[1] |
DAI Rui, SONG Tian.
Self-Adaptive Pseudo-Random Sequence Hybrid Network Covert Channel Construction Method
[J]. Computer Engineering and Applications, 2021, 57(17): 122-129.
|
[2] |
ZHU Zhishen,LING Jie,LIN Peng.
Data Integrity Checking Technology of Industrial Control System Based on Covert Channel
[J]. Computer Engineering and Applications, 2020, 56(9): 125-130.
|
[3] |
YANG Haoyun, WANG Junfeng, LIU Jiayong, TANG Zhangguo.
Research and Implementation of Covert Channel of SSL Protocol
[J]. Computer Engineering and Applications, 2020, 56(20): 67-72.
|
[4] |
LIU Liwei1, SUN Jianzhi1, TAN Li1, YANG Bin2.
Research on Trusted Authentication Method of Network Device Based on IMC/IMV
[J]. Computer Engineering and Applications, 2019, 55(9): 79-86.
|
[5] |
YUAN Ying, ZHU Hongliang, CHEN Yuling, OUYANG Zhi, XIN Yang, YANG Yixian.
Survey of Data Integrity Verification Technology Based on Provable Data Possession
[J]. Computer Engineering and Applications, 2019, 55(18): 1-7.
|
[6] |
LI Hong, ZHU Xuan, LIU Yunfei, LI Junhui.
Improved TORA Protocol with Low Overhead and Load Balancing
[J]. Computer Engineering and Applications, 2019, 55(11): 67-73.
|
[7] |
WANG Tianqi, PANG Xiaoqiong, REN Mengqi.
Batch remote data integrity checking protocol with corrupted data location
[J]. Computer Engineering and Applications, 2018, 54(4): 90-97.
|
[8] |
ZHENG Fengbin1, ZHU Qing1, 2, ZANG Wenqian2.
Concurrent data flow model for remote sensing product driven by XML files
[J]. Computer Engineering and Applications, 2018, 54(24): 266-270.
|
[9] |
REN Mengqi, PANG Xiaoqiong, WANG Tianqi, NIE Mengfei.
Data integrity checking scheme with privacy protecting in multi-cloud storage
[J]. Computer Engineering and Applications, 2018, 54(22): 60-66.
|
[10] |
LI Wei, SONG Tian.
Covert channel applying to NAT environment
[J]. Computer Engineering and Applications, 2018, 54(17): 103-109.
|
[11] |
LV Xuezhi1,2, FAN Baoxin2, ZHAO Xinhui2, YIN Jian2, WANG Xianwen2, YAO Yao2.
Availability analysis of complex redundancy system based on discrete event simulation
[J]. Computer Engineering and Applications, 2018, 54(15): 255-261.
|
[12] |
SU Di, LIU Zhusong.
New type of Merkle Hash Tree for integrity audit scheme in cloud storage
[J]. Computer Engineering and Applications, 2018, 54(1): 70-76.
|
[13] |
CAO Lifeng1, LI Haihua2, DU Xuehui1, CHEN Xingyuan1.
Research on binding of secure label based on unified description of information object
[J]. Computer Engineering and Applications, 2017, 53(9): 103-110.
|
[14] |
JIA Zongpu, WANG Guanqiong, PENG Weiping, GUO Hairu.
Energy-saving privacy preserving aggregation scheme with integrity verification support
[J]. Computer Engineering and Applications, 2017, 53(5): 116-120.
|
[15] |
ZHAO Zhen1,2, MA Zongmin1, ZHANG Fu1, LIN Xiaoqing1.
Classification of fuzzy XML documents based on double hidden layer ELM
[J]. Computer Engineering and Applications, 2017, 53(4): 19-24.
|