Volume 30,Issue 8,2019 Table of Contents

Other Issues:  
  
Contents

  • 面向自主安全可控的可信计算专题前言
  • 张焕国,贾春福,林璟锵
  • 2019,30(8):2227-2228 [Abstract(1818)]  [View PDF(2996)206.93 K]
  • Conflict Resolution Approach in Pattern-oriented Software Architectural Synthesis
  • XU Yong-Rui and LIANG Peng
  • 2019,30(8):2428-2452 [Abstract(2472)]  [View PDF(4827)779.44 K]
  • Test Method to Quality of Service Composition Based on Time-varying Petri Net
  • HAN Min, SUN Guo-Qing, ZHENG Dan-Chen and ZHOU Hui-Wei
  • 2019,30(8):2453-2469 [Abstract(1737)]  [View PDF(3359)1.76 M]
  • Ciphertext Sharing Scheme for the Public Cloud
  • LUO Wang-Ping, FENG Chao-Sheng, QIN Zhi-Guang, YUAN Ding, LIAO Juan-Ping and LIU Xia
  • 2019,30(8):2517-2527 [Abstract(1620)]  [View PDF(3935)972.93 K]
  • Balance of Energy and Delay Opportunistic Routing Protocol for Passive Sensing Network
  • GAO Hong-Chao, CHEN Xiao-Jiang, XU Dan, PENG Yao, TANG Zhan-Yong and FANG Ding-Yi
  • 2019,30(8):2528-2544 [Abstract(1882)]  [View PDF(3939)1.73 M]
  • Review Articles

  • Research on Malicious Code Evolution and Traceability Technology
  • SONG Wen-Na, PENG Guo-Jun, FU Jian-Ming, ZHANG Huan-Guo and CHEN Shi-Lü
  • 2019,30(8):2229-2267 [Abstract(5732)]  [View PDF(15580)3.77 M]
  • Special Issue's Articles

  • Real-time Trust Measurement of Software: Behavior Trust Analysis Approach Based on Noninterference
  • ZHANG Fan, XU Ming-Di, CHAO Han-Chieh, ZHANG Cong, LIU Xiao-Li and HU Fang-Ning
  • 2019,30(8):2268-2286 [Abstract(3702)]  [View PDF(7237)1.96 M]
  • TPM2.0 Key Migration-protocol Based on Duplication Authority
  • TAN Liang and SONG Min
  • 2019,30(8):2287-2313 [Abstract(3066)]  [View PDF(6010)3.33 M]
  • Distributed Trusted Network Connection Architecture Based on Blockchain
  • LIU Ming-Da, SHI Yi-Juan and CHEN Zuo-Ning
  • 2019,30(8):2314-2336 [Abstract(4981)]  [View PDF(10062)2.71 M]
  • Truncated Impossible Differential Cryptanalysis of Midori-64
  • LI Ming-Ming, GUO Jian-Sheng, CUI Jing-Yi and XU Lin-Hong
  • 2019,30(8):2337-2348 [Abstract(3363)]  [View PDF(5476)1.35 M]
  • Related-key Impossible Differential Attack on Piccolo
  • XU Lin-Hong, GUO Jian-Sheng, CUI Jing-Yi and LI Ming-Ming
  • 2019,30(8):2349-2361 [Abstract(3013)]  [View PDF(5209)1.39 M]
  • Verifiable Obfuscated Keyword Ciphertext Retrieval Scheme Based on Inverted Index
  • DU Rui-Zhong, LI Ming-Yue, TIAN Jun-Feng and WU Wan-Qing
  • 2019,30(8):2362-2374 [Abstract(3538)]  [View PDF(6728)1.77 M]
  • Insider Attacks Against Multi-factor Authentication Protocols for Wireless Sensor Networks
  • LI Wen-Ting, WANG Ding and WANG Ping
  • 2019,30(8):2375-2391 [Abstract(3751)]  [View PDF(6981)1.90 M]
  • General Side Channel Defense Schema of Motion Sensor Based on Laplace Mechanism
  • TANG Ben-Xiao, WANG Li-Na, WANG Run, ZHAO Lei and CHEN Qing-Song
  • 2019,30(8):2392-2414 [Abstract(3781)]  [View PDF(6548)2.49 M]
  • Adversarial Examples Generation Approach for Tendency Classification on Chinese Texts
  • WANG Wen-Qi, WANG Run, WANG Li-Na and Tang Ben-Xiao
  • 2019,30(8):2415-2427 [Abstract(4854)]  [View PDF(8909)1.67 M]
  • Review Articles

  • Survey on Key Issues in Networks Covert Channel
  • LI Yan-Feng, DING Li-Ping, WU Jing-Zheng, CUI Qiang, LIU Xue-Hua, GUAN Bei and WANG Yong-Ji
  • 2019,30(8):2470-2490 [Abstract(3786)]  [View PDF(9375)2.03 M]
  • Survey on Computation Offloading and Content Caching in Mobile Edge Networks
  • ZHANG Kai-Yuan, GUI Xiao-Lin, REN De-Wang, LI Jing, WU Jie and REN Dong-Sheng
  • 2019,30(8):2491-2516 [Abstract(4685)]  [View PDF(14593)2.70 M]
  • Survey on Shape Descriptors Based on Spectral Analysis for Non-rigid 3D Shape Matching
  • ZHANG Dan, WU Zhong-Ke, WANG Xing-Ce, Lü Chen-Lei, LIU Xiang-Yuan and ZHOU Ming-Quan
  • 2019,30(8):2545-2568 [Abstract(3565)]  [View PDF(8288)2.82 M]