文章来源: | 发布时间:2016-03-10 | 【字号: 小 中 大 】 |
序号 | 论文类型 | 论文名称 | 出版社名称 | 论文所在期刊的卷、期、页 | 论文收录类型 | 论文作者 |
1 | 国外重要刊物 | Selective Opening Chosen Ciphertext Security Directly from the DDH Assumption | NSS 2012 | LNCS 7645, Springer, pp. 100-112 | EI收录 | Shengli Liu, Fangguo Zhang, Kefei Chen |
2 | 国外重要刊物 | Dynamic Provable Data Possession with batch-update verifiability | 2012 IEEE International Conference on Intelligent Control, Automatic Detection and High-End Equipment (ICADE 2012) | pp. 108 - 113 | EI收录 | Junxiang Wang Shengli Liu |
3 | 国外重要刊物 | Homomorphic Linear Authentication Schemes from epsilon-ASU2 Functions for Proofs of Retrievability | Control & Cybernetics Journal | Vol. 42, No. 2, pp. 900-916 | SCI收录 | Shengli Liu, Kefei Chen |
4 | 国内重要刊物 | 基于先验结果对涂-邓猜想一些情形下的递推证明 | 武汉大学学报(理学版) | Vol.58, 2012: 493-496 | 其他收录 | 黄昆,李超,屈龙江 |
5 | 国内重要刊物 | 基于循环移位和异或运算的对合线性变换的研究 | 国防科学技术大学学报 | 34(2):34-39,2012 | EI收录 | 李瑞林,熊海,李超 |
6 | 国内重要刊物 | Piccolo算法的差分故障分析 | 计算机学报 | Vol. 35,No.9. 2012: 1918-1926 | EI收录 | 赵光耀,李瑞林,孙兵,李超 |
7 | 国外重要刊物 | A quantum protocol for millionaire problem with Bell states | Quantum Information Processing (Online) | DOI 10.1007/s11128-012-0520-6 | SCI收录 | Wei-Wei Zhang, Dan Li, Ke-Jia Zhang, Hui-Juan Zuo |
8 | 国外重要刊物 | A watermark strategy for quantum images based on quantum Fourier transform | Quantum Information Processing (Online) | DOI 10.1007/s11128-012-0423-6 | SCI收录 | Wei-Wei Zhang, Fei Gao, Bin Liu, Qiao-Yan Wen, Hui Chen |
9 | 国外重要刊物 | A Quantum Watermark Protocol. International Journal of Theoretical Physics | International Journal of Theoretical Physics | 2012. 52(2): p. 504-513 | SCI收录 | Wei-Wei Zhang, Fei Gao, Bin Liu, Qiao-Yan Wen, Hui Chen |
10 | 国外重要刊物 | Multiparty quantum key agreement with single particles | Quantum Information Processing (Online) | DOI 10.1007/s11128-012-0492-6 | SCI收录 | Bin Liu, Fei Gao, Wei Huang, Qiao-yan Wen |
11 | 国外重要刊物 | Efficient quantum private comparison employing single photons and collective detection | Quantum Information Processing | DOI 10.1007/s11128-012-0439-y | SCI收录 | Bin Liu, Fei Gao, Heng-Yue Jia, et al |
12 | 国外重要刊物 | Cryptanalysis and improvement of the quantum private comparison protocol with semi-honest third party | Quantum Information Processing (Online) | DOI 10.1007/s11128-012-0507-3 | SCI收录 | Wei-Wei Zhang · Ke-Jia Zhang |
13 | 国外重要刊物 | Eavesdropping and Improvement to Multiparty Quantum Secret Sharing with Collective Eavesdropping-Check | International Journal of Theoretical Physics | 2012. 51(4): p. 1211-1223 | SCI收录 | Bin Liu, Fei Gao, and Qiao-Yan Wen |
14 | 国外重要刊物 | Reexamining the Security of Controlled Quantum Secure Direct Communication by Using Four Particle Cluster States | International Journal of Theoretical Physics | 2012,51:2714–2718 | SCI收录 | Su-Juan Qin |
15 | 国外重要刊物 | Intel SYSRET Privilege Escalation Vulnerability Analysis | NCIS 2012, | 2012:30-37 | 其他收录 | Yong Wang, Xiuxia Tian, Jianping Xu, Shuai Chen, and Heng Yang |
16 | 国外重要刊物 | Stuxnet Vulnerabilities Analysis of SCADA Systems | NCIS 2012, | 2012:640-646 | 其他收录 | Wang Yong,Tian Xiuxia,Xu Jianping,Chen Shuai,Yang Heng |
17 | 国外重要刊物 | New channel selection rule for JPEG steganography | IEEE Transactions on Information Forensics and Security | 2012,7(4):1181-1191 | SCI收录 | Fangjun Huang,Jiwu Huang,Yun-Qing Shi |
18 | 国外重要刊物 | Provably Secure and Efficient Certificateless Authenticated Tripartite Key Agreement Protocol | Mathematical and Computer Modelling, Elsevier Press, | 55(3-4): 1213-1221, 2012 | SCI收录 | Hu Xiong, Zhong Chen, Fagen Li |
19 | 国外重要刊物 | New Identity-based Three-party authenticated key agreement protocol with Provable Security, Journal of Network and Computer Applications | Elsevier Press, in press | http://dx.doi.org/10.1016/j.jnca.2012.10.001 | SCI收录 | Hu Xiong, Zhiguang Qin, Fagen Li |
20 | 国外重要刊物 | Security Flaw of an improved user authentication scheme with user anonymity for wireless communications | IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, | Vol. E95-A, No. 1, pp. 256-258, 2012 | SCI收录 | Hu Xiong, Xiaofeng Wang, Fagen Li |
21 | 国外重要刊物 | Efficient communication scheme with confidentiality and privacy for vehicular networks | Computers and Electrical Engineering,Elsevier Press | http://dx.doi.org/10.1016/j.compeleceng.2012.11.009 | SCI收录 | Hu Xiong, Guobin Zhu, Zhong Chen, Fagen Li |
22 | 国外重要刊物 | Efficient and Multi-level Privacy-Preserving Communication Protocol for VANET | Computers and Electrical Engineering,Elsevier Press | 38(3): 573-581, 2012 | SCI收录 | Hu Xiong, Zhong Chen, Fagen Li |
23 | 国外重要刊物 | Bidder-anonymous English auction protocol based on revocable ring signature | Expert Systems With Applications | 39(8): 7062-7066, 2012 | SCI收录 | Hu Xiong, Zhong Chen, Fagen Li, |
24 | 国内重要刊物 | Rijndael-256算法的中间相遇攻击 | 计算机工程 | 2012,38(7):107-109 | 其他收录 | 韦永壮,苏崇茂,马春波 |
