Volume 30,Issue 8,2019 Table of Contents

Other Issues:  
  
Contents

  • 面向自主安全可控的可信计算专题前言
  • 张焕国,贾春福,林璟锵
  • 2019,30(8):2227-2228 [Abstract(709)]  [View PDF(425)206.93 K]
  • Conflict Resolution Approach in Pattern-oriented Software Architectural Synthesis
  • XU Yong-Rui and LIANG Peng
  • 2019,30(8):2428-2452 [Abstract(1128)]  [View PDF(1535)779.44 K]
  • Test Method to Quality of Service Composition Based on Time-varying Petri Net
  • HAN Min, SUN Guo-Qing, ZHENG Dan-Chen and ZHOU Hui-Wei
  • 2019,30(8):2453-2469 [Abstract(673)]  [View PDF(417)1.76 M]
  • Ciphertext Sharing Scheme for the Public Cloud
  • LUO Wang-Ping, FENG Chao-Sheng, QIN Zhi-Guang, YUAN Ding, LIAO Juan-Ping and LIU Xia
  • 2019,30(8):2517-2527 [Abstract(697)]  [View PDF(460)972.93 K]
  • Balance of Energy and Delay Opportunistic Routing Protocol for Passive Sensing Network
  • GAO Hong-Chao, CHEN Xiao-Jiang, XU Dan, PENG Yao, TANG Zhan-Yong and FANG Ding-Yi
  • 2019,30(8):2528-2544 [Abstract(703)]  [View PDF(636)1.73 M]
  • Review Articles

  • Research on Malicious Code Evolution and Traceability Technology
  • SONG Wen-Na, PENG Guo-Jun, FU Jian-Ming, ZHANG Huan-Guo and CHEN Shi-Lü
  • 2019,30(8):2229-2267 [Abstract(2660)]  [View PDF(3704)3.77 M]
  • Special Issue's Articles

  • Real-time Trust Measurement of Software: Behavior Trust Analysis Approach Based on Noninterference
  • ZHANG Fan, XU Ming-Di, CHAO Han-Chieh, ZHANG Cong, LIU Xiao-Li and HU Fang-Ning
  • 2019,30(8):2268-2286 [Abstract(1866)]  [View PDF(1408)1.96 M]
  • TPM2.0 Key Migration-protocol Based on Duplication Authority
  • TAN Liang and SONG Min
  • 2019,30(8):2287-2313 [Abstract(1557)]  [View PDF(834)3.33 M]
  • Distributed Trusted Network Connection Architecture Based on Blockchain
  • LIU Ming-Da, SHI Yi-Juan and CHEN Zuo-Ning
  • 2019,30(8):2314-2336 [Abstract(2478)]  [View PDF(2223)2.71 M]
  • Truncated Impossible Differential Cryptanalysis of Midori-64
  • LI Ming-Ming, GUO Jian-Sheng, CUI Jing-Yi and XU Lin-Hong
  • 2019,30(8):2337-2348 [Abstract(1707)]  [View PDF(653)1.35 M]
  • Related-key Impossible Differential Attack on Piccolo
  • XU Lin-Hong, GUO Jian-Sheng, CUI Jing-Yi and LI Ming-Ming
  • 2019,30(8):2349-2361 [Abstract(1471)]  [View PDF(615)1.39 M]
  • Verifiable Obfuscated Keyword Ciphertext Retrieval Scheme Based on Inverted Index
  • DU Rui-Zhong, LI Ming-Yue, TIAN Jun-Feng and WU Wan-Qing
  • 2019,30(8):2362-2374 [Abstract(1707)]  [View PDF(691)1.77 M]
  • Insider Attacks Against Multi-factor Authentication Protocols for Wireless Sensor Networks
  • LI Wen-Ting, WANG Ding and WANG Ping
  • 2019,30(8):2375-2391 [Abstract(1811)]  [View PDF(1176)1.90 M]
  • General Side Channel Defense Schema of Motion Sensor Based on Laplace Mechanism
  • TANG Ben-Xiao, WANG Li-Na, WANG Run, ZHAO Lei and CHEN Qing-Song
  • 2019,30(8):2392-2414 [Abstract(1727)]  [View PDF(1652)2.49 M]
  • Adversarial Examples Generation Approach for Tendency Classification on Chinese Texts
  • WANG Wen-Qi, WANG Run, WANG Li-Na and Tang Ben-Xiao
  • 2019,30(8):2415-2427 [Abstract(2343)]  [View PDF(2326)1.67 M]
  • Review Articles

  • Survey on Key Issues in Networks Covert Channel
  • LI Yan-Feng, DING Li-Ping, WU Jing-Zheng, CUI Qiang, LIU Xue-Hua, GUAN Bei and WANG Yong-Ji
  • 2019,30(8):2470-2490 [Abstract(1448)]  [View PDF(1172)2.03 M]
  • Survey on Computation Offloading and Content Caching in Mobile Edge Networks
  • ZHANG Kai-Yuan, GUI Xiao-Lin, REN De-Wang, LI Jing, WU Jie and REN Dong-Sheng
  • 2019,30(8):2491-2516 [Abstract(1729)]  [View PDF(5111)2.70 M]
  • Survey on Shape Descriptors Based on Spectral Analysis for Non-rigid 3D Shape Matching
  • ZHANG Dan, WU Zhong-Ke, WANG Xing-Ce, Lü Chen-Lei, LIU Xiang-Yuan and ZHOU Ming-Quan
  • 2019,30(8):2545-2568 [Abstract(1563)]  [View PDF(1265)2.82 M]