Expanded versions of papers presented at the 7th International Conference on Frontier of Computer Science and Technology (FCST 2012).
- A data flow-oriented specification method for analysing network security configurations
- Intrusion detection method based on nonlinear correlation measure
- An efficient quantum anonymous communication with hybrid entanglement swapping
- Efficient constructions of certificate-based key encapsulation mechanism
- Efficient identity-based threshold signature scheme from bilinear pairings in standard model
- High-efficient quantum secret sharing with arrangements of lines on two-dimensional planes
- LIFE: a lightweight and flexible key management scheme for securely and pervasively file editing in mobile cloud computing
- Modelling, analysis and containment of passive worms in P2P networks
- Quantum states sharing in the relay system with teleportation of non-maximally entanglement
- The algorithm model for cumulative vulnerability risk assessment
No comments:
Post a Comment