Journal: Science in China Series F: Information Sciences

Volume 53, Issue 3

405 -- 433ChangXiang Shen, Huanguo Zhang, Huaimin Wang, Ji Wang, Bo Zhao, Fei Yan, Fajiang Yu, Liqiang Zhang, Mingdi Xu. Research on trusted computing and its development
434 -- 453Huanguo Zhang, Fei Yan, Jianming Fu, Mingdi Xu, Yang Yang, Fan He, Jing Zhan. Research on theory and key technology of trusted computing platform security testing and evaluation
454 -- 464Dengguo Feng, Yu Qin. A property-based attestation protocol for TCM
465 -- 482Junwei Zhang, Jianfeng Ma, Sang-Jae Moon. Universally composable secure TNC model and EAP-TNC protocol in IF-T
483 -- 493Yiming Zhang, Xicheng Lu, Dongsheng Li. Embedded DHT overlays in virtual computing environments
494 -- 505Wei Wang, Guosun Zeng. Bayesian cognitive trust model based self-clustering algorithm for MANETs
506 -- 514Xuejia Lai, MingXin Lu, Lei Qin, Junsong Han, Xiwen Fang. Asymmetric encryption and signature method with DNA technology
515 -- 523Shuqin Zhong, Zhi Ma, Yajie Xu. Constructing quantum error correcting code via logic function
524 -- 536Licheng Wang, Lihua Wang, Zhenfu Cao, Yixian Yang, Xinxin Niu. Conjugate adjoining problem in braid groups and new design of braid-based signatures
537 -- 545Shaojing Fu, Chao Li, Longjiang Qu. On the number of rotation symmetric Boolean functions
546 -- 556Meiqin Wang, Xiaoyun Wang, Lucas Chi Kwong Hui. Differential-algebraic cryptanalysis of reduced-round of Serpent-256
557 -- 566Yinxia Sun, Hui Li. Efficient signcryption between TPKC and IDPKC and its multi-receiver construction
567 -- 580Junwei Zhang, Jianfeng Ma, Sang-Jae Moon. Universally composable one-time signature and broadcast authentication
581 -- 592Peng Xu, Guohua Cui, Cai Fu, Xueming Tang. A more efficient accountable authority IBE scheme under the DL assumption
593 -- 606Jian Weng, Min-Rong Chen, Yanjiang Yang, Robert H. Deng, Kefei Chen, Feng Bao. CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles
607 -- 618Yong Wang, Jiwu Huang. Robust AVS audio watermarking
619 -- 633Hongxia Wang, Mingquan Fan. Centroid-based semi-fragile audio watermarking in hybrid domain
634 -- 647Xiangyang Luo, Fenlin Liu, Chunfang Yang, Daoshun Wang. Image universal steganalysis based on best wavelet packet decomposition
648 -- 658Mingxing Luo, Yixian Yang, Licheng Wang, Xinxin Niu. Secure network coding in the presence of eavesdroppers
659 -- 676Yu Zhang, Binxing Fang, Yongzheng Zhang 0002. Identifying heavy hitters in high-speed network monitoring