Shen, Da; He, Di; Li, Wen-hua; Lin, Ying-pei An improved cyclostationary feature detection based on the selection of optimal parameter in cognitive radios. (English) Zbl 1325.94040 J. Shanghai Jiaotong Univ., Sci. 17, No. 1, 1-7 (2012). MSC: 94A12 × Cite Format Result Cite Review PDF Full Text: DOI
Fu, Xiaoling; Wang, Xiangfeng A relaxed-PPA contraction method for sparse signal recovery. (English) Zbl 1283.94015 J. Shanghai Jiaotong Univ., Sci. 17, No. 2, 141-146 (2012). MSC: 94A12 × Cite Format Result Cite Review PDF Full Text: DOI
Chien, Hung-Yu; Yeh, Ming-Kuei; Wu, Tzong-Chen; Lee, Chin-I Comments on enhanced yoking proof protocols for radio frequency identification tags and tag groups. (English) Zbl 1312.94112 J. Shanghai Jiaotong Univ., Sci. 16, No. 5, 604-609 (2011). MSC: 94A62 94A60 × Cite Format Result Cite Review PDF Full Text: DOI
Lo, Nai-wei; Yeh, Kuo-hui Simple three-party password authenticated key exchange protocol. (English) Zbl 1294.94097 J. Shanghai Jiaotong Univ., Sci. 16, No. 5, 600-603 (2011). MSC: 94A62 68M12 94A60 × Cite Format Result Cite Review PDF Full Text: DOI
Tso, Ray-lin; Cheonshik, Kim; Yi, Xun Certificateless message recovery signatures providing Girault’s level-3 security. (English) Zbl 1294.94082 J. Shanghai Jiaotong Univ., Sci. 16, No. 5, 577-585 (2011). MSC: 94A60 94A62 × Cite Format Result Cite Review PDF Full Text: DOI
Wan, Zhongmei; Meng, Xiangqin; Hong, Xuan Certificateless strong key-insulated signature without random oracles. (English) Zbl 1312.94097 J. Shanghai Jiaotong Univ., Sci. 16, No. 5, 571-576 (2011). MSC: 94A60 94A62 × Cite Format Result Cite Review PDF Full Text: DOI
Chen, Jian-hong; Long, Yu; Cheng, Ke-fei; Wang, Yong-tao Identity-based key-insulated proxy signature without random oracles. (English) Zbl 1294.94092 J. Shanghai Jiaotong Univ., Sci. 16, No. 5, 557-566 (2011). MSC: 94A62 94A60 × Cite Format Result Cite Review PDF Full Text: DOI
Shen, Zhonghua; Yu, Xiuyuan Threshold signature scheme with threshold verification based on multivariate linear polynomial. (English) Zbl 1312.94115 J. Shanghai Jiaotong Univ., Sci. 16, No. 5, 551-556 (2011). MSC: 94A62 × Cite Format Result Cite Review PDF Full Text: DOI
He, Guo-feng; Li, Xiang-xue; Lin, Qiang; Zheng, Dong Efficient democratic group signatures with threshold traceability. (English) Zbl 1294.94095 J. Shanghai Jiaotong Univ., Sci. 16, No. 5, 530-532 (2011). MSC: 94A62 68M11 × Cite Format Result Cite Review PDF Full Text: DOI
Qian, Jun-lei; Dong, Xiao-lei Fully secure revocable attribute-based encryption. (English) Zbl 1294.68076 J. Shanghai Jiaotong Univ., Sci. 16, No. 4, 490-496 (2011). MSC: 68P25 94A60 68U35 × Cite Format Result Cite Review PDF Full Text: DOI
Qin, Hua-wang; Zhu, Xiao-hua; Dai, Yue-wei Identity-based threshold decryption on access structure. (English) Zbl 1294.94099 J. Shanghai Jiaotong Univ., Sci. 16, No. 4, 485-489 (2011). MSC: 94A62 94A60 × Cite Format Result Cite Review PDF Full Text: DOI
