Volume 11,Issue 10,2000 Table of Contents

Other Issues:  
  
Contents

  • Remarks on a Minimal Leak Proof Protocol
  • JIANG Shao-quan,FENG Deng-guo and QING Si-han
  • 2000,11(10):1283-1285 [Abstract(2208)]  [View PDF(2434)196.43 K]
  • Construction of Parallel Cryptographic Systems
  • QING Si-han
  • 2000,11(10):1286-1293 [Abstract(2097)]  [View PDF(2400)457.32 K]
  • Truncated Differential-Linear Cryptanalysis
  • HE Ye-ping,WU Wen-ling and QING Si-han
  • 2000,11(10):1294-1298 [Abstract(2525)]  [View PDF(2474)317.08 K]
  • Construction of S-Boxes with Some Cryptographic Properties
  • LIU Xiao-chen and FENG Deng-guo
  • 2000,11(10):1299-1302 [Abstract(2649)]  [View PDF(2380)250.29 K]
  • An Elliptic Curve Signature Scheme and an Identity-Based Signature A greement
  • YANG Jun-hui,DAI Zong-duo,YANG Dong-yi and LIU Hon g-wei
  • 2000,11(10):1303-1306 [Abstract(3020)]  [View PDF(3064)249.96 K]
  • Central Limit Theorem in Output-Sequences of Stop-and-Go Generator
  • HUANG Xiao-ying and LI Shi-qu
  • 2000,11(10):1307-1311 [Abstract(2440)]  [View PDF(2433)276.67 K]
  • Distributed Model of Intrusion Detection System Based on Agent
  • MA Heng-tai,JIANG Jian-chun,CHEN Wei-feng and QING Si-han
  • 2000,11(10):1312-1319 [Abstract(3949)]  [View PDF(3743)572.60 K]
  • Realizing Mandatory Access Control in Role-Based Security System
  • LI Li-xin,CHEN Wei-min and HUANG Shang-lian
  • 2000,11(10):1320-1325 [Abstract(2437)]  [View PDF(2647)421.53 K]
  • Weaknesses of Some Threshold Group Signature Schemes
  • WANG Gui-lin and QING Si-han
  • 2000,11(10):1326-1332 [Abstract(2573)]  [View PDF(2876)439.80 K]
  • A New Rabin Signature Scheme
  • QIU Wei-dong,CHEN Ke-fei and BAI Ying-cai
  • 2000,11(10):1333-1337 [Abstract(2758)]  [View PDF(2462)314.45 K]
  • A New Non-Repudiation Protocol
  • QING Si-han
  • 2000,11(10):1338-1343 [Abstract(2307)]  [View PDF(2317)325.87 K]
  • Two-Party Shared RSA Key Against Cheater
  • WANG Hong,XIAO Hong and XIAO Guo-zhen
  • 2000,11(10):1344-1347 [Abstract(2536)]  [View PDF(2607)281.52 K]
  • Model Checking Analysis of Needham-Schroeder Public-Key Protocol
  • ZHANG Yu-qing,WANG Lei,XIAO Guo-zhen and WU Jian-ping
  • 2000,11(10):1348-1352 [Abstract(3014)]  [View PDF(2904)323.86 K]
  • Agent-BDI Logic
  • HU Shan-li and HU Shan-li
  • 2000,11(10):1353-1360 [Abstract(2719)]  [View PDF(2535)482.37 K]
  • Automatic Recognition of On-Line Handwritten Chinese Shorthand
  • CHEN Xiao-ping,YU Tie-cheng and DAI Ru-wei
  • 2000,11(10):1361-1367 [Abstract(2702)]  [View PDF(2762)464.78 K]
  • The Biarc Approximation of Planar NURBS Curve and Its Offset
  • WANG Guo-ping and SUN Jia-guang
  • 2000,11(10):1368-1374 [Abstract(3243)]  [View PDF(2661)805.49 K]
  • QoS Level-Based Bandwidth Split-Level Adaptation
  • WAN Jun-wei and LU Xi-cheng
  • 2000,11(10):1375-1381 [Abstract(2366)]  [View PDF(2387)476.06 K]
  • A-ADL: an Architecture Description Language for Multi-Agent Systems
  • MA Jun-tao,FU Shao-yong and LIU Ji-ren
  • 2000,11(10):1382-1389 [Abstract(2955)]  [View PDF(2543)548.87 K]
  • Research on Dynamic Schema Modification in ORDBMS
  • LI Hong-yan and LI Zhan-huai
  • 2000,11(10):1390-1396 [Abstract(2498)]  [View PDF(2330)475.20 K]
  • A Character Preclassification Method Based on Fuzzy Structure Analysi s of Typographical Characters
  • LU Da,XIE Ming-pei and PU Wei
  • 2000,11(10):1397-1404 [Abstract(3007)]  [View PDF(2752)658.34 K]
  • Interpolation Surface Based on Space-Mesh-Surface Distance
  • YIN Bao-cai,KONG De-hui and WU Si-ning
  • 2000,11(10):1405-1411 [Abstract(2941)]  [View PDF(2745)724.52 K]
  • Planar Dictionary Signature Method for Physical Optimization of Objec t-Oriented Query
  • WU Yan-ping and SHI Run-shen
  • 2000,11(10):1412-1419 [Abstract(2722)]  [View PDF(2400)512.94 K]
  • Control Method of Analogue in PLC Control System for Process of Sulphonation
  • LI Wen-bing and PEI Wei-dong
  • 2000,11(10):1420-1424 [Abstract(2998)]  [View PDF(2847)298.00 K]