[1] |
CHEN Ning,HU An-feng.
Blind watermarking algorithm for color images based on wavelet transform and Fourier transform
[J]. Computer Engineering and Applications, 2010, 46(9): 88-91.
|
[2] |
XU Lu,ZHANG Hong-qi,DU Xue-hui,WANG Chao.
Application system-oriented mandatory access control model
[J]. Computer Engineering and Applications, 2010, 46(9): 107-110.
|
[3] |
SHEN Jun-wei1,YANG Xiao-yuan1,2,LIANG Zhong-yin1,CHEN Hai-bin1.
Security analysis and improvement of new certificateless proxy signature
[J]. Computer Engineering and Applications, 2010, 46(8): 96-98.
|
[4] |
LU Si-mei,ZHANG Jian-lin.
Improvement of SET protocol model and formal analysis via SMV
[J]. Computer Engineering and Applications, 2010, 46(8): 113-116.
|
[5] |
AN Xiao-ming1,WANG Xiao-ming1,2,WANG Qiao-ling1.
Role-based access control model with spatio-temporal constraint
[J]. Computer Engineering and Applications, 2010, 46(7): 89-92.
|
[6] |
LI Jie,WU Zhen-qiang,YU Lu,SUN Peng.
Design of enhanced wireless trusted network accessing attestation model and its protocols
[J]. Computer Engineering and Applications, 2010, 46(7): 121-124.
|
[7] |
ZHU Ying-min1,HUANG Sheng-ye1,FENG Hui-li2,YE Wu2.
Improved security mechanism for IEEE802.16e standard
[J]. Computer Engineering and Applications, 2010, 46(6): 103-106.
|
[8] |
WANG Shi-feng1,ZHANG Long-jun2,YANG Xiao-yuan1,3.
Internet key exchange protocol based on zero knowledge proof
[J]. Computer Engineering and Applications, 2010, 46(5): 73-75.
|
[9] |
ZHANG Tao,MU De-jun,REN Shuai,YAO Lei.
Risk assessment model of information security based on risk matrix
[J]. Computer Engineering and Applications, 2010, 46(5): 93-95.
|
[10] |
LIU Lian-hao,WEN Cong-jian.
Differential-algebraic attack on AES
[J]. Computer Engineering and Applications, 2010, 46(5): 111-113.
|
[11] |
GU Guo-sheng,ZHAN Yin-wei,HOU Wen-bang.
Fast image scrambling algorithm based on Contourlet transform
[J]. Computer Engineering and Applications, 2010, 46(4): 15-17.
|
[12] |
WANG Tao,WANG Li-bin,MA Chang-she.
Design and implementation of generic high efficient RFID authorization protocol model
[J]. Computer Engineering and Applications, 2010, 46(4): 72-75.
|
[13] |
LIU Su-nan1,2,FANG Zhi-hong1,LI Shu-zhi3.
Audio watermarking algorithm in complex cepstrum domain based on chaotic encrypting and repeatencode
[J]. Computer Engineering and Applications, 2010, 46(4): 79-82.
|
[14] |
LI Yue-qiang.
Transparent and robust audio watermarking algorithm based on DCT domain
[J]. Computer Engineering and Applications, 2010, 46(3): 84-86.
|
[15] |
MU Ya-li1,2,ZENG Hao3,YAO Hong2.
Role-task based controlled delegation model
[J]. Computer Engineering and Applications, 2010, 46(3): 87-89.
|