent-256 |
557 | -- | 566 | Yinxia Sun, Hui Li. Efficient signcryption between TPKC and IDPKC and its multi-receiver construction |
567 | -- | 580 | Junwei Zhang, Jianfeng Ma, Sang-Jae Moon. Universally composable one-time signature and broadcast authentication |
581 | -- | 592 | Peng Xu, Guohua Cui, Cai Fu, Xueming Tang. A more efficient accountable authority IBE scheme under the DL assumption |
593 | -- | 606 | Jian Weng, Min-Rong Chen, Yanjiang Yang, Robert H. Deng, Kefei Chen, Feng Bao. CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles |
607 | -- | 618 | Yong Wang, Jiwu Huang. Robust AVS audio watermarking |
619 | -- | 633 | Hongxia Wang, Mingquan Fan. Centroid-based semi-fragile audio watermarking in hybrid domain |
634 | -- | 647 | Xiangyang Luo, Fenlin Liu, Chunfang Yang, Daoshun Wang. Image universal steganalysis based on best wavelet packet decomposition |
648 | -- | 658 | Mingxing Luo, Yixian Yang, Licheng Wang, Xinxin Niu. Secure network coding in the presence of eavesdroppers |
659 | -- | 676 | Yu Zhang, Binxing Fang, Yongzheng Zhang 0002. Identifying heavy hitters in high-speed network monitoring |