Wang, Li-bin; Pan, Jia-xin; Ma, Chang-she Simple and efficient password-based authenticated key exchange protocol. (English) Zbl 1294.94100 J. Shanghai Jiaotong Univ., Sci. 16, No. 4, 459-465 (2011). MSC: 94A62 94A60 68M12 × Cite Format Result Cite Review PDF Full Text: DOI
Sun, Jin; Hu, Yu-pu; Zhang, Le-you Chosen ciphertext secure identity-based broadcast encryption in the standard model. (English) Zbl 1283.94083 J. Shanghai Jiaotong Univ., Sci. 16, No. 6, 672-676 (2011). MSC: 94A60 68P25 × Cite Format Result Cite Review PDF Full Text: DOI
Ming, Yang; Wang, Yu-min Directed proxy signature in the standard model. (English) Zbl 1283.94098 J. Shanghai Jiaotong Univ., Sci. 16, No. 6, 663-671 (2011). MSC: 94A62 94A60 × Cite Format Result Cite Review PDF Full Text: DOI
Chen, Jian-hong; Long, Yu; Chen, Ke-fei; Wang, Yong-tao; Li, Xiang-xue An efficient threshold key-insulated signature scheme. (English) Zbl 1283.94091 J. Shanghai Jiaotong Univ., Sci. 16, No. 6, 658-662 (2011). MSC: 94A62 94A60 × Cite Format Result Cite Review PDF Full Text: DOI
Lin, Yingpei; He, Chen; Jiang, Lingge; He, Di A selection scheme for optimum number of cooperative secondary users in spectrum sensing. (English) Zbl 1283.94019 J. Shanghai Jiaotong Univ., Sci. 16, No. 6, 652-657 (2011). MSC: 94A12 68M10 90B18 × Cite Format Result Cite Review PDF Full Text: DOI
Wan, Zhong-mei; Lai, Xue-jia; Weng, Jian; Liu, Sheng-li; Long, Yu; Hong, Xuan Strong key-insulated signature in the standard model. (English) Zbl 1218.94046 J. Shanghai Jiaotong Univ., Sci. 15, No. 6, 657-661 (2010). MSC: 94A62 × Cite Format Result Cite Review PDF Full Text: DOI
Fu, Zeng-Liang; Ye, Ming; Su, Yong-Lin; Lin, Yan-Ping; Wang, Cheng-Tao A novel active contour model for medical image segmentation. (English) Zbl 1216.92043 J. Shanghai Jiaotong Univ., Sci. 15, No. 5, 549-555 (2010). MSC: 92C55 94A08 × Cite Format Result Cite Review PDF Full Text: DOI
Lin, Cheng-yu; Qian, Liang; Zhang, Wen-jun; Xu, You-yun; Li, Hong-lie Optimal training design and placement for MIMO orthogonal frequency division multiplexing channel estimation. (English) Zbl 1218.94034 J. Shanghai Jiaotong Univ., Sci. 15, No. 1, 58-63 (2010). MSC: 94A40 × Cite Format Result Cite Review PDF Full Text: DOI
Ding, Ning; Gu, Da-Wu On sequential composition of precise zero-knowledge. (English) Zbl 1214.94043 J. Shanghai Jiaotong Univ., Sci. 15, No. 1, 43-48 (2010). MSC: 94A60 68P25 × Cite Format Result Cite Review PDF Full Text: DOI
Li, Qing-Liang; Ji, Xiao-Jun; Han, Tao; Shi, Wen-Kang Walsh threshold matched-filtering based anti-collision for surface acoustic wave tags. (English) Zbl 1202.94107 J. Shanghai Jiaotong Univ., Sci. 14, No. 6, 681-685 (2009). MSC: 94A11 42C40 93E11 × Cite Format Result Cite Review PDF Full Text: DOI
Yue, Wen-Jing; Zheng, Bao-Yu; Meng, Qing-Min Cyclostationary property based spectrum sensing algorithms for primary detection in cognitive radio systems. (English) Zbl 1202.94157 J. Shanghai Jiaotong Univ., Sci. 14, No. 6, 676-680 (2009). MSC: 94A13 × Cite Format Result Cite Review PDF Full Text: DOI
