网络空间安全学院
科学研究
科研成果
网络空间安全学院部分论文成果
作者:岳恒立  来源:网络空间安全学院  时间:2017-03-09  点击量:1368
作者
论文题目
期刊名称
论文级别
吴铤
Improvement of a chaotic maps-based three-party password-authenticated key exchange protocol without using server's public key and **art card
NONLINEAR DYNAMICS
SCI 2
吴铤
Improvement of a Uniqueness-and-Anonymity-Preserving User Authentication Scheme for Connected Health Care
JOURNAL OF MEDICAL SYSTEMS
SCI 4
徐明
An adaptive method to identify disk cluster size based on block content
DIGITAL INVESTIGATION
SCI 3
徐明
A metadata-based method for recovering files and file traces from YAFFS2
Digital Investigation
SCI 4
游林
A novel key sharing fuzzy vault scheme
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS
SCI 4
游林
A Key Distribution Scheme for WSN Based on Hash Chains and Deployment Knowledge
INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS
SCI 4
游林
A Key Sharing Fuzzy Vault Scheme
KSII Transactions on Internet and Information Systems
SCI 4
游林
Fast Scalar Multiplications on Hyperelliptic Curve Cryptosystems
FUNDAMENTA INFORMATICAE
SCI 4区、CCF C类期刊
胡耿然
随机非奇异Hermite标准型研究
数论期刊(JOURNAL OF NUMBER THEORY)
SCI 4区、CCF C类期刊
吴震东
High-dimension space projection-based biometric encryption for fingerprint with fuzzy minutia
Soft Computing
SCI 4区、CCF C类期刊
吴震东
A hierarchical face recognition algorithm based on humanoid nonlinear least-squares computation
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING
SCI 4
吴震东
A twice face recognition algorithm
SOFT COMPUTING
SCI 4
王秋华
Analysis of the information theoretically secret key agreement by public discussion
SECURITY AND COMMUNICATION NETWORKS
SCI 4区、CCF C类期刊
伍益明
Consensus of discrete-time multi-agent systems with adversaries and time delays
International Journal of General Systems
SCI 3
胡丽琴
The linear complexity of whiteman’s generalized cyclotomic sequences of period pm+1qn+1
IEEE Transactions on Information Theory
SCI 2
胡丽琴
Gauss periods and codebooks from generalized cyclotomic sets of order four
Design Codes and Cryptography
SCI 3
胡丽琴
Linear complexity of cyclotomic sequences of order six and BCH codes over GF(3)
Advances in Mathematics of Communications
SCI 4
游林
A Secure Finger Vein Recognition Algorithm Based on MB-GLBP and Logistic Mapping
JOURNAL OF INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING
EI期刊
吴国华
CHI Statistical Text Feature Selection Method Based on Information Entropy Optimization
International Journal of Database Theory and Application
EI期刊
吴国华
A Fingerprint Feature Extraction Algorithm based on Optimal Decision for Text Copy Detection
International Journal of Security and Its Applications
EI期刊
徐明
Microblogs Location Inferring Method based on Hybrid Language Model
Journal of Information Computational Science
EI期刊
徐明
Acquisiting Text Documents Opened by Notepad from Windows7 RAM Image
Journal of Computational Information Systems
EI期刊
徐明
Mining bursty topics from twitter text streams based on Labeled-LDA
Journal of Computational Information Systems
EI期刊
游林
A key distribution scheme for WSN based on deployment knowledge and dual-key pools
INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS
EI期刊
游林
Fast scalar multiplications on the curve v2 = up - Au - b over the finite field of characteristic p
FUNDAMENTA INFORMATICAE
EI期刊
王秋华
A New Information Reconciliation Protocol in Information Theoretically Secret Key Agreement
JOURNAL OF COMPUTATIONAL INFORMATION SYSTEMS
EI期刊
王秋华
A New Bit Pair Iteration Advantage Distillation/Degeneration Protocol in Information Theoretically Secret Key Agreement
JOURNAL OF COMPUTATIONAL INFORMATION SYSTEMS
EI期刊
徐明
A similarity metric method of obfuscated malware using function-call graph
Journal in Computer Virology
EI期刊
徐明
A Malware Variant Detection Method Based on Byte Randomness Test
JOURNAL OF COMPUTERS
EI期刊
游林
Characteristic polynomials of the curve v^2 = u^p-au-b over finite fields of characteristic p
FINITE FIELDS AND THEIR APPLICATIONS
EI期刊
任一支
Google hacking defence based on honey pages
INTERNATIONAL JOURNAL OF APPLIED MATHEMATICS AND STATISTICS
EI期刊
徐明
A JPEG Image Blind Forensics Method for Copy-Move Forging
INTERNATIONAL JOURNAL OF DIGITAL CONTENT TECHNOLOGY AND ITS APPLICATIONS
EI期刊
游林
Finger Vein Images Enhancement Method Based on Fuzzy Set and Oriented Filter
INTERNATIONAL JOURNAL OF DIGITAL CONTENT TECHNOLOGY AND ITS APPLICATIONS
EI期刊
游林
Low complexity of a class of normal bases over finite fields
FINITE FIELDS AND THEIR APPLICATIONS
EI期刊
游林
Computing the Characteristic Polynomials of a Class of Hyperelliptic Curves for Cryptographic Applications
MATHEMATICAL PROBLEMS IN ENGINEERING
EI期刊
游林
A cryptographic key binding method based on fingerprint features and the threshold scheme
INTERNAL JOURNAL OF ADVANCEMENTS IN COMPUTING SCIENCES
EI期刊
游林
An Improved WSQ Algorithm Based on Lifting Wavelet and Adaptive Run-length Encoding
INTERNATIONAL JOURNAL OF DIGITAL CONTENT TECHNOLOGY AND ITS APPLICATIONS
EI期刊
游林
Effective generalized equations of secure hyperelliptic curve digital signature algorithms
THE JOURNAL OF CHINA UNIVERSITIES OF POSTS AND TELECOMMUNICATIONS
EI期刊
吴国华
An Audio Watermark Method with Self-synchronization Based on Improved Counter-Propagation Neural Network
JOURNAL OF INFORMATION AND COMPUTATIONAL SCIENCE
EI期刊
游林
一类超椭圆曲线上的快速除子标量乘
电子学报
一级期刊
吴震东
无线传感器网络自适应并发多路由算法
电子学报
一级期刊
乔通
Steg****ysis of JSteg algorithm using
hypothesis testing theory
EURASIP Journal on Information Security
EI期刊
乔通
 基于局部能量方差特性的数字图像取证
模式识别与人
工智能
EI期刊
伍益明
通信时延下多智能体系统的安全一致性控制
控制理论与应用
EI期刊