Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
Full-Text Search:
Journal of Wuhan University(Natural Science Edition)
FQ: 双月
AD of Publication: 湖北省武汉市
Lanuage: 中文;
ISSN: 1671-8836
CN: 42-1674/N
YP: 1930
Url: 武汉大学
Recommended Journals
Journal of Wuhan University(Natural Science Edition)
2009 -01
Catalog
An Improved Cryptology Mechanism of Trusted Computing Platform ZHU Zhiqiang,YU Fajiang,ZHANG Huanguo,YAN Fei(School of Computer,Wuhan University/Key Laboratory of Aerospace Information Security and Trust Computing of Ministry of Education,Wuhan 430072,Hubei,China)
Compliant Testing Method of Trusted Cryptography Module LI Hao,FENG Dengguo,CHEN Xiaofeng(State Key Laboratory of Information Security/Institute of Software of Chinese Academy of Sciences,Bejing 100190,China)
Distributed Key Management for Ad Hoc Network ZHANG Yuchen,WANG Yadi,LIU Jing,MA Zitang,ZHOU Yanzhou,LI Xiao(Institute of Electronic Technology,Information Engineering University,Zhengzhou 450004,Henan,China)
An Automated Design Method for Key Assignment Protocol LI Song1,2,WANG Lina1,YU Rongwei1,KUANG Bo1(1.School of Computer,Wuhan University/Key Laboratory of Aerospace Information Security and Trust Computing of Ministry of Education,Wuhan 430072,Hubei,China;2.No.75742 PLA Troop,Guangzhou 510510,Guangdong,China)
Security Routing Algorithm for Wireless Mesh Network Based on Ant Colony WANG Chao,YING Zhongping,WANG Hailing,LIN Qiang(Key Laboratory of Special Fiber Optics and Optical Access Networks of Ministry of Education,Shanghai University,Shanghai 200072,China)
Research and Development of Architectural Level Fault-Tolerance Based on Redundant Multithreading YANG Hua,PAN Zhuojin,DONG Yanju,XIA Xiufeng(School of Computer,Shenyang Institute of Aeronautical Engineering,Shenyang 110136,Liaoning,China)
A Software/Hardware Cooperation EDAC Method against Bit-Flips of Memory HUANG Jianghong1,2,XIANG Yangxia3,ZHANG Lisheng1,XIE Yingke1,HAN Chengde1(1.Institute of Computing Technology,Chinese Academy of Sciences,Beijing 100190,China;2.Graduate University of the Chinese Academic of Sciences,Beijing 100049,China;3.Department of Information Engineering,Academy of Armored Forces Engineering,Beijing 100072,China)
Framework of Dynamic Remote Attestation Based on Policy and Virtual Machine Technology HU Jiafu,LI Lixin,ZHOU Yanzhou,LI Fulin(Institute of Electronic Technology,Information Engineering University,Zhengzhou 450004,Henan,China)
Trust Enhancement of General Personal Computer Based on Removable TPM TANG Weimin1,GAO Lan2,PENG Shuanghe1,HAN Zhen1,SHEN Changxiang3(1.College of Computer and Sciences,Beijing Jiaotong University,Beijing 100044,China;2.Equipment Research Institute of Second Artillery,Beijing 100085,China;3.College of Computer Sciences,Beijing University of Technology,Beijing 100022,China)
Remote Attestation Based on Batching CHANG Chaowen 1,2,XU Guoyu2,LIU Chen2,WANG Yuqiao2,QING Zheng1(1.School of Electronic and Information Engineering,Xi'an Jiaotong University,Xi'an 710071,Shaanxi,China;2.Institute of Electronic Technology,Information Engineering University,Zhengzhou 450004,Henan,China)
Design and Implementation of Archives Protection System Based on Trusted Environment ZHU Yaokai,REN Jiangchun,WANG Zhiying,MA Jun(School of Computer,National University of Defense Technology,Changsha 410073,Hunan,China)
Improvement about the Compatibility of TCG Software Stack LIU Yi,SHEN Changxiang(Institute of Electronic Technology,Information Engineering University,Zhengzhou 450004,Henan,China)
Security Analysis on ICBGCM Chaotic Image Encryption Algorithm GUO Jiansheng,SHEN Linzhang,ZHANG Feng(Institute of Electronic Technology,Information Engineering University,Zhengzhou 450004,Henan,China)
Image Steganography Scheme Based on Kerckhoffs' Principle YANG Xiaoyuan1,2,SU Guangwei1,ZHANG Minqing1(1.Key Laboratory of Network and Information Security of Armed Police Force,Xi'an 710086,Shaanxi,China;2.State Key Laboratory of Integrated Services Networks,Xidian University,Xi'an 710071,Shaanxi,China)