25 | 国内重要刊物 | 一种布尔多项式的高效计算机表示 | 计算机研究与发展 | 2012,49(12):2568-2574 | EI收录 | 李昕,林东岱,徐林 |
26 | 国内重要刊物 | Fast tate pairing computation on twisted jacobi intersections curves | Inscrypt 2011, | 2012 LNCS 7537:210-226 | EI收录 | Zhang Xusheng,Chen Shan,Lin Dongdai |
27 | 国外重要刊物 | On enumeration of polynomial equivalence classes and their application to MPKC | Finite Fields and their Applications | 2012.3,2(18):283-302 | SCI收录 | Lin Dongdai,Faugère, Jean-Charles, Perret, Ludovic; Wang, Tianze |
28 | 国外重要刊物 | Ergodic theory over F2 [T] | Finite Fields and their Applications | 2012.5,Vol 18,Issue 3:473-491 | SCI收录 | Lin Dongdai,Shi Tao,Yang,Zifeng |
29 | 国内重要刊物 | Improving the lower bound on linear complexity of the sequences generated by nonlinear filtering | Chinese Journal of Electronics | 2012.7,Vol 21,Issue 3:519-522 | EI收录 | Zhang Yin,Lin Dongdai,Liu Meicheng |
30 | 国外重要刊物 | Analysis of Optimum Pairing Products at High Security Levels | INDOCRYPT 2012 | Volume 7668, 2012, pp 412-430 | EI收录 | xusheng,Dongdai Lin |
31 | 国外重要刊物 | Stronger Security Model for Public Key Encryption with Equality Test | Pairing 2012 (Lecture Notes in Computer Science) | vol. 7708, 65-82 | 其他收录 | 卢尧,张锐,林东岱 |
32 | 国外重要刊物 | Perfect Algebraic Immune Functions | ASIACRYPT 2012 | LNCS(7658) 172-189 | EI收录 | Meicheng Liu, Yin Zhang, and Dongdai Lin |
33 | 国外重要刊物 | Linear Weaknesses in T-functions | SETA 2012 | SETA 2012: 279-290 | EI收录 | Tao Shi, Vladimir Anashin, and Dongdai Lin |
34 | 国外重要刊物 | Anonymous Identity-Based Hash Proof System and Its Applications | ProvSec 2012 | ProvSec 2012: 143-160 | EI收录 | Yu Chen, Zongyang Zhang, Dongdai Lin, and Zhenfu Cao |
35 | 国外重要刊物 | Applying Time-Memory-Data Trade-Off to Plaintext Recovery Attack | ICICS 2012 | ICICS 2012: 321-330 | EI收录 | Zhenqi Li1, Bin Zhang2, Yao Lu2, Jing Zou2, and Dongdai Lin2 |
36 | 国外重要刊物 | Identity-Based Extractable Hash Proofs and Their Applications. | ACNS 2012 | ACNS 2012: 153-170 | EI收录 | Yu Chen1, Zongyang Zhang2, Dongdai Lin1, and Zhenfu Cao2, |
37 | 国内重要刊物 | 抗几何失真的视频哈希算法研究 | 中国科学 | 2012,42(5):578-587 | SCI收录 | 项世军, 杨建权, 黄继武 |
38 | 国内重要刊物 | 一个基于稳固加密RFID协议的安全性分析 | 计算机研究与发展 | 2012,19(5):958-961 | EI收录 | 韦永壮,欧阳宁,马春波 |
39 | 国外重要刊物 | Meet-in-the-Middle Attack onReduced Versions of the Camellia Block Cipher | IWSEC 2012,Springer-Verlag Berlin Heidelberg | LNCS 7631, pp.197-215, | EI收录 | Jiqiang Lu,Yongzhuang Wei,Enes Pasalic ,Pierre-Alain Fouque |
40 | 国内重要刊物 | 10轮3D分组密码算法的中间相遇攻击 | 电子与信息学报 | 2012,34(3):694-697 | EI收录 | 苏崇茂,韦永壮,马春波 |
41 | 国外重要刊物 | Comments on a Buyer-Seller Watermarking Protocol for Large Scale Networks | Internationa Journal of Network Securty | 2012.1,14(1):53-58 | SCI收录 | Shuhua Wu,Qiong Pu |
42 | 国外重要刊物 | Cryptanalysis and enhancements of delegation-based authentication protocol for secure roaming service | Int.J.Electronic Security and Digital Forensics | 2012,4(4):25-260 | EI收录 | Wang Y.,Pu Q. Wu S. |
43 | 国外重要刊物 | Secure and Efficient SIP Authentication Scheme for Converged VoIP Networks | The International Arab Journal of Information Technology | 2012,9(6):553-561 | SCI收录 | Qiong Pu,Shuhua Wu |
44 | 国外重要刊物 | Secure verifier-based three-party password-authenticaticated key exchange | Peer-to-Peer Networking and Applications,2012 | DOI:10.1007/s12083-012-0125-y | SCI收录 | Qiong Pu,Jian Wang,Shuhua Wu,Ji Fu |
45 | 国外重要刊物 | Secure SIP Authentication Scheme Supporting Lawful Interception | Security Comm.Networks,2012 | DOI:10.1002/sec.568 | SCI收录 | Qiong Pu,Jian Wang,Shuhua Wu |
46 | 国外重要刊物 | Practical authentication scheme for SIP | Peer-to-Peer Networking and Applications,2012 | DOI:10.1007/s12083-012-0129-7 | SCI收录 | Shuhua Wu,Fei KangQiong Pu |
47 | 国外重要刊物 | Practical Remote Mutual Authentication with Key Agreement Scheme for Mobile Devices on Elliptic Curve Cryptosystem | JIT Journal of Internet Technology, | 2012,13(3):411-418 | SCI收录 | Shuhua Wu,Fei Kang,Qiong Pu |
48 | 国外重要刊物 | On the security of anonymous roaming protocol in UMTS mobile networks | Maejo International Journal of Science and Technology | 2012,6:62-69 | SCI收录 | Shuhua Wu,Qiong Pu,Ji Fu |
49 | 国外重要刊物 | Cryptanalysis of a communication-efficient three-party password authenticated key exchange protocol | Information Sciences | 2012,215:83-96 | SCI收录 | Shuhua Wu,Qiong Pu,Shengbao Wang,Debiao He |
50 | 国外重要刊物 | Strong authentication scheme for telecare medicine information systems | Journal of Medical Systems | 2012,36(4):2609-2619 | SCI收录 | Qiong Pu,Jian Wang,Rongyong Zhao |
51 | 国外重要刊物 | A Secure Lightweight RFID Binding Proof Protocol for Medication Errors and Patient Safety | Journal of Medical Systems | 2012,36(5):2743-2749 | SCI收录 | Shuhua Wu ,Kefei Chen, Yuefei Zhu |
52 | 国外重要刊物 | Cryptanalysis and Enhancements of Efficient Three-party Password-based Key Exchange Scheme | International Journal of Communication Systems | DOI: 10.1002/dac.1362 | SCI收录 | Shuhua Wu,Kefei Chen,Qiong Pu,Yuefei Zhu |
