Volume 11,Issue 10,2000 Table of Contents
Remarks on a Minimal Leak Proof ProtocolJIANG Shao-quan,FENG Deng-guo and QING Si-han2000,11(10):1283-1285 [Abstract(3207)] [View PDF(3786)196.43 K]Construction of Parallel Cryptographic SystemsQING Si-han2000,11(10):1286-1293 [Abstract(3119)] [View PDF(3774)457.32 K]Truncated Differential-Linear CryptanalysisHE Ye-ping,WU Wen-ling and QING Si-han2000,11(10):1294-1298 [Abstract(3507)] [View PDF(3785)317.08 K]Construction of S-Boxes with Some Cryptographic PropertiesLIU Xiao-chen and FENG Deng-guo2000,11(10):1299-1302 [Abstract(3750)] [View PDF(3726)250.29 K]An Elliptic Curve Signature Scheme and an Identity-Based Signature A greementYANG Jun-hui,DAI Zong-duo,YANG Dong-yi and LIU Hon g-wei2000,11(10):1303-1306 [Abstract(4422)] [View PDF(4885)249.96 K]Central Limit Theorem in Output-Sequences of Stop-and-Go GeneratorHUANG Xiao-ying and LI Shi-qu2000,11(10):1307-1311 [Abstract(3476)] [View PDF(3705)276.67 K]Distributed Model of Intrusion Detection System Based on AgentMA Heng-tai,JIANG Jian-chun,CHEN Wei-feng and QING Si-han2000,11(10):1312-1319 [Abstract(5730)] [View PDF(5480)572.60 K]Realizing Mandatory Access Control in Role-Based Security SystemLI Li-xin,CHEN Wei-min and HUANG Shang-lian2000,11(10):1320-1325 [Abstract(3513)] [View PDF(4040)421.53 K]Weaknesses of Some Threshold Group Signature SchemesWANG Gui-lin and QING Si-han2000,11(10):1326-1332 [Abstract(3824)] [View PDF(4495)439.80 K]A New Rabin Signature SchemeQIU Wei-dong,CHEN Ke-fei and BAI Ying-cai2000,11(10):1333-1337 [Abstract(3743)] [View PDF(3838)314.45 K]A New Non-Repudiation ProtocolQING Si-han2000,11(10):1338-1343 [Abstract(3452)] [View PDF(3751)325.87 K]Two-Party Shared RSA Key Against CheaterWANG Hong,XIAO Hong and XIAO Guo-zhen2000,11(10):1344-1347 [Abstract(3511)] [View PDF(4014)281.52 K]Model Checking Analysis of Needham-Schroeder Public-Key ProtocolZHANG Yu-qing,WANG Lei,XIAO Guo-zhen and WU Jian-ping2000,11(10):1348-1352 [Abstract(4442)] [View PDF(4723)323.86 K]Agent-BDI LogicHU Shan-li and HU Shan-li2000,11(10):1353-1360 [Abstract(3956)] [View PDF(4030)482.37 K]Automatic Recognition of On-Line Handwritten Chinese ShorthandCHEN Xiao-ping,YU Tie-cheng and DAI Ru-wei2000,11(10):1361-1367 [Abstract(3786)] [View PDF(4060)464.78 K]The Biarc Approximation of Planar NURBS Curve and Its OffsetWANG Guo-ping and SUN Jia-guang2000,11(10):1368-1374 [Abstract(4359)] [View PDF(4064)805.49 K]QoS Level-Based Bandwidth Split-Level AdaptationWAN Jun-wei and LU Xi-cheng2000,11(10):1375-1381 [Abstract(3289)] [View PDF(3731)476.06 K]A-ADL: an Architecture Description Language for Multi-Agent SystemsMA Jun-tao,FU Shao-yong and LIU Ji-ren2000,11(10):1382-1389 [Abstract(4068)] [View PDF(3938)548.87 K]Research on Dynamic Schema Modification in ORDBMSLI Hong-yan and LI Zhan-huai2000,11(10):1390-1396 [Abstract(3491)] [View PDF(3751)475.20 K]A Character Preclassification Method Based on Fuzzy Structure Analysi s of Typographical CharactersLU Da,XIE Ming-pei and PU Wei2000,11(10):1397-1404 [Abstract(4025)] [View PDF(4066)658.34 K]Interpolation Surface Based on Space-Mesh-Surface DistanceYIN Bao-cai,KONG De-hui and WU Si-ning2000,11(10):1405-1411 [Abstract(4070)] [View PDF(4725)724.52 K]Planar Dictionary Signature Method for Physical Optimization of Objec t-Oriented QueryWU Yan-ping and SHI Run-shen2000,11(10):1412-1419 [Abstract(3763)] [View PDF(3667)512.94 K]Control Method of Analogue in PLC Control System for Process of SulphonationLI Wen-bing and PEI Wei-dong2000,11(10):1420-1424 [Abstract(3988)] [View PDF(4105)298.00 K]