Journal: Science in China Series F: Information Sciences

Volume 60, Issue 5

0 -- 0Yibin Dai, Shaozhen Chen. Cryptanalysis of full PRIDE block cipher
0 -- 0Di Lu, Jianfeng Ma, Cong Sun, XinDi Ma, Ning Xi. Credit-based scheme for security-aware and fairness-aware resource allocation in cloud computing
0 -- 0Yupeng Jiang, Qun-Xiong Zheng, Dongdai Lin. On s-uniform property of compressing sequences derived from primitive sequences modulo odd prime powers
0 -- 0Shuo Qiu, Jiqiang Liu, Yanfeng Shi, Rui Zhang. Hidden policy ciphertext-policy attribute-based encryption with keyword search against keyword guessing attack
0 -- 0Xiang Zhang, Yiyong Huang, Xiaoqian Chen. Analysis and design of parameters in soft docking of micro/small satellites
0 -- 0Ding Wang, Chaoxu Mu. Developing nonlinear adaptive optimal regulators through an improved neural learning mechanism
0 -- 0Zhongliang Jing, Bin Xu, Fuchun Sun, George Z. Zhu. Editorial
0 -- 0Zhongliang Jing, Lingfeng Qiao, Han Pan, Yongsheng Yang, Wujun Chen. An overview of the configuration and manipulation of soft robotics for on-orbit servicing
0 -- 0Zhejun Fang, Qixu Liu, Yuqing Zhang, Kai Wang, Zhiqiang Wang, Qianru Wu. A static technique for detecting input validation vulnerabilities in Android apps
0 -- 0Deshan Meng, Houde Liu, Yanan Li, Wenfu Xu, Bin Liang. Vibration suppression of a large flexible spacecraft for on-orbit operation
0 -- 0Fei Lyu, Feng Tian, Guozhong Dai, Hongan Wang. Tilting-Twisting-Rolling: a pen-based technique for compass geometric construction
0 -- 0Yu Ding, Tao Wei, Hui Xue, Yulong Zhang, Chao Zhang, Xinhui Han. Accurate and efficient exploit capture and classification
0 -- 0Haibo Hong, Licheng Wang, Haseeb Ahmad, Yixian Yang, Zhiguo Qu. Minimum length key in MST cryptosystems
50202 -- 0Bin Xu 0003, Yuan Yuan. Two performance enhanced control of flexible-link manipulator with system uncertainty and disturbances
52101 -- 0Huige Wang, Kefei Chen, Baodong Qin, Xuejia Lai, Yunhua Wen. A new construction on randomized message-locked encryption in the standard model via UCEs
52104 -- 0Debiao He, Ding Wang, Qi Xie, Kefei Chen. Anonymous handover authentication protocol for mobile wireless networks with conditional privacy preservation
52107 -- 0Xuexian Hu, Jiang Zhang, Zhenfeng Zhang, Jing Xu. Universally composable anonymous password authenticated key exchange
52109 -- 0Huafei Zhu. An efficient protocol for secure multicast key distribution in the presence of adaptive adversaries
52201 -- 0Yi Zeng 0001, Tielin Zhang, Bo Xu. Improving multi-layer spiking neural networks by incorporating brain-inspired rules
52501 -- 0Zhen Wang, Lixin He. Quantifying quantum information resources: a numerical study
59101 -- 0Jingyu Feng, Guangyue Lu, Yuqing Zhang, Honggang Wang. Avoiding monopolization: mutual-aid collusive attack detection in cooperative spectrum sensing
59102 -- 0Yong Li, Xiao-Feng Meng, Qiang Zhang, Jiang Zhang, Chang-Qing Wang. Common patterns of online collective attention flow