53 | 国内重要刊物 | 对MIBS算法的Integral攻击 | 小型微型计算机系统 | Vol.33,NO.4:768-773,2012 | 其他收录 | 王高丽,王少辉 |
54 | 国外重要刊物 | Boomerang and Slide-Rotational Analysis of the SM3 Hash Function | SAC 2012 | 2012 LNCS 7707:305-321 | EI收录 | Aleksandar Kircanski,Yanzhao Shen,王高丽,Amr M.Youssef |
55 | 国内重要刊物 | 一种基于云-端计算模型的恶意代码联合防御网络 | 计算机应用研究 | 2012, 29(6):2214-2217 | 其他收录 | 徐小龙, 吴家兴, 杨庚 |
56 | 国内重要刊物 | 基于大规模廉价计算平台的海量数据处理系统的研究 | 计算机应用研究 | 2012, 29(2):582-585 | 其他收录 | 徐小龙, 吴家兴, 杨庚, 程春玲, 王汝传 |
57 | 国内重要刊物 | 开放云端计算环境中的任务执行代码安全机制 | 计算机科学 | 2012, 39(7):7-10 | 其他收录 | 徐小龙, 耿卫建, 杨庚, 王汝传 |
58 | 国内重要刊物 | 面向绿色云计算数据中心的动态数据聚集算法. | 系统工程与电子技术 | 2012, 34(9): 1923-1929 | EI收录 | 徐小龙, 杨庚, 李玲娟, 王汝传 |
59 | 国外重要刊物 | 大规模网络中基于HDHT的病毒疫苗分发算法 | 系统工程与电子技术 | 2012, 34(8): 1708-1715 | EI收录 | 徐小龙, 熊婧夷, 杨庚, 王汝传 |
60 | 国外重要刊物 | P2P Botnet Detection Using Min-Vertex Cover | Journal of Networks | 2012, 7(8): 1176-1181 | EI收录 | XU Lei, XU Xiaolong, ZHOU Yue Zhuo. |
61 | 国外重要刊物 | Algebraic Techniques in Linear Cryptanalysis | 2012 International Conference on Computer Science and Communication Technology | 2012.12 | EI收录 | Hongru Wei,Yafei Zheng. |
62 | 国外重要刊物 | LS-SVM based Image Segmentation Using Color and Texture Information. | Journal of Visual Communication and Image Representation | 2012, 23(7): 1095-1112. | SCI收录 | Hong-Ying Yang, Xiang-Yang Wang |
63 | 国外重要刊物 | A new SVM-based image watermarking using Gaussian-Hermite Moments. | Applied Soft Computing | 2012, 12(2): 887-903. | SCI收录 | Xiang-Yang Wang, E-No Miao, Hong-Ying Yang. |
64 | 国外重要刊物 | Affine invariant image watermarking using intensity probability density-based Harris Laplace detector | Journal of Visual Communication and Image Representation | 2012, 23(6): 892-907 | SCI收录 | WANG Xiang-yang, NIU Pan-pan, YANG Hong-ying, CHEN Li-li. |
65 | 国外重要刊物 | A pixel-based color image segmentation using support vector machine and fuzzy c-means | Neural Networks, | 2012, 33: 148-159. | SCI收录 | Xiang-Yang Wang, Xian-Jin Zhang, |
66 | 国外重要刊物 | Cryptanalysis of an inter-bank E-payment protocol based on quantum proxy blind signature | Quantum Inf Process | DOI 10.1007/s11128-012-0477-5 | SCI收录 | Xiao-Qiu Cai, Chun-Yan Wei |
67 | 国外重要刊物 | Partially blind signatures based on quantum crypto -graphy. | International Journal of Modern Physics B | 2012, 26(30): 1250163. | SCI收录 | Xiao-Qiu Cai, Hui-Fang Niu |
68 | 国外重要刊物 | Robust message authentication schemes over a collective -noise channel | International Journal of Quantum Information | 2012, 10(6): 1250064. | SCI收录 | Xiao-Qiu Cai, Qing-Qing Liu |
69 | 国外重要刊物 | An efficient quantum secret sharing scheme with decoy state | International Journal of Modern Physics B | 2012, 26(20): 1250122. | SCI收录 | Tian-Yin Wang, Xiao-Qiu Cai |
70 | 国外重要刊物 | Cryptanalysis of dynamic quantum secret sharing | Quantum Information Processing | doi:10.1007/s11128-012-0508-2 | SCI收录 | Tian-Yin Wang, Yan-Ping Li |
71 | 国外重要刊物 | One-time proxy signature based on quantum cryptography. | Quantum Information Processing | 2012, 11(2): 455-463 | SCI收录 | Tian-Yin Wang, Zong-Li Wei |
72 | 国内重要刊物 | 基于标量衍射理论的图像解密三维信息构造方法 | 中国科学院研究生院学报 | 2012, (6): 757-766. | EI收录 | 傅长明,杨玉花,李拓, 陈岳东, 程栋, 王雅丽, 史祎诗 |
73 | 国外重要刊物 | Improved Edit Distance Method for System Call Anomaly Detection | IEEE 12th International Conference on Computer and Information Technology | pp: 1097 – 1102 | EI收录 | Qian Quan, Wu Jinlin, Zhu Wei, Xin Mingjun |
74 | 国内重要刊物 | 结构化对等网络中P2P僵尸网络传播模型 | 软件学报 | 2012,23(12):3161-3174. | EI收录 | 钱权,萧超杰,张瑞 |
75 | 国内重要刊物 | 基于TCM的全盘加密系统的研究与实现 | 计算机工程与设计 | 2012年 第9期,3291-3296 | 其他收录 | 周山东,宋新芳,金波,刘凯 |
76 | 国外重要刊物 | Research on User Permission Isolation for Multiusers Service-Oriented Program. | Int. J. Communications, Network and System Sciences. | 2012,5,Vol.5 No.2, pp.105-110 | 其他收录 | Li Yu, Wei Jiang |
77 | 国内重要刊物 | A Threshold Ring Signature Scheme Based on TPM | China Communications | 2012, 卷: 9 期: 1 页: 80-85 | SCI收录 | Gong Bei, Wei Jiang+, et.al |
78 | 国外重要刊物 | Survey of network and computer attack taxonomy | 2012 IEEE Symposium on Robotics and Applications | 2012,6,294-297 | EI收录 | Wei, Jiang |
79 | 国外重要刊物 | Cryptanalysis of a three-party password-based key exchange protocol using weil pairing | International Journal of Electronic Security and Digital Forensics | 4(4), pp. 244-251, 2012 | EI收录 | Debiao He, Jianhua Chen |
80 | 国外重要刊物 | Cryptanalysis and improvement of an extended chaotic maps-based key agreement protocol | Nonlinear Dynamics | 69(3), pp. 1149–1157, 2012. | SCI收录 | Debiao He, Yitao Chen, Jianhua Chen |
81 | 国内重要刊物 | 对广义自缩生成器的区分攻击 | 西安电子科技大学学报(自然科学版) | 2012,39(4):114-119. | EI收录 | 李雪莲 ,高军涛 ,胡予濮 ,张凤荣 |
82 | 国内重要刊物 | 两类最优跳频序列集的线性复杂度分析 | 通信学报 | 2012,(2):175-181 | EI收录 | 高军涛,胡予濮,李雪莲,向上荣 |
