Abstract is missing.
- Research on authenticated key agreement in group settingsMing Li, Dawu Gu, Yong Wang, Yingcai Bai. 1-4 [doi]
- A study of secure multi-party elementary function computation protocolsWenjun Luo, Xiang Li. 5-12 [doi]
- Authenticated group key agreement with admission controlHailong Wen, Dawu Gu. 13-17 [doi]
- The optimized key distribution scheme in threshold RSAJingsong Cui, Rong Peng, Li-na Wang. 18-21 [doi]
- A proxy-protected signature scheme based on conicRongxing Lu, Zhenfu Cao. 22-26 [doi]
- Security analysis and improvement of some proxy signature schemesJiguo Li 0001, Yichen Zhang 0003, Yuelong Zhu. 27-32 [doi]
- Robust ID-based threshold signcryption scheme from pairingsShanshan Duan, Zhenfu Cao, Rongxing Lu. 33-37 [doi]
- Provably secure delegation-by-certification proxy signature schemesZuowen Tan, Zhuojun Liu. 38-43 [doi]
- An efficient digital signature using self-certified public keysYuan Zhou, Zhenfu Cao, Rongxing Lu. 44-47 [doi]
- Anonymous traceable disclosure scheme using pairing over elliptic curveTadahiko Ito, Takeshi Okamoto, Atsuo Inomata, Eiji Okamoto. 48-52 [doi]
- Gossip-based scalable and reliable group key distribution frameworkYan Yao, Ping Yi, Yi-ping Zhong, Shi-Yong Zhang. 53-61 [doi]
- A new content-based digital audio watermarking algorithm for copyright protectionXiang-Yang Wang, Yong-rui Cui, Hongying Yang, Hong Zhao. 62-68 [doi]
- Worm propagation modeling and analysis based on quarantineYun-Kai Zhang, Fang-Wei Wang, Yu-Qing Zhang, Jian-Feng Ma. 69-75 [doi]
- Component-based digital watermarking of Chinese textsXingming Sun, Gang Luo, Huajun Huang. 76-81 [doi]
- Communication and recovery issues in grid environmentWenjie Liu, Guochang Gu, Hongnan Wang. 82-86 [doi]
- Hybrid detector set: detectors with different affinityJian Zhang, Hua-Can He, Min Zhao. 87-91 [doi]
- Transformation-free proxy cryptosystems and their applications to electronic commerceLihua Wang 0001, Zhenfu Cao, Eiji Okamoto, Ying Miao, Takeshi Okamoto. 92-98 [doi]
- On timeliness of a fair non-repudiation protocolBotao Li, Junzhou Luo. 99-106 [doi]
- A new type of security and safety architecture for distributed system: models and implementationZhongwen Li, Zhongpan Qiu. 107-114 [doi]
- Cryptanalysis of group signature scheme from ID-based signature schemeHaiyong Bao, Zhenfu Cao, Haifeng Qian. 115-118 [doi]
- ID-based threshold decryption without random oracles and its application in key escrowZhenchuan Chai, Zhenfu Cao, Rongxing Lu. 119-124 [doi]
- Securing ad hoc networks through mobile agentPing Yi, Yan Yao, Yafei Hou, YiPing Zhong, Shiyong Zhang. 125-129 [doi]
- How to conduct a sealed bargain on the internetQianhong Wu, Bo Qin, YuMin Wang. 130-135 [doi]
- A public auction scheme based on group signatureXin Liu, Qiu-Liang Xu, Jiu-Qing Shang. 136-142 [doi]
- Cryptanalysis of publicly verifiable authenticated encryptionZuhua Shao. 143-145 [doi]
- Design and implement of firewall-log-based online attack detection systemTongshen Hu, Xiamin, Qingzhang Chen, Kezhen Ying. 146-149 [doi]
- A framework of cooperating intrusion detection based on clustering analysis and expert systemDe-gang Yang, Chun-yan Hu, Yong-hong Chen. 150-154 [doi]
- A novel distributed intrusion detection model based on mobile agentZhicai Shi, Zhenzhou Ji, Mingzeng Hu. 155-159 [doi]
- An new intrusion detection method based on linear predictionQingbo Yin, Rubo Zhang, Xueyao Li. 160-165 [doi]
- A network intrusion detection system based on the artificial neural networksJing-Xin Wang, Zhi-Ying Wang, Kui Dai. 166-170 [doi]
- An architecture of pattern-oriented distributed meta-search engineTieli Sun, Wei Zhao, Zhiyan Zhao. 171-174 [doi]
- New construction of resilient functions with satisfying multiple cryptographic criteriaYongzhuang Wei, Yu-pu Hu. 175-180 [doi]
- New method to determine algebraic expression of Rijndael S-boxJingmei Liu, Baodian Wei, Xinmei Wang. 181-185 [doi]
- A rule-based framework for role-based constrained delegationGang Yin, Huaimin Wang, Dian-xi Shi, Yan Jia 0001, Meng Teng. 186-191 [doi]
- Automatic metadata generation based on neural networkYunfeng Li, Qingsheng Zhu, Yukun Cao. 192-197 [doi]
- A real-time algorithm to detect long connection chains of interactive terminal sessionsJianhua Yang, Shou-Hsuan Stephen Huang. 198-203 [doi]
- AT-PAM: an authentication trustworthiness-based PAMLunwei Wang, Xiangke Liao, Huaimin Wang. 204-209 [doi]
- Organization structure based access control modelKe-jun Sheng, Jiqiang Liu, Xin Liu. 210-215 [doi]
- Signcryption based on elliptic curve and its multi-party schemesYiliang Han, Xiaoyuan Yang 0002, Yupu Hu. 216-217 [doi]
- Application of data mining technology and generic algorithm to intrusion detection systemHongxia Xia, Qi Shen, Luo Zhong, Shan Feng, Rui Hao. 218-219 [doi]
- An attribute-based-delegation-modelChunxiao Ye, Yunqing Fu, Zhongfu Wu. 220-221 [doi]
- High-quality pseudo-random sequence generator based on one-dimensional extended cellular automataXuelong Zhao, Jiwen Wang, Manwu Xu, Fengyu Liu. 222-223 [doi]
- Database intrusion detection based on user query frequent itemsets mining with item constraintsYong Zhong, Xiaolin Qin. 224-225 [doi]
- Hybrid BP/CNN neural network for intrusion detectionYu Yao, Fu-xiang Gao, Ge Yu. 226-228 [doi]
- An ID-based group signatureChunbo Ma, Jun Ao, Dake He. 229-230 [doi]
- An application of machine leaning to network intrusion detectionBo Li, Xiao-Ping Qiu. 231-233 [doi]
- An image watermark algorithm based on discrete cosine transform block classifyingYuehua Zhao, Guixian Cai, Yunhai Du. 234-235 [doi]
- Research on network information filtering model based on fuzzy setPeiyu Liu, Yuguo Liu. 236-237 [doi]
- Research on security of storage area networkXiao Zhang, Zhanhuai Li. 238-239 [doi]
- New multi-signature and proxy multi-signature schemes from the Weil pairingsXiaoyuan Yang, Xu an Wang, Wei Zhang. 240-241 [doi]
- A security scheme of electronic commerce for mobile agents uses undetachable digital signaturesYang Shi, Liming Cao, Xiaoping Wang. 242-243 [doi]
- Applying multiple criteria decision making to improve security architecture developmentFang Liu, Kui Dai, Zhiying Wang 0003. 244-246 [doi]
- A new watermarking scheme against inserter-based attacks suitable for digital media with moderate sizeXinpeng Zhang 0001, Shuozhong Wang. 247-248 [doi]