Geng, Xuan; Jiang, Ling-Ge; He, Chen Lattice-basis reduction precoding based on successive interference cancellation design for multiuser MIMO downlink system. (English) Zbl 1202.94170 J. Shanghai Jiaotong Univ., Sci. 14, No. 6, 664-667 (2009). MSC: 94A29 × Cite Format Result Cite Review PDF Full Text: DOI
Li, Zhi-Qiang; Huo, Hong; Fang, Tao; Zhu, Ju-Lian; Ge, Wei-Li Technique based on image pyramid and Bayes rule for noise reduction in unsupervised change detection. (English) Zbl 1202.94058 J. Shanghai Jiaotong Univ., Sci. 14, No. 6, 659-663 (2009). MSC: 94A08 94A13 × Cite Format Result Cite Review PDF Full Text: DOI
Yan, Zheng-Hang; Yang, Yu-Hang; Ma, Mao-De; Lu, Yi-Long Switching between antenna subset selection and quasi-orthogonal space-time block code in presence of correlation. (English) Zbl 1202.94164 J. Shanghai Jiaotong Univ., Sci. 14, No. 6, 651-658 (2009). MSC: 94A14 × Cite Format Result Cite Review PDF Full Text: DOI
Qian, Jun; Wang, Chen; Yang, Ming; Yang, Ru-Qing; Wang, Chun-Xiang Constrained submap algorithm for simultaneous localization and mapping. (English) Zbl 1202.94154 J. Shanghai Jiaotong Univ., Sci. 14, No. 5, 600-605 (2009). MSC: 94A13 93E10 93E11 × Cite Format Result Cite Review PDF Full Text: DOI
Ding, Ning; Gu, Da-Wu Precise zero-knowledge arguments with poly-logarithmic efficiency. (English) Zbl 1202.94180 J. Shanghai Jiaotong Univ., Sci. 14, No. 5, 584-589 (2009). MSC: 94A60 × Cite Format Result Cite Review PDF Full Text: DOI
Song, Hao-Hao; Zhang, Yan; Zou, Chun-Ming A semi-fragile wavelet transform watermarking scheme for content authentication of images. (English) Zbl 1202.94069 J. Shanghai Jiaotong Univ., Sci. 14, No. 5, 569-573 (2009). MSC: 94A08 94A11 94A62 65T60 × Cite Format Result Cite Review PDF Full Text: DOI
Luo, Yi-Yuan; Lai, Xue-Jia On the security of multivariate hash functions. (English) Zbl 1214.68153 J. Shanghai Jiaotong Univ., Sci. 14, No. 2, 219-222 (2009). MSC: 68P25 94A60 94A62 × Cite Format Result Cite Review PDF Full Text: DOI
Hang, Juan; She, Feng; Luo, Han-wen; Huang, Jian-guo Capacity and QoS based codebook construction for MIMO precoded spatial multiplexing systems with limited feedback. (English) Zbl 1218.94032 J. Shanghai Jiaotong Univ., Sci. 14, No. 2, 215-218 (2009). MSC: 94A40 × Cite Format Result Cite Review PDF Full Text: DOI
Xue, Yun-Feng; Wang, Yu-Jia; Yang, Jie An independent component analysis algorithm through solving gradient equation combined with kernel density estimation. (English) Zbl 1219.65016 J. Shanghai Jiaotong Univ., Sci. 14, No. 2, 204-209 (2009). MSC: 65C60 62H25 94A08 94A12 × Cite Format Result Cite Review PDF Full Text: DOI
Xiao, Jun-Fang; Zeng, Gui-Hua An improved ring signature scheme without trusted key generation center for wireless sensor network. (English) Zbl 1214.94070 J. Shanghai Jiaotong Univ., Sci. 14, No. 2, 189-194 (2009). MSC: 94A62 68M99 × Cite Format Result Cite Review PDF Full Text: DOI
Li, Hao; Xu, Chang-qing Robust optimization for the correlated MIMO downlink with imperfect channel state information. (English) Zbl 1218.94033 J. Shanghai Jiaotong Univ., Sci. 14, No. 2, 184-188 (2009). MSC: 94A40 × Cite Format Result Cite Review PDF Full Text: DOI