83 | 国外重要刊物 | Linear spans of optimal sets of frequency hopping sequences | Theoretical Informatics and Applications | 2012, 46(3): 343-354. | SCI收录 | Juntao Gao, Yupu Hu and Xuelian Li |
84 | 国内重要刊物 | Constructing quasi-random subsets of ZN by using elliptic curves. | Applied Mathematics-A Journal of Chinese Universities(Ser. B) | 2012, 27(1): 105-113. | SCI收录 | Zhixiong Chen,Xiaoni Du. |
85 | 国外重要刊物 | Binary Threshold Sequences Derived from Carmichael Quotients with Even Numbers Modulus. | IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences | 2012, E95-A(7): 1197-1199. | SCI收录 | Chenhuang Wu, Zhixiong Chen and Xiaoni Du. |
86 | 国外重要刊物 | Linear complexity of pseudorandom sequences generated by Fermat quotients and their generalizations | Information Processing Letters | 2012, 112 (6): 233-237. | SCI收录 | Xiaoni Du, Andrew Klapper and Zhixiong Chen |
87 | 国外重要刊物 | Additive character sums of polynomial quotients | Tenth Int’l Conf. on Theory and Applications of Finite Fields-Fq10,Contemp. Math | vol. 579, Amer. Math. Soc., pp.69-74, 2012. | 其他收录 | Zhixiong Chen, Arne Winterhof |
88 | 国外重要刊物 | Linear complexity of binary sequences derived from polynomial quotients | 7th Int’l Conf. on SEquences and Their Applications-SETA 2012, | LNCS, vol.7280, pp.181-189, Springer, Heidelberg (2012) | EI收录 | Zhixiong Chen,,Domingo Gomez-Perez |
89 | 国外重要刊物 | On the distribution of pseudorandom numbers and vectors derived from Euler-Fermat quotients | International Journal of Number Theory | 2012, 8(3): 631-641. | SCI收录 | Zhixiong Chen, Arne Winterhof |
90 | 国外重要刊物 | Linear complexity of some binary sequences derived from Fermat quotients. | China Communications | 2012, 9(2): 105-108. | SCI收录 | Chen Zhixiong, Hu Lei, Du Xiaoni |
91 | 国外重要刊物 | An Improved Chaotic Cryptosystem Based on Circular Bit Shift and XOR Operations. | Physics Letters A | 376 1003-1010 (2012). | SCI收录 | S. J. Xu, X. B. Chen, R. Zhang, Y. X. Yang, and Y. C. Guo |
92 | 国外重要刊物 | Efficient entanglement channel construction schemes for a theoretical quantum network model with d-level system. | Quantum Information Processing | 51 (3): 912-924 (2012). | SCI收录 | M. M. Wang, X. B. Chen, S. S. Luo, and Y. X. Yang. |
93 | 国外重要刊物 | Schemes for Remotely Preparing a Six-Particle Entangled Cluster-Type State | International Journal of Theoretical Physics | DOI: 10.1007/s10773-012-1409-y (2012). | SCI收录 | S. Y. Ma, P. Tang, X. B. Chen, and Y. X. |
94 | 国外重要刊物 | Controlled-Joint Remote Preparation of an Arbitrary Two-Qubit State via Non-maximally Entangled Channel. | International Journal of Theoretical Physics | 51 (11): 3575-3586 (2012). | SCI收录 | X. W. Guan, X. B. Chen, and Y. X. Yang. |
95 | 国外重要刊物 | Experimental architecture of joint remote state preparation. | Quantum Information Processing | 11 (3): 751-767 (2012) | SCI收录 | M. X. Luo, X. B. Chen, Y. X. Yang, and X. X. |
96 | 国外重要刊物 | N-to-M joint remote state preparation of 2-level state. | International Journal of Quantum Information | 10 (1): 1250006 (2012). | SCI收录 | Y. Su, X. B. Chen, and Y. X. Yang |
97 | 国外重要刊物 | Controlled remote state preparation of arbitrary two and three qubit states via the Brown state | Quantum Information Processing | 11 (6): 1653-1667 (2012). | SCI收录 | X. B. Chen, S. Y. Ma, Y. Su, R. Zhang, and Y. X. Yang |
98 | 国外重要刊物 | Re-examining the security of blind quantum signature protocols | Physica Scripta | 86 (5): 055006 (2012). | SCI收录 | M. M. Wang, X. B. Chen, X. X. Niu, and Y. X. Yang |
99 | 国外重要刊物 | Quantum Signature Scheme with Weak Arbitrator | International Journal of Theoretical Physics | 51 (7): 2135-2142 (2012). | SCI收录 | M. X. Luo, X. B. Chen, D. Yun, and Y. X. Yang. |
100 | 国外重要刊物 | Efficient and feasible quantum private comparison of equality against the collective amplitude damping noise | Quantum Information Processing | DOI: 10.1007/s11128-012-0505-5 (2012). | SCI收录 | X. B. Chen, Y. Su, X. X. Niu, and Y. X. Yang |
101 | 国内重要刊物 | An efficient protocol for the quantum private comparison of equality with a four-qubit cluster state | International Journal of Quantum Information | 10 (4): 1250045 (2012) | SCI收录 | G. A. Xu, X. B. Chen, Z. H. Wei, and Y. X. Yang |
102 | 国内重要刊物 | Attack on the Enhanced Multiparty Quantum Secret Sharing | Communications in Theoretical Physics | 58 51-54 (2012) | SCI收录 | 杨帅,陈秀波,杨义先 |
103 | 国外重要刊物 | Cryptanalysis on the improved multiparty quantum secret sharing protocol based on the GHZ state | Physica Scripta | 86 (5): 055002 (2012) | SCI收录 | X. B. Chen, S. Yang, Y. Su, and Y. X. Yang |
104 | 国内重要刊物 | 标准模型下固定长度的基于身份环签名方案 | 计算机学报 | 2012,35(9):1874-1880 | EI收录 | 葛爱军, 马传贵, 张振峰, 陈少真 |
105 | 国内重要刊物 | 隐藏访问结构的基于属性加密方案 | 电子与信息学报 | 2012,34(2):457-461 | EI收录 | 王海斌,陈少真 |
106 | 国内重要刊物 | New application methods for word-oriented cryptographic primitives | SCIENCE CHINA Information Sciences | Vol 55, No 9, 2149-2160, 2012 | SCI收录 | YANG Yang, ZENG Guang, JIN ChengHui,QU YunYing |
