| 论文题目 | 第一作者 | 发表年度 | 刊物/会议名称 |
|---|---|---|---|
| PEDA: Comprehensive Damage Assessment for Production Environment Server Systems | 贾晓启 | 2011 | IEEE Transactions on Information Forensics and Security |
| 安全协议:信息安全保障的灵魂--安全协议分析研究现状与发展趋势 | 薛锐 | 2011 | 中国科学院院刊 |
| Network Security, Administration and Management (Chapter 6: Key management) | 武传坤 | 2011 | |
| Visual Cryptography and Secret Image Sharing (Chapter 16: Resolve Alignment Problem in Visual Cryptography) | 刘峰 | 2011 | |
| 《中国密码学发展报告2010》(《视觉密码学研究进展》) | 刘峰 | 2011 | |
| Robust Visual Cryptography-based Watermarking Scheme for Multiple Cover Images and Multiple Owners | 刘峰 | 2011 | IET Information Security |
| CBCR: 采用循环移位的CBC MAC | 张立廷 | 2011 | 中国科学:信息科学 |
| 面向云存储的高效动态密文访问控制方法 | 洪澄 | 2011 | 通信学报 |
| A generic framework for constructing cross-realm C2C-PAKA protocols based on the smart card | 徐静 | 2011 | Concurrency and Computation: Practice and Experience |
| On the nonexistence of bent functions | 张寅 | 2011 | International Journal of Foudations of Computer Science |
| Fast algebraic attacks and decomposition of symmetric Boolean functions | 刘美成 | 2011 | IEEE Transaction on Information Theory |
| 云存储密文访问控制方案 | 吕志泉 | 2011 | 计算机科学与探索 |
| Improved multi-pass fast correlation attacks with applications | 张斌 | 2011 | SCIENCE CHINA Information Sciences |
| 三网融合下的信息安全问题 | 武传坤 | 2011 | 中国科学院院刊 |
| CBCR: CBC MAC with rotating transformations | 张立廷 | 2011 | SCIENCE CHINA Information Sciences |
| 多域环境下基于属性的授权委托模型 | 吴槟 | 2011 | 软件学报 |
| 对Bivium 流密码的变元猜测代数攻击 | 李昕 | 2011 | 电子学报 |
| 云计算数据安全支撑平台架构研究 | 张大鹏 | 2011 | 计算机研究与发展(增刊Ⅱ) |
| Video Steganalysis Exploiting Motion Vector Reversion-Based Features | 曹纭 | 2011 | IEEE Signal Processing Letters |
| 分布式短事务系统中提交协议的研究 | 付艳艳 | 2011 | 计算机科学 |
| 云存储环境下文件完整性验证方案的设计与实现 | 付艳艳 | 2011 | 通信学报增刊 |
| Provable secure authentication protocol with anonymity for roaming service in global mobility networks | 徐静 | 2011 | Computer Networks |
| An efficient mutual authentication and key agreement protocol preserving user anonymity in mobile networks | 徐静 | 2011 | Computer Communications |
| An efficient location-based compromise-tolerant key management scheme for sensor networks | 段美姣 | 2011 | Information Processing Letters |
| On EA-equivalence of certain permutations to power mappings | 李永强 | 2011 | Designs Codes and Cryptography |
| 时间相关密码协议逻辑及其形式化语义 | 雷新锋 | 2011 | 软件学报 |
| 一种基于恶意主体的通用公平交换协议 | 雷新锋 | 2011 | 解放军理工大学学报(自然科学版) |
| 基于多层次优化技术的XACML策略评估引擎 | 王雅哲 | 2011 | 软件学报 |
| Embedded Extended Visual Cryptography Schemes | 刘峰 | 2011 | IEEE Transactions on Information Forensics & Security |
| Cheating immune visual cryptography scheme | 刘峰 | 2011 | IET Information Security |