column
A Novel Security-Ensured Public Key Cryptosystem——A Quartic Congruential Equation Approach
WANG Ze-hui, ZHANG Zhi-guo
2007, 36(6): 1147-1151.
Abstract PDF
Improved Medium-Field Multivariate Public Key Encryption Scheme
WANG Zhi-wei, ZHENG Shi-hui, YANG Yi-xian, ZHANG Zhi-hui
2007, 36(6): 1152-1154,1159.
Abstract PDF
Cluster-Based Key Pre-Distribution Scheme for Ad hoc Networks
XU Li, ZHANG Jing
2007, 36(6): 1155-1159.
Abstract PDF
Threshold-Based Key Predistribution in Ad hoc Network
ZHANG Xue-feng, LIU Bin, JIANG Huang-pu
2007, 36(6): 1160-1163.
Abstract PDF
A New Hybrid Key Management Scheme for Ad hoc Networks
WANG Hao, XIE Ying, ZHENG Wu
2007, 36(6): 1164-1166,1171.
Abstract PDF
An Efficient Partially Blind Signature with Provable Security
CAI Yong-quan, LI Yun-long
2007, 36(6): 1167-1171.
Abstract PDF
Enhancement of a Lightweight RFID Security Protocol
LUO Zong-wei, ZHOU Shi-jie, LI Jenny
2007, 36(6): 1172-1178,1186.
Abstract PDF
Application of Multi-Level Immune Detector Set to Distributed Intrusion Detection
LIU Cai-ming, ZHANG Yan, ZHAO Hui, PENG Ling-xi, ZENG Jin-quan
2007, 36(6): 1179-1182.
Abstract PDF
IP Spoofing DDoS Defense Using Active IP Record and ICMP Message
CHEN Wei, LUO Xu-cheng, QIN Zhi-guang
2007, 36(6): 1183-1186.
Abstract PDF
On the Buffer Overflow Attack Mode and Countermeasures
CHENG Hong-rong, QIN Zhi-guang, WAN Ming-cheng, DENG Wei
2007, 36(6): 1187-1191.
Abstract PDF
Intrusion Detection Based on Kernel Fisher Discriminant Analysis and Minimax Probability Machine Classifier
CHEN Zhen-guo, LI Dong-yan
2007, 36(6): 1192-1194.
Abstract PDF
Net Safety Evaluation Index Based on Grey Advantage Analysis Method
YE Li, WANG Juan, QIN Zhi-Guang
2007, 36(6): 1195-1197,1252.
Abstract PDF
Danger Theory Based Network Risk Evaluation Model
PENG Ling-xi, CHEN Yue-Feng, LIU Cai-ming, ZENG Jin-quan, LIU Sun-jun, ZHAO Hui
2007, 36(6): 1198-1201.
Abstract PDF
A Mobile Agent System Security Mechanism for Large Scale Network Applications
SHI Liang, WANG Bei-zhan, JIANG Qing-shan, CHEN Li-fei
2007, 36(6): 1202-1205,1218.
Abstract PDF
Simulation of Epidemic of P2P Worms in BitTorrent Networks
WU Chun-jiang, ZHOU Shi-jie, XIAO Chun-jing, WU Yue
2007, 36(6): 1206-1210.
Abstract PDF
Research on SIP Security Mechanism
WU Jin, ZHANG Feng-li, HE Xing-gao, LU Qing
2007, 36(6): 1211-1214.
Abstract PDF
Immune Principles Inspired Approach to Detection of Web Attacks
ZENG Jin-quan, ZHAO Hui, LIU Cai-ming, PENG Ling-xi
2007, 36(6): 1215-1218.
Abstract PDF
Artificial Immunity-Inspired Script-Virus Detection Model
LIU Cai-ming, ZHAO Hui, ZHANG Yan, ZENG Jin-quan, PENG Ling-xi
2007, 36(6): 1219-1222.
Abstract PDF
Research of Spam Filtering System Based on Latent Semantic Analysis and MD5
ZHANG Qiu-yu, SUN Jing-tao, YAN Xiao-wen, HUANG Wen-han
2007, 36(6): 1223-1227.
Abstract PDF
Multidimensional K-anonymity Partition Method Using Entropy
YAN Hua, LIU Gui-song
2007, 36(6): 1228-1231.
Abstract PDF
A Rapid Method for Text Tendency Classification
LI Yan-ling, DAI Guan-zhong, QIN Sen
2007, 36(6): 1232-1236.
Abstract PDF
Quick Attribute Reduction Algorithm on Decision System
LI Jin-hai, Lü Yue-jin
2007, 36(6): 1237-1240.
Abstract PDF
Classifier Design Using Adaptive GHA Neural Networks
LIU Gui-song, WANG Xiao-bin
2007, 36(6): 1241-1244.
Abstract PDF
Lossless Data Compression with Neural Network Based on Maximum Entropy Theory
FU Yan, ZHOU Jun-lin, WU Yue
2007, 36(6): 1245-1248.
Abstract PDF
Analysis of Opinion Leader in On-Line Communities
GAO Jun-bo, YANG Jing
2007, 36(6): 1249-1252.