107 | 国外重要刊物 | Calculation Components Analysis of the Lattice Sieve | GSAM2012 | 298-302, 2012 | EI收录 | Yang Yang, Guang Zeng, Zheng Wang, Wenbao Han |
108 | 国内重要刊物 | Carlitz定理的一个注记 | 国防科技大学学报 | 2012,02期: 39-41 | 其他收录 | 曹喜望 |
109 | 国外重要刊物 | A method of evaluation of exponential sum of binary quadratic functions, | Finite Fields and Their Applications | 2012,18(6), pp 1089-1103 | SCI收录 | Xiyong Zhang, Xiwang Cao, Rongquan Feng |
110 | 国外重要刊物 | On the existence of some specific elements in finite fields of characteristic 2 | Finite Fields and Their Applications, | 2012,18(4):800-813 | SCI收录 | Peipei Wang, Xiwang Cao, Rongquan Feng |
111 | 国内重要刊物 | 基于口令与智能卡的可证安全认证密钥协商协议 | 江苏科技大学学报 | 2012.6,26(3):282-287 | 其他收录 | 杨珺涵 曹天杰 |
112 | 国内重要刊物 | 新的基于双难题的带有信息恢复的签名方案 | 微电子学与计算机 | 2012.9,29(9):175-178 | 其他收录 | 梁钰敏 曹天杰 |
113 | 国外重要刊物 | Analysis on the weighting factor of wavelet-based watermarking scheme | Journal of Computational Information Systems | 201219(9):4285-4292 | EI收录 | Liu, Lili; Cao, Tianjie; Lu, Yulong; Zhang, Hongtai |
114 | 国外重要刊物 | Provably Secure Three-party Password Authenticated Key Exchange Protocol in the Standard Model | Journal of Systems and Software | 2012.2, 2(85): 340-350 | EI收录 | Junhan YANG, Tianjie CAO |
115 | 国外重要刊物 | On the construction of Cryptographically Significant Boolean Functions Using Objects in Projective Geometry Spaces | IEEE Transactions on INFORMATION THEORY | LNCS 7232、34-45 | SCI收录 | Enes Pasalic,韦永壮 |
116 | 国外重要刊物 | Collision Attack for the Hash Function Extended MD4 | ICICS2012 | 15-19 | EI收录 | Gaoli Wang(王高丽) |
117 | 国内重要刊物 | 一类本原s-LFSR序列的构造与计数 | 软件学报 | 55、9、1618-1629 | EI收录 | 谭刚敏, 曾光, 韩文报, 刘向辉 |
118 | 国内重要刊物 | NP 问题的最优轮复杂性知识的零知识证明 | 中国科学 信息科学 | 42、1、 20-31 | 其他收录 | 李红达, 冯登国, 李宝, 徐海霞 |
119 | 国内重要刊物 | 一类Bent函数的二阶非线性度下线 | 计算机学报 | 35、8、1588-1593 | EI收录 | 李春雷,张焕国,曾祥勇,胡磊 |
120 | 国外重要刊物 | Offline RFID Grouping Proofs with Trusted Timestamps | 11th IEEE International Conference on Trust, Security, and Privacy in Computing and Communications (TrustCom) | 674-681 | EI收录 | 马存庆,林璟锵,王跃武,尚铭 |
121 | 国外重要刊物 | Efficient Missing Tag Detection in a Large RFID System | 11th IEEE International Conference on Trust, Security, and Privacy in Computing and Communications (TrustCom) | 185-192 | EI收录 | 马存庆,林璟锵,王跃武 |
122 | 国外重要刊物 | Improving Virtualization Security by Splitting Hypervisor into Smaller Components | DBSec 2012 | LNCS 7371、298-313 | EI收录 | Wuqiong Pan(潘无穷), Yulong Zhang, Meng Yu, Jiwu Jing(荆继武) |
123 | 国内重要刊物 | PKI应用系统互操作性检测工具的设计与实现 | 中国科学院研究生院学报 | 29、6、799-804 | 其他收录 | 蔡权伟,林璟锵,荆继武,尚铭 |
124 | 国外重要刊物 | Privacy Preserving Social Network Publication on Bipartite Graphs | WISTP 2012 | LNCS 7322、58-70 | EI收录 | Jian Zhou(周健), Jiwu Jing, Ji Xiang and Lei Wang |
125 | 国外重要刊物 | A Scalable Anonymity Scheme Based on DHT Distributed Inquiry | TrustCom 2012 | 1358-1363 | EI收录 | Wentao Wang(王文韬), Yuewu Wang(王跃武), Jiwu Jing(荆继武), Zhongwen Zhang(张中文) |
126 | 国内重要刊物 | TSS-BQS系统的Graceful Degradation机制 | 计算机学报 | 35、9、1793-1803 | EI收录 | 王文韬,林璟锵,荆继武,罗勃 |
127 | 国外重要刊物 | RIKE: Using Revocable Identities to Support Key Escrow in PKIs | ACNS 2012 | LNCS 7341、48-65 | EI收录 | 张楠,林璟锵,荆继武,高能 |
128 | 国外重要刊物 | GRADE: Graceful Degradation in Byzantine Quorum Systems | 31st IEEE International Symposium on Reliable Distributed Systems (SRDS) | 171-180 | EI收录 | 林璟锵,罗勃,荆继武,张晓坤 |
129 | 国外重要刊物 | Using Signaling Games to Model the Multi-step Attack-defense Scenarios on Confidentiality | GameSec 2012 | LNCS 7638 118-137 | EI收录 | 林璟锵,刘鹏,荆继武 |
130 | 国外重要刊物 | Evaluating Intrusion-Tolerant Certification Authority Systems | Quality and Reliability Engineering International, Wiley | 28、8、825–841 | SCI收录 | Jingqiang Lin(林璟锵), Jiwu Jing(荆继武), Peng Liu |
131 | 国外重要刊物 | A matrix construction of Boolean functions with maximum algebraic immunity | Journal of Systems Science and Complexity | 25、4、792-801 | SCI收录 | Yonghong Xie(解永宏), Lei Hu(胡磊) |
132 | 国内重要刊物 | 网际空间认证框架及相关量子技术 | 网络新媒体技术 | 1、6、39-44 | 其他收录 | 孙锐,吴辰苗,杨理 |
133 | 国内重要刊物 | 基于一次一密的量子身份识别方案 | 中国科学院研究生院学报 | 29、2、277-280 | 其他收录 | 潘江游,杨理 |
134 | 国外重要刊物 | Quantum election based on distributed scheme | Photonics Asia 2012 | 8554--3 | EI收录 | Rui-Rui Zhou(周瑞瑞) and Li Yang(杨理) |
135 | 国外重要刊物 | Indistinguishability and semantic security for quantum encryption scheme | Photonics Asia 2012 | 8554-15 | EI收录 | Chong Xiang(向忡), Li Yang(杨理) |
136 | 国外重要刊物 | Quantum unicity distance | Photonics Europe 2012 | 8440-T | EI收录 | Chong Xiang(向忡), Li Yang(杨理) |
137 | 国外重要刊物 | Quantum-message-oriented public-key encryption scheme beyond computational hypothesis | Photonics Europe 2012 | 8440-L | EI收录 | Min Liang(梁敏), Li Yang(杨理) |
138 | 国外重要刊物 | Quantum public-key encryption protocols with information-theoretic security | Photonics Europe 2012 | 8440-E | EI收录 | Li Yang(杨理), Biyao Yang(杨碧瑶), and Jiangyou Pan(潘江游) |
