JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE) ›› 2012, Vol. 42 ›› Issue (5): 80-86.
• Articles • Previous Articles Next Articles
XU Long-qin1, LIU Shuang-yin1,2,3,4*
CLC Number:
[1] | WANG Lanzhong, MENG Wenjie. Video perceptual encryption algorithm in remote education receiver [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2015, 45(4): 40-44. |
[2] | WANG Danhui1, WANG An2*. The efficiency of power analysis attack based on S-boxes of block ciphers [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2014, 44(2): 6-11. |
[3] | YANG Jun-han1, CAO Tian-jie1,2. Passwordauthenticated key exchange protocol based on certificateless key encapsulation in the standard model [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2013, 43(2): 11-17. |
[4] | SUN Lan, LUO Zhao, WU Ying-jie, WANG Yi-lei. An algorithm for protecting location privacy in road network [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2012, 42(5): 96-101. |
[5] | HANG Guang-qing,KONG Fan-yu,LI Da-xing, . Efficient algorithm with resistance to simple power analysis on Koblitz curves [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2007, 37(3): 78-80 . |
[6] | YANG Chen,MA Wen-ping,WANG Xin-mei . Practical group signatures based on the knowledge signature [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2007, 37(1): 76-79 . |
[7] | LIU Yuan-xun,XU Qiu-liang,YUN Xiao-chun . Research on IDS-faced general-purpose application-level protocol identification technology [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2007, 37(1): 65-69 . |
|