论文
    论文题目 第一作者 发表年度 刊物/会议名称
    PEDA: Comprehensive Damage Assessment for Production Environment Server Systems 贾晓启 2011 IEEE Transactions on Information Forensics and Security
    安全协议:信息安全保障的灵魂--安全协议分析研究现状与发展趋势 薛锐 2011 中国科学院院刊
    Network Security, Administration and Management (Chapter 6: Key management) 武传坤 2011
    Visual Cryptography and Secret Image Sharing (Chapter 16: Resolve Alignment Problem in Visual Cryptography) 刘峰 2011
    《中国密码学发展报告2010》(《视觉密码学研究进展》) 刘峰 2011
    Robust Visual Cryptography-based Watermarking Scheme for Multiple Cover Images and Multiple Owners 刘峰 2011 IET Information Security
    CBCR: 采用循环移位的CBC MAC 张立廷 2011 中国科学:信息科学
    面向云存储的高效动态密文访问控制方法 洪澄 2011 通信学报
    A generic framework for constructing cross-realm C2C-PAKA protocols based on the smart card 徐静 2011 Concurrency and Computation: Practice and Experience
    On the nonexistence of bent functions 张寅 2011 International Journal of Foudations of Computer Science
    Fast algebraic attacks and decomposition of symmetric Boolean functions 刘美成 2011 IEEE Transaction on Information Theory
    云存储密文访问控制方案 吕志泉 2011 计算机科学与探索
    Improved multi-pass fast correlation attacks with applications 张斌 2011 SCIENCE CHINA Information Sciences
    三网融合下的信息安全问题 武传坤 2011 中国科学院院刊
    CBCR: CBC MAC with rotating transformations 张立廷 2011 SCIENCE CHINA Information Sciences
    多域环境下基于属性的授权委托模型 吴槟 2011 软件学报
    对Bivium 流密码的变元猜测代数攻击 李昕 2011 电子学报
    云计算数据安全支撑平台架构研究 张大鹏 2011 计算机研究与发展(增刊Ⅱ)
    Video Steganalysis Exploiting Motion Vector Reversion-Based Features 曹纭 2011 IEEE Signal Processing Letters
    分布式短事务系统中提交协议的研究 付艳艳 2011 计算机科学
    云存储环境下文件完整性验证方案的设计与实现 付艳艳 2011 通信学报增刊
    Provable secure authentication protocol with anonymity for roaming service in global mobility networks 徐静 2011 Computer Networks
    An efficient mutual authentication and key agreement protocol preserving user anonymity in mobile networks 徐静 2011 Computer Communications
    An efficient location-based compromise-tolerant key management scheme for sensor networks 段美姣 2011 Information Processing Letters
    On EA-equivalence of certain permutations to power mappings 李永强 2011 Designs Codes and Cryptography
    时间相关密码协议逻辑及其形式化语义 雷新锋 2011 软件学报
    一种基于恶意主体的通用公平交换协议 雷新锋 2011 解放军理工大学学报(自然科学版)
    基于多层次优化技术的XACML策略评估引擎 王雅哲 2011 软件学报
    Embedded Extended Visual Cryptography Schemes 刘峰 2011 IEEE Transactions on Information Forensics & Security
    Cheating immune visual cryptography scheme 刘峰 2011 IET Information Security