139 | 国内重要刊物 | 概率积分密码分析 | 计算机学报 | 35、9、1897-1905 | EI收录 | 李晓千(1),吴文玲(2),李宝(3),于晓丽(4) |
140 | 国内重要刊物 | 构造从字符串到C34曲线的散列函数 | 计算机学报 | 35、9、1868-1873 | EI收录 | 于伟,王鲲鹏,李宝,田松 |
141 | 国内重要刊物 | 随机谕言模型 | 软件学报 | 23、1、140-151 | EI收录 | 贾小英(1),李宝(2),刘亚敏(3,通讯作者) |
142 | 国内重要刊物 | Non-Malleable Instance-Dependent Commitment in the Standard Model | ACISP 2012 | LNCS 7372、450-457 | EI收录 | Wenpan Jing(景文盼), Haixia Xu(徐海霞), Bao Li(李宝) |
143 | 国外重要刊物 | A Leakage-Resilient Zero Knowledge Proof for Lattice Problem | CSS2012 | LNCS 7672、265-278 | EI收录 | Liu Yang(刘洋), Li Hongda(李红达), Niu Qihua(牛其华) |
144 | 国外重要刊物 | A note on constant-round concurrent zero-knowledge arguments of knowledge for NP | NSS2012 | LNCS 7646、202-216 | EI收录 | Li Hongda(李红达), Liu Yang(刘洋), Niu Qihua(牛其华) |
145 | 国外重要刊物 | Round-Optimal Zero-Knowledge Proofs of Knowledge for NP | Science China Information Sciences, | 2012, 55(11):2473-2484 | SCI收录 | Li Hongda(李红达), Feng Dengguo(冯登国), Li Bao(李宝), Xu Haixia(徐海霞) |
146 | 国外重要刊物 | Efficient bidirectional proxy re-encryption with direct chosen-ciphertext Security | Computers and Mathematics with Applications | 63、1、 151-157 | EI收录 | Lifeng Guo(郭立峰), Lei Hu(胡磊) |
147 | 国外重要刊物 | Linear complexity of binary sequences derived from Euler quotients with prime-power modulus | Information Processing Letters | 112、604-609 | SCI收录 | Xiaoni Du, Zhixiong Chen, Lei Hu(胡磊) |
148 | 国外重要刊物 | A Triple-Error-Correcting Cyclic Code from the Gold and Kasami-Welch APN Power Functions | Finite Fields and Their Applications | 18、1、70-92 | SCI收录 | Xiangyong Zeng(曾祥勇), Jinyong Shan, and Lei Hu(胡磊) |
149 | 国外重要刊物 | On the reducibility of some composite polynomials over finite fields | Codes and Cryptography (DCC) | 66、3、229-239 | SCI收录 | Xiwang Cao(曹喜旺), Lei Hu(胡磊) |
150 | 国外重要刊物 | Two Classes of Permutation Polynomials over Finite Fields | Finite Fields and Their Applications | 18、4、781-790 | SCI收录 | Zhengbang Zha(查振邦), Lei Hu(胡磊) |
151 | 国外重要刊物 | Implicit Polynomial Recovery and Cryptanalysis of A Combinatorial Key Cryptosystem | ICICS2012 | LNCS7618、 45-57 | EI收录 | Jun Xu(许军), Lei Hu(胡磊), Siwei Sun(孙思维) |
152 | 国外重要刊物 | Detecting node replication attacks in mobile sensor networks: Theory and approaches | Security and Communication Networks | 5、5、496--507 | SCI收录 | W. T. Zhu(朱文涛), J. Zhou, R. H. Deng, and F. Bao |
153 | 国外重要刊物 | Detecting node replication attacks in wireless sensor networks: A survey | Journal of Network and Computer Applications, Elsevier | 35、3、1022--1034 | SCI收录 | W. T. Zhu(朱文涛), J. Zhou, R. H. Deng, and F. Bao |
154 | 国外重要刊物 | Protecting user anonymity in location-based services with fragmented cloaking region | proc. 2nd International Conference on Computer Science and Automation Engineering (CSAE’12) | 227--231 | EI收录 | T. C. Li(李泰成)and W. T. Zhu(朱文涛) |
155 | 国外重要刊物 | Mitigating DoS attacks against signature-based authentication in VANETs | proc. 2nd International Conference on Computer Science and Automation Engineering (CSAE’12) | 261--265 | EI收录 | L. He(何丽) and W. T. Zhu(朱文涛) |
156 | 国外重要刊物 | A comment on `MABS: Multicast authentication based on batch signature’ | IEEE Transactions on Mobile Computing | 11、11、1775--1776 | SCI收录 | W. T. Zhu(朱文涛) |
157 | 国外重要刊物 | F5P5: Keyword search over encrypted data with five functions and five privacy assurances | ICICS 2012 | LNCS 7618、416--426 | EI收录 | H. Shuai(帅慧敏) and W. T. Zhu(朱文涛) |
158 | 国外重要刊物 | Masque: Access control for interactive sharing of encrypted data in social networks | NSS 2012 | LNCS 7645、503--515 | EI收录 | H. Shuai(帅慧敏) and W. T. Zhu(朱文涛) |
159 | 国内重要刊物 | 一个可追踪身份的基于属性签名方案 | 软件学报 | 23、9、2449-2464 | EI收录 | 张秋璞 徐震 叶顶锋 |
160 | 国外重要刊物 | Cryptanalysis of a Lattice-Knapsack Mixed Public Key Cryptosystem |
CANS 2012 | LNCS 7712、32–42 | EI收录 | Jun Xu(许军), Lei Hu(胡磊), Siwei Sun(孙思维), Ping Wang(王平) |
161 | 国外重要刊物 | Active Attacking Multicast Key Management Protocol Using Alloy | ABZ2012 | LNCS7316、164-177 | EI收录 | Ting Wang(王婷), Dongyao Ji(姬东耀) |
162 | 国内重要刊物 | BLAKE算法的硬件实现研究 | 计算机学报 | 35、4、703-711 | EI收录 | 刘宗斌 荆继武 夏鲁宁 |
163 | 国外重要刊物 | MeadDroid: Detecting Monetary Theft Attacks in Android by DVM Monitoring | ICISC 2012 | LNCS | EI收录 | Lingguang Lei(雷灵光), Yuewu Wang(王跃武), Jiwu Jing(荆继武), Zhongwen Zhang(张中文), Xingjie Yu |
164 | 国内重要刊物 | Unified and complete point addition formula for ellipic curves | Chinese Journal of electronics | 21、2、345-349 | EI收录 | 张李军,王鲲鹏,汪宏 |
165 | 国外重要刊物 | Hardware Performance Optimization and Evaluation of SM3 Hash Algorithm on FPGA | ICICS 2012 | LNCS 7618、105-118 | EI收录 | Wei Li(李伟), Ke-Wei Lv(吕克伟), Gang Yao(姚刚) |
166 | 国外重要刊物 | Towards Fine-Grained Access Control on Browser Extensions | ISPEC2012 | LNCS 7232、158-169 | EI收录 | Lei Wang(王雷), Ji Xiang(向继), Jiwu Jing(荆继武), Lingchen Zhang(张令臣) |