Dong, Ling; Chen, Ke-Fei; Lai, Xue-Jia Formal analysis of authentication in 802.11i. (English) Zbl 1214.94063 J. Shanghai Jiaotong Univ., Sci. 14, No. 1, 122-128 (2009). MSC: 94A62 68M12 × Cite Format Result Cite Review PDF Full Text: DOI
Huang, Zheng; Gong, Zheng; Li, Qiang Batch secret sharing for secure multi-party computation in asynchronous network. (English) Zbl 1214.94067 J. Shanghai Jiaotong Univ., Sci. 14, No. 1, 112-116 (2009). MSC: 94A62 × Cite Format Result Cite Review PDF Full Text: DOI
Hong, Xuan; Li, Xiang-Xue; Gong, Zheng; Chen, Ke-Fei A universal composability framework for analysis of proxy threshold signature. (English) Zbl 1214.94065 J. Shanghai Jiaotong Univ., Sci. 14, No. 1, 107-111 (2009). MSC: 94A62 × Cite Format Result Cite Review PDF Full Text: DOI
Long, Yu; Li, Xiang-Xue; Chen, Ke-Fei; Hong, Xuan Distributed certificateless key encapsulation mechanism secure against the adaptive adversary. (English) Zbl 1214.94069 J. Shanghai Jiaotong Univ., Sci. 14, No. 1, 102-106 (2009). MSC: 94A62 × Cite Format Result Cite Review PDF Full Text: DOI
Liu, Sheng-Li; Guo, Bao-An; Zhang, Qing-Sheng An identity-based encryption scheme with compact ciphertexts. (English) Zbl 1214.68152 J. Shanghai Jiaotong Univ., Sci. 14, No. 1, 86-89 (2009). MSC: 68P25 94A60 × Cite Format Result Cite Review PDF Full Text: DOI
Han, Wei; Zheng, Dong; Chen, Ke-Fei Some remarks on the TKIP key mixing function of IEEE 802.11i. (English) Zbl 1214.68070 J. Shanghai Jiaotong Univ., Sci. 14, No. 1, 81-85 (2009). MSC: 68M12 94A60 × Cite Format Result Cite Review PDF Full Text: DOI
Li, Lin-Chun; Li, Jian-Hua; Li, Sheng-Hong; Pan, Jun An authenticated group key distribution scheme for wireless sensor networks. (English) Zbl 1163.94432 J. Shanghai Jiaotong Univ., Sci. 14, No. 3, 354-358 (2009). MSC: 94A62 × Cite Format Result Cite Review PDF Full Text: DOI
Wang, Cheng; Ying, Ren-Dong; Yang, Yu-Hang Code-aided interference suppression in direct sequence spread spectrum systems with eigenvector sign spreading code. (English) Zbl 1163.94404 J. Shanghai Jiaotong Univ., Sci. 14, No. 3, 350-353 (2009). MSC: 94A12 × Cite Format Result Cite Review PDF Full Text: DOI
Jiang, Wei; Wang, Jia; Sun, Jun A rate-distortion based quantization level adjustment algorithm in block-based video compression. (English) Zbl 1163.94304 J. Shanghai Jiaotong Univ., Sci. 14, No. 3, 343-349 (2009). MSC: 94A08 × Cite Format Result Cite Review PDF Full Text: DOI
Gu, Bao-Jun; Zhou, Yi; Wang, Wei-Nong Batch RSA signature scheme. (English) Zbl 1163.94426 J. Shanghai Jiaotong Univ., Sci. 14, No. 3, 290-292 (2009). MSC: 94A60 × Cite Format Result Cite Review PDF Full Text: DOI
Yang, Rong-Qian; Cheng, Sheng; Chen, Ya-Zhu A two-step outlier removal procedure for surface reconstruction. (English) Zbl 1163.94308 J. Shanghai Jiaotong Univ., Sci. 14, No. 3, 266-272 (2009). MSC: 94A08 × Cite Format Result Cite Review PDF Full Text: DOI