Cryptanalysis of Six-Round DES Using Evolutionary Algorithm SONG Jun1,2,ZHANG Huanguo1,WANG Lina1(1.School of Computer,Wuhan University,Wuhan 430072,Hubei,China;2.School of Computer,China University of Geosciences,Wuhan 430074,Hubei,China)
Digital Watermark Method Based on Non-Symmetry and Anti-Packing Pattern Representation Model CHEN Wenlüe1,HU Zhihua1,2(1.College of Mathematics and Information Sciences,Huanggang Normal University,Huanggang 438000,Hubei,China;2.School of Computer,Wuhan University,Wuhan 430072,Hubei,China)
Accurate Authentication Scheme of MPEG-4 Video Based on Hammming Code LIU Xinping,JIANG Hua(School of Computer and Control,Guilin University of Electronic Technology,Guilin 541004,Guangxi,China)
Adaptive Grey-Level Digital Watermarking Based on Human Visual Model JIANG Ming1,SUN Shuifa1,2,WANG Jingpei1,ZHENG Sheng1,2(1.College of Electrical Engineering and Information Technology,China Three Gorges University,Yichang 443002,Hubei,China;2.Institute of Intelligent Vision and Image Information,China Three Gorges University,Yichang 443002,Hubei,China)
Digital Watermarking Technique Applied to Wireless Sensor Networks DONG Xiaomei,ZHAO Fang,LI Xiaohua,YU Ge,SHEN Derong(School of Information Science and Engineering,Northeastern University,Shenyang 110004,Liaoning,China)
Trust Management Based on Certain Grid Computing XU Kaiyong,XU Ning(School of Electronics Technology,Information Engineering University,Zhengzhou 450004,Henan,China)
UCONF Model Construction and Analgsis Based on Fuzzy Integrated Control WANG Fengying,WANG Zhenyou,CHENG Zhen,GONG Xiugang (Institute of Computer,Shandong University of Technology,Zibo 255049,Shandong,China)
Distributed Trust Model Based on D-S Theory ZHANG Mingwu1,YANG Bo1,YU Yong2(1.College of Informatics,South China Agricultural University,Guangzhou 510642,Guangdong,China;2.School of Computer Science and Engineering,University of Electronic Science and Technology of China,Chengdu 610054,Sichuan,China)
Model of Uniform Authentication System Based on Trusted Computing Platform LI Fulin,LI Lixin,ZHOU Yanzhou,XU Ning(Institute of Electronic Technology,Information Engineering University,Zhengzhou 450004,Henan,China)
Proof of Supremum of Agent Number in Security Protocol Analysis LIU Feng1,LI Zhoujun1,2,ZHOU Ti1(1.School of Computer,National University of Defense Technology,Changsha 410073,Hunan,China;2.School of Computer Science and Engineering,Beihang University,Beijing 100083,China)
Flexible Pattern Matching Algorithm for Anti-Active-Jamming in Chinese String ZHOU Xueguang1,2,ZHANG Huanguo1(1.School of Computer,Wuhan University,Wuhan 430072,Hubei,China;2.College of Electronic Engineering,Naval University of Engineering,Wuhan 430033,Hubei,China)
Assessment of Network Security Policy Based on Security Capability TANG Chenghua,YU Shunzheng(Department of Electronics and Communication Engineering,Sun Yat-sen University,Guangzhou 510275,Guangdong,China)
Specific Service-Oriented Network Security Data Acquisition and Analysis ZHOU Renjie,WANG Huiqiang,LIANG Ying(College of Computer Science and Technology,Harbin Engineering University,Harbin 150001,Heilongjiang,China)
Model of Webpage Tamper-Proof System ZHANG Lei,WANG Lina,WANG Dejun(School of Computer,Wuhan University/Key Laboratory of Aerospace Information Security and Trust Computing of Ministry of Education,Wuhan 430072,Hubei,China)
Cluster-Based Key Pre-Distribution Scheme for Wireless Sensor Networks SHEN Jinbo,XU Li,ZHANG Meiping,ZHANG Yihui(Key Laboratory of Network Security and Cryptology,Fujian Normal University,Fuzhou 350007,Fujian,China)
2009 Issues:  [01] [02] [03] [04] [05] [06]
More Issues:   [1987]   [1988]   [1989]   [1990]   [1991]   [1992]   [1993]   [1994]   [1995]   [1996]   [1997]   [1998]   [1999]   [2000]   [2001]   [2002]   [2003]   [2004]   [2005]   [2006]   [2007]   [2008]   [2010]   [2011]   [2012]   [2013]   [2014]   [2015]   [2016]   [2017]   [2018]
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved