吉林大学学报(工学版) ›› 2015, Vol. 45 ›› Issue (2): 630-638.doi: 10.13229/j.cnki.jdxbgxb201502044
• Orignal Article • Previous Articles Next Articles
LI Wen-ping1,2,3,YANG Jing1,ZHANG Jian-pei1,YIN Gui-sheng1,2
CLC Number:
[1] | YU Yi-cheng, HU Liang, CHI Ling, CHU Jian-feng. Improved anonymous authentication protocol for multi-server architectures [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1586-1592. |
[2] | YANG Hong-yu, XU Jin. An Android malware static detection model [J]. 吉林大学学报(工学版), 2018, 48(2): 564-570. |
[3] | ZHAO Bo, QIN Gui-He, ZHAO Yong-Zhe, YANG Wen-Di. Public key cryptosystem based on semi-trapdoor one-way function [J]. 吉林大学学报(工学版), 2018, 48(1): 259-267. |
[4] | LUO Yang-xia, GUO Ye. Software recognition based on features of data dependency [J]. 吉林大学学报(工学版), 2017, 47(6): 1894-1902. |
[5] | HAN Jia-ling, ZHAO Xiao-hui. Adjustable reversible data hiding algorithm with large embedded capacity based on image gradient prediction [J]. 吉林大学学报(工学版), 2016, 46(6): 2074-2079. |
[6] | REN Wei-wu, HU Liang, ZHAO Kuo. Intrusion alert correlation model based on data mining and ontology [J]. 吉林大学学报(工学版), 2015, 45(3): 899-906. |
[7] | LUO Zhi-yong,YOU Bo,XU Jia-zhong,LIANG Yong. Automatic recognition model of intrusive intention based on three layers attack graph [J]. 吉林大学学报(工学版), 2014, 44(5): 1392-1397. |
[8] | CAI Zhao-hui, ZHANG Jian-pei, YANG Jing. Anonymous area estimation method of path data based on Bayesian network [J]. 吉林大学学报(工学版), 2014, 44(2): 454-458. |
[9] | WANG Hao, ZHANG Xiao, WANG Ping, ZHANG Yang. Lightweight certificateless signature and key agreement scheme for WSNs [J]. 吉林大学学报(工学版), 2014, 44(2): 465-470. |
[10] | SHENG Gang, WEN Tao, GUO Quan, YIN Ying. Correctness authentication of preference top-k query in cloud computing [J]. 吉林大学学报(工学版), 2014, 44(01): 164-170. |
[11] | PU Xin, TIAN Xiao-jian, WANG Chun-min, ZHANG Jing, DONG Lei, YIN Jing. Image encryption scheme based on substitution of fiber chaotic system [J]. 吉林大学学报(工学版), 2014, 44(01): 270-275. |
[12] | LUO Yang-xia, FANG Ding-yi. Software piracy detection based on birthmarks of multi-attribute features [J]. 吉林大学学报(工学版), 2013, 43(05): 1359-1366. |
[13] | HU Liang, YAN Zhi-jia, CHU Jian-feng, YUAN Wei, XU Xiao-bo. Cryptanalysis and improvement on subkey extendable algorithm of IDEA [J]. , 2012, (06): 1515-1520. |
[14] | LUO Wen-jun, GAO Yi-feng. Position-based authentication [J]. 吉林大学学报(工学版), 2012, 42(增刊1): 300-303. |
[15] | NING Fang-hua, ZHANG Yan-wei, YU Wu-jia. Security project for radio frequency identification access control system based on random hash-lock [J]. 吉林大学学报(工学版), 2012, 42(增刊1): 317-321. |
|