•  
  •  
 
Tsinghua Science and Technology

Volume 21, Issue 3 (2016)

Research Articles

PDF

An Improved String-Searching Algorithm and Its Application in Component Security Testing
Jinfu Chen, Saihua Cai, Lili Zhu, Yuchi Guo, Rubing Huang, Xiaolei Zhao, and Yunqi Sheng

PDF

New Public-Key Cryptosystem Based on the Morphism of Polynomials Problem
Houzhen Wang, Huanguo Zhang, Shaowu Mao, Wanqing Wu, and Liqiang Zhang

PDF

An Anomalous Behavior Detection Model in Cloud Computing
Xiaoming Ye, Xingshu Chen, Haizhou Wang, Xuemei Zeng, Guolin Shao, Xueyuan Yin, and Chun Xu

PDF

Optimization of Key Predistribution Protocol Based on Supernetworks Theory in Heterogeneous WSN
Qi Yuan, Chunguang Ma, Xiaorui Zhong, Gang Du, and Jiansheng Yao

PDF

Cryptanalysis of Public Key Cryptosystems Based on Non-Abelian Factorization Problems
Jinhui Liu, Aiwan Fan, Jianwei Jia, Huanguo Zhang, Houzhen Wang, and Shaowu Mao

PDF

Test Data Generation for Stateful Network Protocol Fuzzing Using a Rule-Based State Machine
Rui Ma, Daguang Wang, Changzhen Hu, Wendong Ji, and Jingfeng Xue

TST cover