167 | 国外重要刊物 | Improved Efficiency of Chosen Ciphertext Secure Encryption from Factoring | ISPEC2012 | LNCS 7232、34-45 | EI收录 | Xianhui Lu(路献辉),Bao Li( 李宝 ),Qixiang Mei(梅其祥), 刘亚敏 |
168 | 国外重要刊物 | A Non-interactive Secure Outsourced Computation Scheme in multi-party Cloud |
INCoS2012 | 15-19 | EI收录 | 郭姝,徐海霞 |
169 | 国外重要刊物 | Complementary Witness Soundness Witness Indistinguishable Proof system and CCA2 Public-Key Encryption Schemes |
INCoS2012 | 270-278 | EI收录 | 徐海霞,李宝,梅其祥 |
170 | 国内重要刊物 | 基于WCF的测试管理系统的设计与实现 | 计算机应用研究 | 29、增刊、417–419 | 其他收录 | 马存庆,林璟锵,查达仁,尚铭 |
171 | 国外重要刊物 | Universally composable zero-knowledge sets | Intenational Journal of Grid and Utility Computing | 3、1、25-31 | EI收录 | 徐海霞,李红达,李宝 |
172 | 国内重要刊物 | Quantum election scheme based on anonymous quantum key distribution | 中国物理B | 2012,8:23-30 | SCI收录 | Zhou Rui-Rui(周瑞瑞),Yang Li(杨理) |
173 | 国外重要刊物 | Public-key encryption and authentication of quantum information | SCIENCE CHINA physics,Mechanics& Astronomy | 55、9、1618-1629 | SCI收录 | Liang Min(梁敏),Yang Li(杨理) |
174 | 国外重要刊物 | Lagrange interpolation polynomials and generalized Reed-Solomon codes over rings of matrices | ISIT 2012 | 3098-3100 | EI收录 | 王丽萍 |
175 | 国外重要刊物 | Automatic search of truncated impossible differentials and applications | Indocrypt 2012 | 2012 | EI收录 | Shengbao Wu, Mingsheng Wang |
176 | 国外重要刊物 | On the probability distribution of the carry cells of stream ciphers F-FCSR-H v2 and F-FCSR-H v3 | Proceedings of Inscrypt 2011 | LNCS 7537 pp.31-47 | EI收录 | 1Haixin Song(宋海欣), 2Xiubin Fan(范修斌), 3Chuankun Wu(武传坤),4 Dengguo Feng(冯登国) |
177 | 国外重要刊物 | 3kf9: Enhancing 3GPP-MAC beyond the Birthday Bound | ASIACRYPT 2012 | Volume 7658, 2012, pp 296-312 | EI收录 | Liting Zhang,?Wenling Wu,?Han Sui,?Peng Wang |
178 | 国外重要刊物 | Inner-Product Lossy Trapdoor Functions and Applications | ACNS 2012 | Volume 7341, 2012, pp 188-205 | EI收录 | Xiang Xie, Rui Xue, Rui Zhang |
179 | 国外重要刊物 | Deterministic Public Key Encryption and Identity-Based Encryption from Lattices in the Auxiliary-Input Setting | SCN2012 | Volume 7485, 2012, pp 1-18 | EI收录 | Xiang Xie, Rui Xue, and Rui Zhang |
180 | 国外重要刊物 | GreenTech: A Case Study for Using the Web of Things in Household Energy Conservation | UIC 2012 | 906-911 | EI收录 | Yang Liu, Qiang Li, Weijun Qin, et al. |
181 | 国外重要刊物 | Threshold Ciphertext Policy Attribute-based Encryption with Constant Size Ciphertexts | ACISP 2012 | LNCS 7372:336-349 | EI收录 | 1Aijun Ge(葛爱军), 2 Jiang Zhang(张江),3 Rui Zhang(张锐) |
182 | 国外重要刊物 | Benchmarking for steganog- raphy by kernel Fisher discriminant criterion | Inscrypt’2011 | vol. 7537 of Lecture Notes in Computer Science, pp. 113–130 | EI收录 | 1W. Huang(黄炜), 2X. Zhao(赵险峰), 3D. Feng(冯登国), and 4R. Sheng(盛任农) |
183 | 国外重要刊物 | On the Equivalence of Two Definitions of Visual Cryptography Scheme | ISPEC 2012 | pp. 217-227, LNCS 7232 | EI收录 | Teng Guo, Feng Liu and Chuankun Wu |
184 | 国外重要刊物 | Flexible Visual Cryptography Scheme Without Distortion | IWDW2011 (10th International Workshop on Digital-forensics and Watermarking) | LNCS Volume 7128/2012, page 211-227 | EI收录 | Feng Liu, Teng Guo, Chuankun Wu and Ching-Nung Yang |
185 | 国外重要刊物 | On the resistance of Boolean functions against fast algebraic attacks | ICISC 2011(LNCS) | 7259, 261-274 | EI收录 | 1 Yusong Du(杜育松), 2 Fangguo Zhang(张方国), 3 Meicheng Liu(刘美成) |
186 | 国外重要刊物 | A Path-based Access Control Method for Location Obfuscation in Mobile Environment | 2012 IEEE Symposium on Electrical & Electronics Engineering | 2012, pp.570 - 573. | EI收录 | Yingjun Zhang, Kai Chen, Yifeng Lian |
187 | 国外重要刊物 | A Behavior Feature Generation Method for Obfuscated Malware Detection | The 2012 International Conference on Computer Science and Service System(CSSS2012). | Volume 4,2105-2109 | EI收录 | 1 Rui Wang(王蕊), 2 Xiaoqi Jia(贾晓启), 3 Chujiang Nie(聂楚江) |
188 | 国外重要刊物 | Extending Higher-order Integral: An Efficient Unified Algorithm of Constructing Integral Distinguishers for Block Ciphers | Springer-Verlag | LNCS 7341 | EI收录 | Wentao Zhang, Bozhan Su, Wenling Wu, Dengguo Feng, Chuankun Wu |
189 | 国外重要刊物 | Smartphone Heterogeneous Network Handoff Based on the Closed Control Loop | ICCPS 2012 | 978-0-7695-4695-7 | EI收录 | Qiang Li, Weijun Qin, et al. |
190 | 国内重要刊物 | 改进的多步法快速相关攻击及其应用 | 中国科学E辑 | 2012-04,469-483 | SCI收录 | 张斌,冯登国 |
191 | 国内重要刊物 | 一个支持完全细粒度属性撤销的CP-ABE方案 | 软件学报 | 2012,23(10):2805-2816 | EI收录 | 王鹏翩,冯登国,张立武 |
192 | 国内重要刊物 | 两层架构的可信身份服务平台研究与设计 | 计算机应用与软件 | 2012.3 Vol.29 No.3 | 其他收录 | 朱玉涛,王雅哲,武传坤 |
193 | 国内重要刊物 | 基于服务构件集成的安全访问业务建模方法 | 计算机应用与软件 | 2012.2 Vol.29 No.2 | 其他收录 | 朱玉涛,王雅哲,武传坤 |
194 | 国内重要刊物 | 基于路况相似性的城市公交车到站时间预测机制 | 软件学报 | 2012,23(Suppl.(1)):87−99 | EI收录 | 孙玉砚 |
195 | 国内重要刊物 | 一种隐写分析盲性的评价及提高方法 | 计算机应用与软件 | 29(9), 6-9 | 其他收录 | 1孙磊, 2赵险峰, 3黄炜, 4盛任农 |
196 | 国内重要刊物 | 一种测评隐写分析的图像纹理估计方法 | 计算机工程 | 38(14), 116–118 | EI收录 | 1邓果, 2赵险峰, 3黄炜, 4盛任农 |
