China Communications
NETWORK SECURITY
CRYPTOGRAPHY
- Quantum Polynomial-Time Fixed-Point Attack for RSA
- Quantum Key Distribution Network: Optimal Secret-Key- Aware Routing Method for Trust Relaying
- Collision Attacks against AEZ-PRF for Authenticated Encryption AEZ
- Automatic Search of Impossible Differentials and Zero-Correlation Linear Hulls for ARX Ciphers
- Cryptanalysis of a Cryptosystem with Non-Commutative Platform Groups
- Cost Sharing Based Truthful Spectrum Auction with Collusion-Proof
COMPUTER SYSTEM SECURITY
- Dynamic Integrity Measurement Model Based on vTPM
- A Trusted Attestation Mechanism for the Sensing Nodes of Internet of Things Based on Dynamic Trusted Measurement
- TPTVer: A Trusted Third Party Based Trusted Verifier for Multi-Layered Outsourced Big Data System in Cloud Environment
- Decentralized Attribute-Based Encryption and Data Sharing Scheme in Cloud Storage
- CAPT: Context-Aware Provenance Tracing for Attack Investigation
- Powermitter: Data Exfiltration from Air-Gapped Computer through Switching Power Supply
- An Integration Testing Framework and Evaluation Metric for Vulnerability Mining Methods
- A Cloud-Assisted Malware Detection and Suppression Framework for Wireless Multimedia System in IoT Based on Dynamic Differential Game