Han, Wei; Zheng, Dong; Chen, Ke-Fei Filling the gap between voters and cryptography in e-voting. (English) Zbl 1163.94427 J. Shanghai Jiaotong Univ., Sci. 14, No. 3, 257-260 (2009). MSC: 94A60 × Cite Format Result Cite Review PDF Full Text: DOI
Li, Fa-Gen; Masaaki, Shirase; Tsuyoshi, Takagi Analysis and improvement of authenticatable ring signcryption scheme. (English) Zbl 1229.94047 J. Shanghai Jiaotong Univ., Sci. 13, No. 6, 679-683 (2008). MSC: 94A60 68P25 × Cite Format Result Cite Review PDF Full Text: DOI
Wang, Zhi-Wei; Zheng, Shi-Hui; Wang, Li-Cheng; Yang, Yi-Xian; Hu, Zheng-Ming Provably secure and efficient proxy signature with untrustworthy proxy signer. (English) Zbl 1229.94050 J. Shanghai Jiaotong Univ., Sci. 13, No. 6, 675-678 (2008). MSC: 94A60 68P25 × Cite Format Result Cite Review PDF Full Text: DOI
Da, Lin; Duo, Lei; Henricksen, Matt; Li, Chao A new black box analysis of hash functions based on block ciphers. (English) Zbl 1229.94042 J. Shanghai Jiaotong Univ., Sci. 13, No. 6, 664-669 (2008). MSC: 94A60 68P25 × Cite Format Result Cite Review PDF Full Text: DOI
Wang, Ming-Qiang; Qin, Jing A note on a provable secure encryption scheme. (English) Zbl 1229.94053 J. Shanghai Jiaotong Univ., Sci. 13, No. 6, 655-658 (2008). MSC: 94A62 × Cite Format Result Cite Review PDF Full Text: DOI
Zhang, Fan; Zhang, Jun-Liang; Shen, Xia-Jiong Binary image watermarking algorithm using matrix of complexity index. (English) Zbl 1229.94055 J. Shanghai Jiaotong Univ., Sci. 13, No. 6, 651-654 (2008). MSC: 94A62 94A08 × Cite Format Result Cite Review PDF Full Text: DOI
Fang, Li-Ming; Wang, Jian-Dong; Ren, Yong-Jun; Xia, Jin-Yue; Bian, Shi-Zhu Chosen ciphertext secure fuzzy identity based encryption without ROM. (English) Zbl 1229.94043 J. Shanghai Jiaotong Univ., Sci. 13, No. 6, 646-650 (2008). MSC: 94A60 × Cite Format Result Cite Review PDF Full Text: DOI
Zhang, Le-You; Hu, Yu-Pu; Mu, Ning-Bo Identity-based broadcast encryption with shorter transmissions. (English) Zbl 1229.94051 J. Shanghai Jiaotong Univ., Sci. 13, No. 6, 641-645 (2008). MSC: 94A60 × Cite Format Result Cite Review PDF Full Text: DOI
Zhang, Zong-yang; Dong, Xiao-lei; Cao, Zhen-fu Non-interactive and non-malleable commitment scheme based on \(q\)-one way group homomorphisms. (English) Zbl 1153.94445 J. Shanghai Jiaotong Univ., Sci. 13, No. 5, 574-578 (2008). MSC: 94A60 × Cite Format Result Cite Review PDF Full Text: DOI
Song, Xiao-yang; Chen, Ya-zhu; Zhang, Su; Yang, Wei Speckle reduction based on contourlet transform using scale adaptive threshold for medical ultrasound image. (English) Zbl 1153.94313 J. Shanghai Jiaotong Univ., Sci. 13, No. 5, 553-558 (2008). MSC: 94A08 92C55 × Cite Format Result Cite Review PDF Full Text: DOI
Li, Yu-tong; Zhou, Yue; Yang, Lei ICA based speckle filtering for target extraction in SAR images using adaptive space separation. (English) Zbl 1154.94317 J. Shanghai Jiaotong Univ., Sci. 13, No. 5, 528-532 (2008). MSC: 94A08 93E11 × Cite Format Result Cite Review PDF Full Text: DOI
Chen, Weiting; Wang, Zhizhong; Wang, Gang Measuring system regularity using fuzzy similarity-based approximate entropy. (English) Zbl 1155.94354 J. Shanghai Jiaotong Univ., Sci. 12, No. 5, 623-627 (2007). MSC: 94A17 × Cite Format Result Cite Review PDF
