Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
Full-Text Search:
Journal of University of Chinese Academy of Science
FQ: 双月
AD of Publication: 北京市
Lanuage: 中文;英文;
ISSN: 2095-6134
CN: 10-1131/N
YP: 1984
Url: 中国科学院大学
Recommended Journals
Journal of University of Chinese Academy of Science
2001 -02
Catalog
Applications of Digital Signature in Network Communication Security Fan Hong (State Key Laboratory of Information Security,the Graduate School of the Chinese Academy of Sciences,Beijing 100039)
Several Methods of Constructing Partially-bent Functions Zhao Yaqun Li Shiqu Zhang Yanxiao (1 State Key Laboratory of Information Security,the Graduate School of the Chinese Academy of Sciemces,Beijing 100039; 2 Department of Information Research,Zhengzhou Information Engineering University,Zhengzhou 450002
DESIGN AND ANALYSIS OF A NEW GROUP OF (t_j, t, n) THRESHOLD GROUP- SIGNATURE SCHEME Shi Yi (State Key Laboratory of Information Security,Institute of Software,Chinese Academy of Sciences,Beijing 100080)
A NEW THRESHOLD SCHEME VIA PLBCKER COORDINATES Wang Mingsheng Feng Dengguo Wang Guilin (State Key Laboratory of Information Security,Institute of Software,Chinese Academy of Sciences,Beijing 100080)
An Intrusion Tolerant Services on Internet Jing Jiwu Zhou Tianyang (State Key Laboratory of Information Security,the Graduate School of the Chinese Academy of Sciences,Beijing 100039)
A Simple and Secure Threshold RSA Signature Scheme Wang Guilin Wang Mingsheng Qing Sihan Feng Dengguo (State Key Laboratory of Information Security,Institute of Software,Chinese Academy of Sciences; Engineering Research Center for Information Security Technology of the Chinese Academy of Sciences,Bei
Information Leakage of Feedback Network Sun Linhong Ye Dingfeng Lü Shuwang (State Key Laboratory of Information Security, the Graduate School of the Chinese Academy of Sciences,Beijing 100039)
A SECRET SHARING SCHEME BASED ON LINEAR TRANSFORMATION Wang Mingsheng Wang Guilin Feng Dengguo (State Key Laboratory of Information Security,Institute of Software,Chinese Academy of Sciences,Beijing 100080)
A New Kind of Digital Signature Algorithm Based on Factoring Fan Hong (State Key Laboratory of Information Security, the Graduate School of the Chinese Academy of Sciences,Beijing 100039)
Time-stamp Protocol with 10-digital Chen Kaiqu (State Key Laboratory of Information Security,Institute of Software,Chinese Academy of Sciences,Beijing 100080)
Password Attack and Password Protection Xiao Qing 1 Li Xiaojian 2 Jiang Jianchun 3 (1 Department of Information Guangxi Normal University,Guilin 541001; 2 Network Center Guangxi Normal University,Guilin 541004; 3 Engineering Research Center for Information Security Technology,Chinese Ac
Extracting Man-made Building from Sparse Laser Sample Points You Hongjian Li Shukai (Institute of Remote Sensing Applications, Chinese Academy of Sciences, Beijing 100101)
The Predictoin of the Absolute Configuration of Aliphatic Compound Yin Yuying Liu Chunyun (Department of Chemical Engineering,Beijing Institute of Petro-chemical Technology, Beijing 102600)
Managed Security Monitoring System Lian Yifeng Dai Yingxia Wang Hang (State Key Laboratorg of Information Semrity,The Graduate School of the Chinese Academy of Sciences,Beijing 100039)
Application of CA on Internet Banking Zhang Kai Jing Jiwu (State Key Lab of Information Security, the Graduat School of the Chinese Academy of Sciences ,Beijing 100039)
Square Attack on Reduced Camellia Cipher He Yeping Wu Wenling Qin Sihan (Engineering Research Center for Information Security Technology , Chinese Acadewy of Sciences, State Key Laboratory of Information Security,Institute of Software of the Chinese Academy of Sciences,Beijing 100080)
On E2 and Camellia Block Cipher Wu Wenling (State Key Laboratory of Information Security,Institute of Software , Chinese Academy of Sciences, Engineering Research Center of Information Security Technology , Chinese Academy of Sciences,Beijing 100080)
Elementary Discussion on Several Problems of the Elliptic Curve Cryptosystem Implementation Tang Liuying 1 Li Bao 2 (1 Engineering Research Center for Information Security Technology , Chinese Academy of Sciences,Beijing 100080; 2 Laboratory of Computer Science,Institute of Software , Chinese Academy of Sciences,Beijing 100080)
2001 Issues:  [01] [02]
More Issues:   [1990]   [1991]   [1992]   [1993]   [1994]   [1995]   [1996]   [1997]   [1998]   [1999]   [2000]   [2002]   [2003]   [2004]   [2005]   [2006]   [2007]   [2008]   [2009]   [2010]   [2011]   [2012]   [2013]   [2014]   [2015]   [2016]   [2017]
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved