[1] |
LI Donglin.
Cloud Host Access Monitoring Algorithm Based on
Active Idle Energy Consumption
[J]. Journal of Jilin University (Information Science Edition), 2023, 41(5): 945-951.
|
[2] |
XIONG Aiming, LI Mingqian, LIU Fang.
Encryption Storage Algorithm for Database Information Privacy Based on Chaos Mapping
[J]. Journal of Jilin University (Information Science Edition), 2023, 41(3): 459-464.
|
[3] |
ZHANG Yaodong , LIU Feng .
Elliptic Curve Digital Signature with Strong Forward Security
[J]. Journal of Jilin University (Information Science Edition), 2023, 41(1): 93-98.
|
[4] |
HU Jianjun, WANG Wei, LI Hengjie.
Computation of Weil Pairs for Elliptic Curves
over Finite Fields
[J]. Journal of Jilin University (Information Science Edition), 2022, 40(3): 509-514.
|
[5] |
WANG Xingdi , XU Hongmei , LI Dongmei .
Three-Factor Authentication and Key Agreement
Protocol for Multi-Server Architecture
[J]. Journal of Jilin University (Information Science Edition), 2022, 40(2): 326-332.
|
[6] |
FU Zhibo , YANG Hang , LIU Jiahao .
Design of Network Security Operation Platform Based on Multi-Source Heterogeneous Sensor
[J]. Journal of Jilin University (Information Science Edition), 2022, 40(1): 82-88.
|
[7] |
LI Jinyuan, MIAO Xianghua.
Analysis and Improvement of Forward-Secure Digital Signature Scheme
[J]. Journal of Jilin University(Information Science Ed, 2017, 35(6): 608-611.
|
[8] |
LI Huimin,LIANG Hongmei,SU Junfan,CHEN Zhixiong .
Cryptanalysis of Two Signature Schemes in the Standard Model
[J]. Journal of Jilin University(Information Science Ed, 2016, 34(6): 781-786.
|
[9] |
PU Xin, WANG Lingmin, FAN Xiaodan, BAI Ye, JIANG Wei, GUO Danwei.
Image Encryption Scheme Based on Double-Delay Reforming System
[J]. Journal of Jilin University(Information Science Ed, 2014, 32(2): 217-222.
|
[10] |
WANG Fang, YUAN Zhe.
Construction Method of One-Way Shell Core Function Based on HFE Public Key Cryptography
[J]. Journal of Jilin University(Information Science Ed, 2013, 31(6): 659-663.
|
[11] |
CHEN Zai-ping, CAI Peng-fei, DONG En-zeng.
AES Image Encryption Algorithm Based on Hyper-Chaos
[J]. J4, 2013, 31(2): 158-164.
|
[12] |
WANG Lin-song, LIU De-shan, GUO Jin, WANG Hong-dong.
Design of Public Cloud Security Architecture
[J]. J4, 2013, 31(2): 165-169.
|
[13] |
CHU Ying, WANG Xiao-Man, LIU Feng, LIU Shu-Chang, HAN Zhi-Jiang.
Research on Compound Chaos Image Encryption Method with Time-Varying
[J]. J4, 2012, 30(3): 291-297.
|
[14] |
HU Bing, SUN Yong-Wei, LI Xiang, WANG Yang-Shuang.
Improved Image Encryption Algorithm Based onHigh-Dimension Chaotic System
[J]. J4, 2012, 30(1): 12-17.
|
[15] |
LAN Li-Hui, SUN Yang-Hui, JU Shi-Guang.
Privacy Preservation of Sensitive Edges in Social Networks Publication
[J]. J4, 2011, 29(4): 323-330.
|