column
    A Novel Security-Ensured Public Key Cryptosystem——A Quartic Congruential Equation Approach
    WANG Ze-hui, ZHANG Zhi-guo
    2007, 36(6): 1147-1151.
    Abstract PDF
    Improved Medium-Field Multivariate Public Key Encryption Scheme
    WANG Zhi-wei, ZHENG Shi-hui, YANG Yi-xian, ZHANG Zhi-hui
    2007, 36(6): 1152-1154,1159.
    Abstract PDF
    Cluster-Based Key Pre-Distribution Scheme for Ad hoc Networks
    XU Li, ZHANG Jing
    2007, 36(6): 1155-1159.
    Abstract PDF
    Threshold-Based Key Predistribution in Ad hoc Network
    ZHANG Xue-feng, LIU Bin, JIANG Huang-pu
    2007, 36(6): 1160-1163.
    Abstract PDF
    A New Hybrid Key Management Scheme for Ad hoc Networks
    WANG Hao, XIE Ying, ZHENG Wu
    2007, 36(6): 1164-1166,1171.
    Abstract PDF
    An Efficient Partially Blind Signature with Provable Security
    CAI Yong-quan, LI Yun-long
    2007, 36(6): 1167-1171.
    Abstract PDF
    Enhancement of a Lightweight RFID Security Protocol
    LUO Zong-wei, ZHOU Shi-jie, LI Jenny
    2007, 36(6): 1172-1178,1186.
    Abstract PDF
    Application of Multi-Level Immune Detector Set to Distributed Intrusion Detection
    LIU Cai-ming, ZHANG Yan, ZHAO Hui, PENG Ling-xi, ZENG Jin-quan
    2007, 36(6): 1179-1182.
    Abstract PDF
    IP Spoofing DDoS Defense Using Active IP Record and ICMP Message
    CHEN Wei, LUO Xu-cheng, QIN Zhi-guang
    2007, 36(6): 1183-1186.
    Abstract PDF
    On the Buffer Overflow Attack Mode and Countermeasures
    CHENG Hong-rong, QIN Zhi-guang, WAN Ming-cheng, DENG Wei
    2007, 36(6): 1187-1191.
    Abstract PDF
    Intrusion Detection Based on Kernel Fisher Discriminant Analysis and Minimax Probability Machine Classifier
    CHEN Zhen-guo, LI Dong-yan
    2007, 36(6): 1192-1194.
    Abstract PDF
    Net Safety Evaluation Index Based on Grey Advantage Analysis Method
    YE Li, WANG Juan, QIN Zhi-Guang
    2007, 36(6): 1195-1197,1252.
    Abstract PDF
    Danger Theory Based Network Risk Evaluation Model
    PENG Ling-xi, CHEN Yue-Feng, LIU Cai-ming, ZENG Jin-quan, LIU Sun-jun, ZHAO Hui
    2007, 36(6): 1198-1201.
    Abstract PDF
    A Mobile Agent System Security Mechanism for Large Scale Network Applications
    SHI Liang, WANG Bei-zhan, JIANG Qing-shan, CHEN Li-fei
    2007, 36(6): 1202-1205,1218.
    Abstract PDF
    Simulation of Epidemic of P2P Worms in BitTorrent Networks
    WU Chun-jiang, ZHOU Shi-jie, XIAO Chun-jing, WU Yue
    2007, 36(6): 1206-1210.
    Abstract PDF
    Research on SIP Security Mechanism
    WU Jin, ZHANG Feng-li, HE Xing-gao, LU Qing
    2007, 36(6): 1211-1214.
    Abstract PDF
    Immune Principles Inspired Approach to Detection of Web Attacks
    ZENG Jin-quan, ZHAO Hui, LIU Cai-ming, PENG Ling-xi
    2007, 36(6): 1215-1218.
    Abstract PDF
    Artificial Immunity-Inspired Script-Virus Detection Model
    LIU Cai-ming, ZHAO Hui, ZHANG Yan, ZENG Jin-quan, PENG Ling-xi
    2007, 36(6): 1219-1222.
    Abstract PDF
    Research of Spam Filtering System Based on Latent Semantic Analysis and MD5
    ZHANG Qiu-yu, SUN Jing-tao, YAN Xiao-wen, HUANG Wen-han
    2007, 36(6): 1223-1227.
    Abstract PDF
    MultidimensionalK-anonymity Partition Method Using Entropy
    YAN Hua, LIU Gui-song
    2007, 36(6): 1228-1231.
    Abstract PDF
    A Rapid Method for Text Tendency Classification
    LI Yan-ling, DAI Guan-zhong, QIN Sen
    2007, 36(6): 1232-1236.
    Abstract PDF
    Quick Attribute Reduction Algorithm on Decision System
    LI Jin-hai, Lü Yue-jin
    2007, 36(6): 1237-1240.
    Abstract PDF
    Classifier Design Using Adaptive GHA Neural Networks
    LIU Gui-song, WANG Xiao-bin
    2007, 36(6): 1241-1244.
    Abstract PDF
    Lossless Data Compression with Neural Network Based on Maximum Entropy Theory
    FU Yan, ZHOU Jun-lin, WU Yue
    2007, 36(6): 1245-1248.
    Abstract PDF
    Analysis of Opinion Leader in On-Line Communities
    GAO Jun-bo, YANG Jing
    2007, 36(6): 1249-1252.
