Volume 30,Issue 8,2019 Table of Contents
面向自主安全可控的可信计算专题前言张焕国,贾春福,林璟锵2019,30(8):2227-2228 [Abstract(1818)] [View PDF(2996)206.93 K]Conflict Resolution Approach in Pattern-oriented Software Architectural SynthesisXU Yong-Rui and LIANG Peng2019,30(8):2428-2452 [Abstract(2472)] [View PDF(4827)779.44 K]Test Method to Quality of Service Composition Based on Time-varying Petri NetHAN Min, SUN Guo-Qing, ZHENG Dan-Chen and ZHOU Hui-Wei2019,30(8):2453-2469 [Abstract(1737)] [View PDF(3359)1.76 M]Ciphertext Sharing Scheme for the Public CloudLUO Wang-Ping, FENG Chao-Sheng, QIN Zhi-Guang, YUAN Ding, LIAO Juan-Ping and LIU Xia2019,30(8):2517-2527 [Abstract(1620)] [View PDF(3935)972.93 K]Balance of Energy and Delay Opportunistic Routing Protocol for Passive Sensing NetworkGAO Hong-Chao, CHEN Xiao-Jiang, XU Dan, PENG Yao, TANG Zhan-Yong and FANG Ding-Yi2019,30(8):2528-2544 [Abstract(1882)] [View PDF(3939)1.73 M]
Research on Malicious Code Evolution and Traceability TechnologySONG Wen-Na, PENG Guo-Jun, FU Jian-Ming, ZHANG Huan-Guo and CHEN Shi-Lü2019,30(8):2229-2267 [Abstract(5732)] [View PDF(15580)3.77 M]
Real-time Trust Measurement of Software: Behavior Trust Analysis Approach Based on NoninterferenceZHANG Fan, XU Ming-Di, CHAO Han-Chieh, ZHANG Cong, LIU Xiao-Li and HU Fang-Ning2019,30(8):2268-2286 [Abstract(3702)] [View PDF(7237)1.96 M]TPM2.0 Key Migration-protocol Based on Duplication AuthorityTAN Liang and SONG Min2019,30(8):2287-2313 [Abstract(3066)] [View PDF(6010)3.33 M]Distributed Trusted Network Connection Architecture Based on BlockchainLIU Ming-Da, SHI Yi-Juan and CHEN Zuo-Ning2019,30(8):2314-2336 [Abstract(4981)] [View PDF(10062)2.71 M]Truncated Impossible Differential Cryptanalysis of Midori-64LI Ming-Ming, GUO Jian-Sheng, CUI Jing-Yi and XU Lin-Hong2019,30(8):2337-2348 [Abstract(3363)] [View PDF(5476)1.35 M]Related-key Impossible Differential Attack on PiccoloXU Lin-Hong, GUO Jian-Sheng, CUI Jing-Yi and LI Ming-Ming2019,30(8):2349-2361 [Abstract(3013)] [View PDF(5209)1.39 M]Verifiable Obfuscated Keyword Ciphertext Retrieval Scheme Based on Inverted IndexDU Rui-Zhong, LI Ming-Yue, TIAN Jun-Feng and WU Wan-Qing2019,30(8):2362-2374 [Abstract(3538)] [View PDF(6728)1.77 M]Insider Attacks Against Multi-factor Authentication Protocols for Wireless Sensor NetworksLI Wen-Ting, WANG Ding and WANG Ping2019,30(8):2375-2391 [Abstract(3751)] [View PDF(6981)1.90 M]General Side Channel Defense Schema of Motion Sensor Based on Laplace MechanismTANG Ben-Xiao, WANG Li-Na, WANG Run, ZHAO Lei and CHEN Qing-Song2019,30(8):2392-2414 [Abstract(3781)] [View PDF(6548)2.49 M]Adversarial Examples Generation Approach for Tendency Classification on Chinese TextsWANG Wen-Qi, WANG Run, WANG Li-Na and Tang Ben-Xiao2019,30(8):2415-2427 [Abstract(4854)] [View PDF(8909)1.67 M]
Survey on Key Issues in Networks Covert ChannelLI Yan-Feng, DING Li-Ping, WU Jing-Zheng, CUI Qiang, LIU Xue-Hua, GUAN Bei and WANG Yong-Ji2019,30(8):2470-2490 [Abstract(3786)] [View PDF(9375)2.03 M]Survey on Computation Offloading and Content Caching in Mobile Edge NetworksZHANG Kai-Yuan, GUI Xiao-Lin, REN De-Wang, LI Jing, WU Jie and REN Dong-Sheng2019,30(8):2491-2516 [Abstract(4685)] [View PDF(14593)2.70 M]Survey on Shape Descriptors Based on Spectral Analysis for Non-rigid 3D Shape MatchingZHANG Dan, WU Zhong-Ke, WANG Xing-Ce, Lü Chen-Lei, LIU Xiang-Yuan and ZHOU Ming-Quan2019,30(8):2545-2568 [Abstract(3565)] [View PDF(8288)2.82 M]