Tan, Shunyi; Chen, Wenyuan; Zhang, Weiping; Feng, Minhua; Li, Shengyong A new method to generate the complete set of unique signals for application in high consequence system. (English) Zbl 1155.94336 J. Shanghai Jiaotong Univ., Sci. 12, No. 2, 172-179 (2007). MSC: 94A12 × Cite Format Result Cite Review PDF
Liu, Lihua; Shen, Hao Cryptanalysis of one fair e-cash system. (English) Zbl 1119.94008 J. Shanghai Jiaotong Univ., Sci. E-11, No. 3, 389-393 (2006). MSC: 94A60 68P25 × Cite Format Result Cite Review PDF
Hou, Xiaoyun; Luo, Hanwen; Zheng, Baoyu; XU, Youyun; Song, Wentao A reduced complexity time-delay tracking and channel estimation for OFDM systems. (English) Zbl 1119.94305 J. Shanghai Jiaotong Univ., Sci. E-11, No. 3, 356-360 (2006). MSC: 94A40 94A13 × Cite Format Result Cite Review PDF
Yao, Jun; Zeng, Guihua A distributed authentication algorithm based on GQ signature for mobile ad hoc networks. (English) Zbl 1119.94013 J. Shanghai Jiaotong Univ., Sci. E-11, No. 3, 346-350 (2006). MSC: 94A62 94A60 × Cite Format Result Cite Review PDF
Li, Jie; Yang, Yuhang Differential space frequency mapping schemes and norm criterion. (English) Zbl 1119.94303 J. Shanghai Jiaotong Univ., Sci. E-11, No. 3, 328-334 (2006). MSC: 94A14 × Cite Format Result Cite Review PDF
Zhao, Yihong; Cheng, Guohua; Yu, Songyu A POCS-based algorithm for blocking artifacts reduction. (English) Zbl 1119.94301 J. Shanghai Jiaotong Univ., Sci. E-11, No. 3, 321-327 (2006). MSC: 94A08 × Cite Format Result Cite Review PDF
Zhao, Jian; Xie, Duan; Fan, Xunli An improved singularity computing algorithm based on wavelet transform modulus maxima method. (English) Zbl 1127.94333 J. Shanghai Jiaotong Univ., Sci. E-11, No. 3, 317-320, 327 (2006). MSC: 94A12 42C40 65T60 × Cite Format Result Cite Review PDF
Wang, Chao; Gu, Dawu; Zhu, Li Formalization of fault analysis and a new approach of fault detection. (English) Zbl 1119.94018 J. Shanghai Jiaotong Univ., Sci. E-11, No. 3, 301-306 (2006). MSC: 94C12 94A60 × Cite Format Result Cite Review PDF
Chai, Zhenchuan; Cao, Zhenfu; Lu, Rongxing An efficient provable secure ID-based proxy signature scheme based on CDH assumption. (English) Zbl 1119.94009 J. Shanghai Jiaotong Univ., Sci. E-11, No. 3, 271-278 (2006). MSC: 94A62 68P25 × Cite Format Result Cite Review PDF
Xiao, Gang; Jing, Zhongliang; Wu, Jianmin; Liu, Congyi Synthetically evaluation system for multi-source image fusion and experimental analysis. (English) Zbl 1117.68082 J. Shanghai Jiaotong Univ., Sci. E-11, No. 3, 263-270 (2006). Reviewer: Oscar Bustos (Córdoba) MSC: 68U10 94A08 × Cite Format Result Cite Review PDF
Xiang, Guangli; Zhu, Ping; Ma, Jie The homomorphic key agreement. (English) Zbl 1158.94390 J. Shanghai Jiaotong Univ., Sci. E-11, No. 4, 430-435 (2006). MSC: 94A60 × Cite Format Result Cite Review PDF