    Abstract PDF
    Reasearch on Multiradar Data Fusion Algorithm Based on Grid Clustering
    SHU Hong-ping, XU Zheng-ming, ZOU Shu-rong, HE Jia
    2007, 36(6): 1253-1256.
    Abstract PDF
    Improved Fuzzy C-Means Clustering Algorithm
    NIU Qiang, XIA Shi-xiong, ZHOU Yong, ZHANG Lei
    2007, 36(6): 1257-1259,1272.
    Abstract PDF
    A Method of Time Series Forecasting for Scientific Data
    ZHOU Qiao-lin, FU Yan
    2007, 36(6): 1260-1263.
    Abstract PDF
    Clustering with Immunity-Vaccination Based on Particle Swarm Optimization Algorithm
    ZHENG Xiao-ming, Lü Shi-ying, WANG Xiao-dong
    2007, 36(6): 1264-1267.
    Abstract PDF
    Attribute Reduction Based on Quantum-Behaved Particle Swarm Optimization with Immunity
    Lü Shi-ying, ZHENG Xiao-ming, WANG Xiao-dong
    2007, 36(6): 1268-1272.
    Abstract PDF
    A Method for Detecting Approximately Duplicate Database Records in Data Warehouse
    LI Xing-yi, BAO Cong-jian, SHI Hua-ji
    2007, 36(6): 1273-1277.
    Abstract PDF
    Forecasting of Electricity Prices with Cluster Analysis
    ZHU Jin-rong, HU Wang-bin
    2007, 36(6): 1278-1281.
    Abstract PDF
    Study of Influence Correlation Mining among Commodities Based on Sale Data
    WANG Jin-long, XU Cong-fu, XU Jiao-fen, LUO Guo-jing
    2007, 36(6): 1282-1285.
    Abstract PDF
    Average Density-Based Outliers Detection
    SHI Hua-ji, ZHOU Shu-yong, LI Xing-yi, TANG Hui, DING Qiu-lin
    2007, 36(6): 1286-1288,1295.
    Abstract PDF
    Application of a Clustering Algorithm Based on Density and Grid in CRM
    DUO Chun-hong, WANG Cui-ru
    2007, 36(6): 1289-1291,1314.
    Abstract PDF
    Application of PCA and Coherence Measure in Clustering Algorithm
    JIANG Bin, PAN Jing-chang, GUO Qiang, YI Zhen-ping
    2007, 36(6): 1292-1295.
    Abstract PDF
    Analysis of Near Field Communication Technology
    WU Si-nan, ZHOU Shi-jie, QIN Zhi-guang
    2007, 36(6): 1296-1299.
    Abstract PDF
    A Real-Time Ad hoc On-Demand Distance Vector Routing Protocol
    ZHOU Man-yuan, ZHOU Li-wei
    2007, 36(6): 1300-1303.
    Abstract PDF
    On Energy Efficient Transmission of WSN Based on Average Interference Analysis
    KAN Bao-qiang, CAI Li, ZHU Hong-song
    2007, 36(6): 1304-1307.
    Abstract PDF
    Determine Mouth Position in Face Image
    CHEN Yu-bo, XU Hai-zhu, HUANG Ting-ting, ZHU Jian-jun
    2007, 36(6): 1308-1310.
    Abstract PDF
    Application of Mutual Information in Image Retrieval
    FAN Zi-zhu, LIU Er-gen, XU Bao-gen
    2007, 36(6): 1311-1314.
    Abstract PDF
    Dynamic Identity Authentication Policy of E-Procurement System P2DR Research
    LUO Dong, QIN Zhi-guang, MA Xin-xin
    2007, 36(6): 1315-1318.
    Abstract PDF
    Cost-Sensitive Classification by Gene Expression Programming
    ZHANG Cheng, CAI Zhi-hua
    2007, 36(6): 1319-1321.
    Abstract PDF
    Application Research of Activity Based Costing in the Software Process
    WU Zu-feng, LI Jiong
    2007, 36(6): 1322-1324,1353.
    Abstract PDF
    Multiple Watermarking and Capacity Analysis of Digital Image
    ZHANG Fan, LIU Ya-li, SU Yu-ting, ZHANG Chun-tian
    2007, 36(6): 1325-1328.
    Abstract PDF
    Research on RFID Oriented Information Fusion in Intelligent Logistics
    LI Bin, LI Wen-feng
    2007, 36(6): 1329-1332,1349.
    Abstract PDF
    Research on the Technology of Peer-to-Peer Network Traffic Identification
    LU Qing, ZHOU Shi-jie, QIN Zhi-guang, WU Chun-jiang
    2007, 36(6): 1333-1337.
    Abstract PDF
    Deep Packet Inspection and P2P Service in Telecommunication Network
    LIAO Jun, TAN Hao, LIU Yun-jie
    2007, 36(6): 1338-1341.
    Abstract PDF
    A Study on Middleware of P2P in the Mobile Computing Environment
    TAN Hao, YANG Min, LI Xin-yi, LIU Hua-min
    2007, 36(6): 1342-1344.
    Abstract PDF
    Application of Improved PSO-SVM Approach in Speaker Recognition
    LI Ming, ZHANG Yong, LI Jun-quan, ZHANG Ya-fen
    2007, 36(6): 1345-1349.
    Abstract PDF
    Application of OptorSim in Replication Strategies for Data Gird
    LI Jiong, LUO Guang-chun, DONG Shi
    2007, 36(6): 1350-1353.
    Abstract PDF
    Baidu
    map