China Communications
搜索
China Communications
2018年2期
浏览往期
订阅
目录
NETWORK SECURITY
T-IP: A Self-Trustworthy and Secure Internet Protocol
A Learning Evasive Email-Based P2P-Like Botnet
CRYPTOGRAPHY
Quantum Polynomial-Time Fixed-Point Attack for RSA
Quantum Key Distribution Network: Optimal Secret-Key- Aware Routing Method for Trust Relaying
Collision Attacks against AEZ-PRF for Authenticated Encryption AEZ
Automatic Search of Impossible Differentials and Zero-Correlation Linear Hulls for ARX Ciphers
Cryptanalysis of a Cryptosystem with Non-Commutative Platform Groups
Cost Sharing Based Truthful Spectrum Auction with Collusion-Proof
COMPUTER SYSTEM SECURITY
Dynamic Integrity Measurement Model Based on vTPM
A Trusted Attestation Mechanism for the Sensing Nodes of Internet of Things Based on Dynamic Trusted Measurement
TPTVer: A Trusted Third Party Based Trusted Verifier for Multi-Layered Outsourced Big Data System in Cloud Environment
Decentralized Attribute-Based Encryption and Data Sharing Scheme in Cloud Storage
CAPT: Context-Aware Provenance Tracing for Attack Investigation
Powermitter: Data Exfiltration from Air-Gapped Computer through Switching Power Supply
An Integration Testing Framework and Evaluation Metric for Vulnerability Mining Methods
A Cloud-Assisted Malware Detection and Suppression Framework for Wireless Multimedia System in IoT Based on Dynamic Differential Game
CYBERSPACE SECURITY: FOR A BETTER LIFE AND WORK