Abstract PDF
Reasearch on Multiradar Data Fusion Algorithm Based on Grid Clustering
SHU Hong-ping, XU Zheng-ming, ZOU Shu-rong, HE Jia
2007, 36(6): 1253-1256.
Abstract PDF
Improved Fuzzy C-Means Clustering Algorithm
NIU Qiang, XIA Shi-xiong, ZHOU Yong, ZHANG Lei
2007, 36(6): 1257-1259,1272.
Abstract PDF
A Method of Time Series Forecasting for Scientific Data
ZHOU Qiao-lin, FU Yan
2007, 36(6): 1260-1263.
Abstract PDF
Clustering with Immunity-Vaccination Based on Particle Swarm Optimization Algorithm
ZHENG Xiao-ming, Lü Shi-ying, WANG Xiao-dong
2007, 36(6): 1264-1267.
Abstract PDF
Attribute Reduction Based on Quantum-Behaved Particle Swarm Optimization with Immunity
Lü Shi-ying, ZHENG Xiao-ming, WANG Xiao-dong
2007, 36(6): 1268-1272.
Abstract PDF
A Method for Detecting Approximately Duplicate Database Records in Data Warehouse
LI Xing-yi, BAO Cong-jian, SHI Hua-ji
2007, 36(6): 1273-1277.
Abstract PDF
Forecasting of Electricity Prices with Cluster Analysis
ZHU Jin-rong, HU Wang-bin
2007, 36(6): 1278-1281.
Abstract PDF
Study of Influence Correlation Mining among Commodities Based on Sale Data
WANG Jin-long, XU Cong-fu, XU Jiao-fen, LUO Guo-jing
2007, 36(6): 1282-1285.
Abstract PDF
Average Density-Based Outliers Detection
SHI Hua-ji, ZHOU Shu-yong, LI Xing-yi, TANG Hui, DING Qiu-lin
2007, 36(6): 1286-1288,1295.
Abstract PDF
Application of a Clustering Algorithm Based on Density and Grid in CRM
DUO Chun-hong, WANG Cui-ru
2007, 36(6): 1289-1291,1314.
Abstract PDF
Application of PCA and Coherence Measure in Clustering Algorithm
JIANG Bin, PAN Jing-chang, GUO Qiang, YI Zhen-ping
2007, 36(6): 1292-1295.
Abstract PDF
Analysis of Near Field Communication Technology
WU Si-nan, ZHOU Shi-jie, QIN Zhi-guang
2007, 36(6): 1296-1299.
Abstract PDF
A Real-Time Ad hoc On-Demand Distance Vector Routing Protocol
ZHOU Man-yuan, ZHOU Li-wei
2007, 36(6): 1300-1303.
Abstract PDF
On Energy Efficient Transmission of WSN Based on Average Interference Analysis
KAN Bao-qiang, CAI Li, ZHU Hong-song
2007, 36(6): 1304-1307.
Abstract PDF
Determine Mouth Position in Face Image
CHEN Yu-bo, XU Hai-zhu, HUANG Ting-ting, ZHU Jian-jun
2007, 36(6): 1308-1310.
Abstract PDF
Application of Mutual Information in Image Retrieval
FAN Zi-zhu, LIU Er-gen, XU Bao-gen
2007, 36(6): 1311-1314.
Abstract PDF
Dynamic Identity Authentication Policy of E-Procurement System P2DR Research
LUO Dong, QIN Zhi-guang, MA Xin-xin
2007, 36(6): 1315-1318.
Abstract PDF
Cost-Sensitive Classification by Gene Expression Programming
ZHANG Cheng, CAI Zhi-hua
2007, 36(6): 1319-1321.
Abstract PDF
Application Research of Activity Based Costing in the Software Process
WU Zu-feng, LI Jiong
2007, 36(6): 1322-1324,1353.
Abstract PDF
Multiple Watermarking and Capacity Analysis of Digital Image
ZHANG Fan, LIU Ya-li, SU Yu-ting, ZHANG Chun-tian
2007, 36(6): 1325-1328.
Abstract PDF
Research on RFID Oriented Information Fusion in Intelligent Logistics
LI Bin, LI Wen-feng
2007, 36(6): 1329-1332,1349.
Abstract PDF
Research on the Technology of Peer-to-Peer Network Traffic Identification
LU Qing, ZHOU Shi-jie, QIN Zhi-guang, WU Chun-jiang
2007, 36(6): 1333-1337.
Abstract PDF
Deep Packet Inspection and P2P Service in Telecommunication Network
LIAO Jun, TAN Hao, LIU Yun-jie
2007, 36(6): 1338-1341.
Abstract PDF
A Study on Middleware of P2P in the Mobile Computing Environment
TAN Hao, YANG Min, LI Xin-yi, LIU Hua-min
2007, 36(6): 1342-1344.
Abstract PDF
Application of Improved PSO-SVM Approach in Speaker Recognition
LI Ming, ZHANG Yong, LI Jun-quan, ZHANG Ya-fen
2007, 36(6): 1345-1349.
Abstract PDF
Application of OptorSim in Replication Strategies for Data Gird
LI Jiong, LUO Guang-chun, DONG Shi
2007, 36(6): 1350-1353.
Abstract PDF