197 | 国内重要刊物 | 三组隐写特征的互补性分析及其面向空域隐写的融合 | 中国科学院研究生院学报 | 29(2),264-270 | EI收录 | 1张弢, 2赵险峰, 3黄炜, 4盛任农 |
198 | 国内重要刊物 | 基于游程统计和Walsh谱能量分布的调色板隐写分析 | 中国科学院研究生院学报 | 29(3),423-428 | EI收录 | 1李红艳, 2赵险峰, 3黄炜, 4盛任农 |
199 | 国内重要刊物 | 基于码表分布特征和重编码的MP3Stego隐写分析 | 中国科学院研究生院学报 | 29(1), 118–124 | EI收录 | 万威, 赵险峰, 黄炜, 盛任农 |
200 | 国内重要刊物 | 基于KFD指标聚类的高隐蔽性JPEG隐写分析 | 计算机学报 | 35(9): 1951–1958 | EI收录 | 1黄炜, 2赵险峰, 3盛任农 |
201 | 国内重要刊物 | 基于主成分分析进行特征融合的JPEG隐写分析 | 软件学报 | 23(7): 1869-1879 | EI收录 | 1黄炜, 2赵险峰, 3冯登国, 4盛任农 |
202 | 国内重要刊物 | 智能电网中的移动应用安全技术 | 电力系统自动化 | V36,NO16,pp82~87 | EI收录 | 1徐震,2刘韧, 于爱民, 3汪丹 |
203 | 国内重要刊物 | 美国信息安全保密体系初探 | 保密科学与技术 | 期7, 页6-13 | 其他收录 | 林东岱,刘峰 |
204 | 国内重要刊物 | Computing Polynomial Univariate Representations of Zero-dimensional Ideals by Groebner Basis. | Science in China, Series A: Mathematics | Vol. 55, No. 6, 1293-1302 | SCI收录 | X.D. Ma, Y. Sun(孙瑶) and D.K. Wang |
205 | 国内重要刊物 | 基于有限约束满足问题的溢出漏洞动态检测方法 | 计算机学报 | 2012,5(35),898-909 | EI收录 | 陈恺,苏璞睿,冯登国 |
206 | 国内重要刊物 | 基于决策树的Webshell检测方法研究 | 网络新媒体技术 | 1 6 15-19 | 其他收录 | 1 胡建康,2 徐震,3 马多贺,4 杨婧 |
207 | 国内重要刊物 | 单圈T函数输出序列的线性复杂度 | 中国科学院研究生院学报 | 29, 3, 429-432 | EI收录 | 1刘俊,2范修斌,3武传坤 |
208 | 国内重要刊物 | 一种无证书的家庭基站认证方案 | 中国科学院研究生院学报 | 29,1, 141-144 | EI收录 | 1谢涛,2武传坤 |
209 | 国内重要刊物 | BOMM算法的密码学性质 | 软件学报 | 23,7, 1899-1907 | EI收录 | 1杨笑,2范秀斌,3武传坤,4余玉银, 5冯秀涛 |
210 | 国内重要刊物 | 流密码算法Grain的立方攻击 | 软件学报 | 23, 1, 171-176 | EI收录 | 1宋海欣,2范秀斌,3武传坤,4冯登国 |
211 | 国内重要刊物 | 一个适应性安全的支持用户私钥撤销的KP-ABE方案 | 小型微型计算机系统 | .2012(2194) | EI收录 | 黄杜煜,张振峰,张立武 |
212 | 国外重要刊物 | A provable authenticated certificateless group key agreement with constant rounds | Journal of Communications and Networks | 14,1,104-110 | SCI收录 | 1Jikai Teng(滕济凯),2Chuankun Wu (武传坤) |
213 | 国外重要刊物 | CMQV+: An authenticated key exchange protocol from CMQV | Science China Information Sciences | 55 7 1666-1674 | SCI收录 | 1Hui Li(李徽), 2 Chuan-Kun Wu(武传坤) |
214 | 国外重要刊物 | An ID-based authenticated dynamic group key agreement with optimal round | Science China Information Sciences | 55 11 2542-2554 | SCI收录 | 1TENG Jikai(滕济凯),2 WU Chuankun(武传坤),3 TANG Chunming(唐春明) |
215 | 国外重要刊物 | New results on multivariate polynomial matrix factorizations | Linear algebra and its applications | 438, 87-95 | SCI收录 | Jinwang Liu, Mingsheng Wang |
216 | 国外重要刊物 | Video steganalysis exploiting motion vector reversion-based features | IEEE Signal Processing Letters | 19(1): 35-38 | SCI收录 | 1Yun Cao(曹纭), 2 Xianfeng Zhao(赵险峰),3 Dengguo Feng(冯登国) |
217 | 国外重要刊物 | Bo Liang:TrCBC: Another look at CBC-MAC | Information Processing Letters | Volume 112(7): 302-307 (2012 | SCI收录 | Liting Zhang,?Wenling Wu,?Peng Wang |
218 | 国外重要刊物 | Role-Based and Time-Bound Access and Management of EHR Data | Security and Communication Networks | Networks 0000; 00:1–21 | SCI收录 | Rui Zhang |
219 | 国外重要刊物 | Parametric equation solving and quantifier elimination in finite fields with the characteristic set method | Journal of Systems Science and Complexity | J Syst Sci Complex (2012) 25: 778–791 | SCI收录 | 黄震宇 |
220 | 国外重要刊物 | The n-Diffie-Hellman problem and multiple-key encryption | International Journal of Information Security | Vol. 11, No.5, 2012, pp. 305-320. | SCI收录 | Liqun Chen, Yu Chen |
221 | 国外重要刊物 | Attribute-based signature scheme with constant size signature in the standard model | IET Information Security | 6(2):47-54 | SCI收录 | 1Aijun Ge(葛爱军), 2 Chuangui Ma(马传贵),3 Zhenfeng Zhang(张振峰) |
222 | 国外重要刊物 | Improve steganalysis by MWM feature-selection. | Watermarking, Intech Publishing | Volume 2 | 其他收录 | 1 Bingbing Xia(夏冰冰)2 Xianfeng Zhao(赵险峰)3 Dengguo Feng(冯登国) |
223 | 国外重要刊物 | A New Variant of Time Memory Trade-Off on the Improvement of Thing and Ying’s Attack | 14th International Conference on Information and Communications Security- ICICS 2012 | 7618, 311-320 | EI收录 | Zhenqi Li, Yao Lu, Wenhao Wang, Bin Zhang, Dongdai Lin |
224 | 国外重要刊物 | Improving the Visual Quality of Size Invariant Visual Cryptography Scheme | Journal of Visual Communication and Image Representation | Volume 23, Page 331-342 | SCI收录 | Feng Liu, Teng Guo, Chuankun Wu and Lina Qian |
225 | 国外重要刊物 | A Signature-Based Algorithm for Computing Groebner Bases in Solvable Polynomial Algebras. | Proceedings of ISSAC 2012. | 351-358 | EI收录 | Y. Sun,(孙瑶) D.K. Wang, X.D. Ma and Y. Zhang |
226 | 国外重要刊物 | Comments on “A design of Boolean functions resistant to (fast) algebraic cryptanalysis with efficient implementation” | Cryptography and Communications | DOI 10.1007/s12095-012-0063-9 | EI收录 | 1 Wenhao Wang(王文浩), 2 Meicheng Liu(刘美成), 3 Yin Zhang(张寅), |
227 | 国外重要刊物 | Black-box testing based on colorful taint analysis | Sci China Inf Sci | 2012, 55: 171–183 | SCI收录 | CHEN Kai, FENG Dengguo, SU Purui, ZHANG Yingjun |
附件: |
©中国科学院信息工程研究所信息安全国家重点实验室 备案序号:京ICP备12047326-1号 电话:010-82546611 传真:010-82546564 地址:北京市海淀区闵庄路甲89号 100093 |