•  
  •  
 
Tsinghua Science and Technology

Volume 19, Issue 5 (2014)

Research Articles

PDF

An Improved ID-Based Group Key Agreement Protocol
Kangwen Hu, Jingfeng Xue, Changzhen Hu, Rui Ma, and Zhiqiang Li

PDF

Worst-Input Mutation Approach to Web Services Vulnerability Testing Based on SOAP Messages
Jinfu Chen, Huanhuan Wang, Dave Towey, Chengying Mao, Rubing Huang, and Yongzhao Zhan

PDF

A Class of the Hamming Weight Hierarchy of Linear Codes with Dimension 5
Guoxiang Hu, Huanguo Zhang, Lijun Wang, and Zhe Dong

PDF

Attribute-Based Encryption for Circuits on Lattices
Jian Zhao, Haiying Gao, and Junqi Zhang

PDF

Dynamic Measurement Protocol in Infrastructure as a Service
Shuang Xiang, Bo Zhao, An Yang, and Tao Wei

PDF

Targeted Fully Homomorphic Encryption Based on a Double Decryption Algorithm for Polynomials
Yatao Yang, Shuang Zhang, Junming Yang, Jia Li, and Zichen Li

PDF

Research and Practice of Dynamic Network Security Architecture for IaaS Platforms
Lin Chen, Xingshu Chen, Junfang Jiang, Xueyuan Yin, and Guolin Shao

PDF

Malicious Code Detection Model Based on Behavior Association
Lansheng Han, Mengxiao Qian, Xingbo Xu, Cai Fu, and Hamza Kwisaba

PDF

SwiftArray: Accelerating Queries on Multidimensional Arrays
Yifeng Geng, Xiaomeng Huang, and Guangwen Yang

TST cover