Volume 30,Issue 8,2019 Table of Contents
面向自主安全可控的可信计算专题前言张焕国,贾春福,林璟锵2019,30(8):2227-2228 [Abstract(1802)] [View PDF(2923)206.93 K]Conflict Resolution Approach in Pattern-oriented Software Architectural SynthesisXU Yong-Rui and LIANG Peng2019,30(8):2428-2452 [Abstract(2454)] [View PDF(4752)779.44 K]Test Method to Quality of Service Composition Based on Time-varying Petri NetHAN Min, SUN Guo-Qing, ZHENG Dan-Chen and ZHOU Hui-Wei2019,30(8):2453-2469 [Abstract(1726)] [View PDF(3301)1.76 M]Ciphertext Sharing Scheme for the Public CloudLUO Wang-Ping, FENG Chao-Sheng, QIN Zhi-Guang, YUAN Ding, LIAO Juan-Ping and LIU Xia2019,30(8):2517-2527 [Abstract(1617)] [View PDF(3870)972.93 K]Balance of Energy and Delay Opportunistic Routing Protocol for Passive Sensing NetworkGAO Hong-Chao, CHEN Xiao-Jiang, XU Dan, PENG Yao, TANG Zhan-Yong and FANG Ding-Yi2019,30(8):2528-2544 [Abstract(1874)] [View PDF(3873)1.73 M]
Research on Malicious Code Evolution and Traceability TechnologySONG Wen-Na, PENG Guo-Jun, FU Jian-Ming, ZHANG Huan-Guo and CHEN Shi-Lü2019,30(8):2229-2267 [Abstract(5708)] [View PDF(15128)3.77 M]
Real-time Trust Measurement of Software: Behavior Trust Analysis Approach Based on NoninterferenceZHANG Fan, XU Ming-Di, CHAO Han-Chieh, ZHANG Cong, LIU Xiao-Li and HU Fang-Ning2019,30(8):2268-2286 [Abstract(3676)] [View PDF(6695)1.96 M]TPM2.0 Key Migration-protocol Based on Duplication AuthorityTAN Liang and SONG Min2019,30(8):2287-2313 [Abstract(3055)] [View PDF(5571)3.33 M]Distributed Trusted Network Connection Architecture Based on BlockchainLIU Ming-Da, SHI Yi-Juan and CHEN Zuo-Ning2019,30(8):2314-2336 [Abstract(4942)] [View PDF(9599)2.71 M]Truncated Impossible Differential Cryptanalysis of Midori-64LI Ming-Ming, GUO Jian-Sheng, CUI Jing-Yi and XU Lin-Hong2019,30(8):2337-2348 [Abstract(3344)] [View PDF(5065)1.35 M]Related-key Impossible Differential Attack on PiccoloXU Lin-Hong, GUO Jian-Sheng, CUI Jing-Yi and LI Ming-Ming2019,30(8):2349-2361 [Abstract(2987)] [View PDF(4781)1.39 M]Verifiable Obfuscated Keyword Ciphertext Retrieval Scheme Based on Inverted IndexDU Rui-Zhong, LI Ming-Yue, TIAN Jun-Feng and WU Wan-Qing2019,30(8):2362-2374 [Abstract(3525)] [View PDF(6266)1.77 M]Insider Attacks Against Multi-factor Authentication Protocols for Wireless Sensor NetworksLI Wen-Ting, WANG Ding and WANG Ping2019,30(8):2375-2391 [Abstract(3735)] [View PDF(6526)1.90 M]General Side Channel Defense Schema of Motion Sensor Based on Laplace MechanismTANG Ben-Xiao, WANG Li-Na, WANG Run, ZHAO Lei and CHEN Qing-Song2019,30(8):2392-2414 [Abstract(3763)] [View PDF(6117)2.49 M]Adversarial Examples Generation Approach for Tendency Classification on Chinese TextsWANG Wen-Qi, WANG Run, WANG Li-Na and Tang Ben-Xiao2019,30(8):2415-2427 [Abstract(4842)] [View PDF(8465)1.67 M]
Survey on Key Issues in Networks Covert ChannelLI Yan-Feng, DING Li-Ping, WU Jing-Zheng, CUI Qiang, LIU Xue-Hua, GUAN Bei and WANG Yong-Ji2019,30(8):2470-2490 [Abstract(3748)] [View PDF(8922)2.03 M]Survey on Computation Offloading and Content Caching in Mobile Edge NetworksZHANG Kai-Yuan, GUI Xiao-Lin, REN De-Wang, LI Jing, WU Jie and REN Dong-Sheng2019,30(8):2491-2516 [Abstract(4640)] [View PDF(14176)2.70 M]Survey on Shape Descriptors Based on Spectral Analysis for Non-rigid 3D Shape MatchingZHANG Dan, WU Zhong-Ke, WANG Xing-Ce, Lü Chen-Lei, LIU Xiang-Yuan and ZHOU Ming-Quan2019,30(8):2545-2568 [Abstract(3544)] [View PDF(7807)2.82 M]