Zhang, Guowei; Shao, Shihuang; Zhang, Ying; Li, Haiying Research on modeling of genetic networks based on information measurement. (English) Zbl 1099.92027 J. Shanghai Jiaotong Univ., Sci. E-11, No. 2, 259-262 (2006). MSC: 92C40 94A17 92D10 92B05 × Cite Format Result Cite Review PDF
Han, Wei; Zhang, Longjun; Zheng, Dong; Chen, Kefei How to play E-lottery games via voting. (English) Zbl 1154.91362 J. Shanghai Jiaotong Univ., Sci. E-11, No. 2, 248-252 (2006). MSC: 91A60 94A62 × Cite Format Result Cite Review PDF
Yu, Jia; Kong, Fanyu; Li, Daxing An efficient forward secure signature scheme. (English) Zbl 1105.94331 J. Shanghai Jiaotong Univ., Sci. E-11, No. 2, 242-247 (2006). MSC: 94A62 68P25 11T71 × Cite Format Result Cite Review PDF
Yu, Jia; Kong, Fanyu; Li, Daxing Verifiable secret redistribution for proactive secret sharing schemes. (English) Zbl 1105.94330 J. Shanghai Jiaotong Univ., Sci. E-11, No. 2, 236-241 (2006). MSC: 94A62 11T71 × Cite Format Result Cite Review PDF
Li, Xiangxue; Chen, Kefei; Liu, Shengli; Li, Shiqun Verifiable encrypted signatures without random oracles. (English) Zbl 1105.94316 J. Shanghai Jiaotong Univ., Sci. E-11, No. 2, 230-235 (2006). MSC: 94A62 94A60 11T71 × Cite Format Result Cite Review PDF
Zheng, Yanfei; Li, Hui; Chen, Kefei Buffer overflow detection on binary code. (English) Zbl 1104.94008 J. Shanghai Jiaotong Univ., Sci. E-11, No. 2, 224-229 (2006). MSC: 94A29 05C90 × Cite Format Result Cite Review PDF
Liu, Shengli; Zheng, Dong; Cheng, Kefei Analysis of information leakage in quantum key agreement. (English) Zbl 1105.94319 J. Shanghai Jiaotong Univ., Sci. E-11, No. 2, 219-223 (2006). MSC: 94A62 94A60 81P68 × Cite Format Result Cite Review PDF
Zheng, Dong; Zheng, Yanfei; Fan, Wuying Ising spin-based error correcting private-key cryptosystems. (English) Zbl 1105.94311 J. Shanghai Jiaotong Univ., Sci. E-11, No. 2, 215-218 (2006). MSC: 94A60 82B20 94A62 × Cite Format Result Cite Review PDF
Lu, Rongxing; Cao, Zhenfu; Su, Renwang A self-encryption remote user anonymous authentication scheme using smart cards. (English) Zbl 1105.94322 J. Shanghai Jiaotong Univ., Sci. E-11, No. 2, 210-214 (2006). MSC: 94A62 11T71 94A60 × Cite Format Result Cite Review PDF
Lu, Rongxing; Cao, Zhenfu; Su, Renwang; Chai, Zhenchuan An ID-based authenticated key agreement protocol for peer-to-peer computing. (English) Zbl 1105.94323 J. Shanghai Jiaotong Univ., Sci. E-11, No. 2, 205-209 (2006). MSC: 94A62 20F10 11T71 03B70 × Cite Format Result Cite Review PDF
Wang, Licheng; Cao, Zhenfu; Cao, Feng; Qian, Haifeng The braid-based bit commitment protocol. (English) Zbl 1129.94308 J. Shanghai Jiaotong Univ., Sci. E-11, No. 2, 200-204 (2006). MSC: 94A60 × Cite Format Result Cite Review PDF
Dong, Xiaolei; Lu, Rongxing; Cao, Zhenfu Proofs of security for improved Rabin signature scheme. (English) Zbl 1105.94011 J. Shanghai Jiaotong Univ., Sci. E-11, No. 2, 197-199 (2006). MSC: 94A62 94A60 11T71 × Cite Format Result Cite Review PDF
Lin, Renhung; Jan, Jinnke A secure session key distribution scheme for group communications. (English) Zbl 1105.94318 J. Shanghai Jiaotong Univ., Sci. E-11, No. 2, 192-196 (2006). MSC: 94A62 68P25 × Cite Format Result Cite Review PDF
