[1] |
MA Zhiying1,WANG Xiuyun2.
Research on Video Watermarking Based on
InterFrame Wavelet Transform
[J]. J4, 2010, 32(5): 143-146.
|
[2] |
YU Pengfei,WU Junjun,WANG Tongyang,ZHANG Xinfang.
Research on the Security Management of Portable Devices Based on the Smart Card Technology
[J]. J4, 2010, 32(4): 29-32.
|
[3] |
LI Zhen,YUE Houguang,CHEN Caixian.
Research and Implementation ofAccess Control in PLM Systems
[J]. J4, 2010, 32(4): 39-41.
|
[4] |
MING Deting,LI Juan,YANG Jun.
Research and Application on the Query Processing Against Encrypted XML Data
[J]. J4, 2010, 32(4): 142-145.
|
[5] |
Zuo Jing-Han, Cai Xuan-Dong.
A USB Storage Device Monitor and Control System Based on the WDF Filter Driver
[J]. J4, 2010, 32(3): 42-44.
|
[6] |
XING Han-Fa, XU Li-Lin.
Research on the Digital Estate Under the Integration Schema
[J]. J4, 2010, 32(3): 133-136.
|
[7] |
HAN Yuan-Beng.
A Signature Scheme with Message Recovery Based on Elliptic Curves
[J]. J4, 2010, 32(2): 58-59.
|
[8] |
LV Cheng-Min, MA Yu-Feng.
A Dual Spread Spectrum Blind Watermarking Algorithm Based on the Hybrid Transform Domain
[J]. J4, 2010, 32(1): 83-86.
|
[9] |
LIU Hui, CHENG Liang.
Design and Research of an OTP Authentication Mechanism Based on the STK Card
[J]. J4, 2010, 32(1): 18-20.
|
[10] |
SHANG Jian-Zhong, GU Hua-Jiang.
Research and Implementation of CA Security Authentication System(CASAS)
[J]. J4, 2010, 32(1): 29-31.
|
[11] |
.
An Image Encryption Scheme Based on the Keys Generated by Biological Features and the Rijndael Algorithm
[J]. J4, 2009, 31(12): 9-12.
|
[12] |
ZHANG Chao, WANG Cheng-Lin, GUO Jian-Qing.
Design of a Symmetric Image Encryption Scheme Based on Composite Chaotic Dynamics Systems
[J]. J4, 2009, 31(12): 27-30.
|
[13] |
.
[J]. J4, 2002, 24(6): 11-13.
|
[14] |
.
[J]. J4, 2002, 24(6): 14-17.
|