Ji, Xiaojun; Tian, Chang; Zhang, Yusen Recovery from wormhole attack in mobile ad hoc network (MANET). (English) Zbl 1154.94402 J. Shanghai Jiaotong Univ., Sci. E-11, No. 2, 188-191 (2006). MSC: 94A60 × Cite Format Result Cite Review PDF
Xu, Chunxiang; Ma, Hua; Zhou, Junhui; Xiao, Guozheng A group oriented cryptosystem for the vector space access structure. (English) Zbl 1105.94310 J. Shanghai Jiaotong Univ., Sci. E-11, No. 2, 184-187 (2006). MSC: 94A60 68P25 11T71 × Cite Format Result Cite Review PDF
Liu, Duo; Luo, Ping; Dai, Yiqi A heuristic method of scalar multiplication of elliptic curve over OEF. (English) Zbl 1104.94029 J. Shanghai Jiaotong Univ., Sci. E-11, No. 2, 177-183 (2006). MSC: 94A60 14G50 14Q05 68Q25 × Cite Format Result Cite Review PDF
Liu, Bin; Luo, Xiangyang; Liu, Fenlin A perturbing scheme of digital chaos. (English) Zbl 1105.94307 J. Shanghai Jiaotong Univ., Sci. E-11, No. 2, 172-176 (2006). MSC: 94A60 65C10 × Cite Format Result Cite Review PDF
Luo, Hao; Fang, Binxing; Yun, Xiaochun The anomaly detection in SMTP traffic based on leaky integrate-and-fire model. (English) Zbl 1154.94341 J. Shanghai Jiaotong Univ., Sci. E-11, No. 2, 165-171 (2006). MSC: 94A13 × Cite Format Result Cite Review PDF
Fan, Yan; Shi, Zhiguo; Ran, Lixin; Chen, Kangshen A secret sharing featuring secure communication system based on dual synchronization of chaos in Colpitts circuits. (English) Zbl 1105.94007 J. Shanghai Jiaotong Univ., Sci. E-11, No. 2, 158-164 (2006). MSC: 94A60 94A62 94C05 94A40 × Cite Format Result Cite Review PDF
Li, Fagen; Gao, Juntao; Liu, Shuanggen; Hu, Yupu Key management using certificate-based cryptosystem in ad hoc networks. (English) Zbl 1105.94313 J. Shanghai Jiaotong Univ., Sci. E-11, No. 2, 152-157 (2006). MSC: 94A62 68P30 11T71 68M10 × Cite Format Result Cite Review PDF Full Text: DOI
Wang, Zhangyi; Zhang, Huanguo; Qin, Zhongping; Meng, Qingshu A fast attack algorithm on the MD5 hash function. (English) Zbl 1105.94309 J. Shanghai Jiaotong Univ., Sci. E-11, No. 2, 140-145 (2006). MSC: 94A60 68P25 × Cite Format Result Cite Review PDF
Wu, Zhijun; Duan, Haixin; Li, Xing An approach to hide secret speech information. (English) Zbl 1138.94375 J. Shanghai Jiaotong Univ., Sci. E-11, No. 2, 134-139 (2006). MSC: 94A60 94A05 × Cite Format Result Cite Review PDF
Long, Yu; Chen, Kefei; Liu, Shengli ID-based threshold decryption secure against chosen plaintext attack. (English) Zbl 1105.94320 J. Shanghai Jiaotong Univ., Sci. E-11, No. 2, 127-133 (2006). MSC: 94A62 94A60 × Cite Format Result Cite Review PDF
Liao, Jian; Qin, Yinghao; Huang, Peiwei Improved ID-based signature scheme solving key escrow. (English) Zbl 1105.94317 J. Shanghai Jiaotong Univ., Sci. E-11, No. 2, 121-126 (2006). MSC: 94A62 94A60 11T71 × Cite Format Result Cite Review PDF
Zhang, Ruishan; Li, Qiang; Chen, Kefei A provably secure asynchronous proactive RSA scheme. (Chinese. English summary) Zbl 1100.94024 J. Shanghai Jiaotong Univ., Sci. E-10, No. 4, 333-337 (2005). MSC: 94A62 94A60 11T71 × Cite Format Result Cite Review PDF