
Volume 22, Issue 5 (2017)
Research Articles
A TrustEnclave-Based Architecture for Ensuring Run-Time Security in Embedded Terminals
Rui Chang, Liehui Jiang, Wenzhi Chen, Yaobin Xie, and Zhongyong Lu
Semi-valid Fuzz Testing Case Generation for Stateful Network Protocol
Rui Ma, Shuaimin Ren, Ke Ma, Changzhen Hu, and Jingfeng Xue
Trusted Attestation Architecture on an Infrastructure-as-a-Service
Xin Jin, Xingshu Chen, Cheng Zhao, and Dandan Zhao
Conflict Analysis and Detection Based on Model Checking for Spatial Access Control Policy
Aijuan Zhang, Cheng Ji, Yu Bao, and Xin Li
A Novel Video Reversible Data Hiding Algorithm Using Motion Vector for H.264/AVC
Ke Niu, Xiaoyuan Yang, and Yingnan Zhang
Evolutionary Cryptography Theory-Based Generating Method for Secure ECs
Chao Wang, Feng Hu, Huanguo Zhang, and Jie Wu
Simple Method for Realizing Weil Theorem in Secure ECC Generation
Feng Hu, Chao Wang, Huanguo Zhang, and Jie Wu
An Improved Space-Time Joint Anti-jamming Algorithm Based on Variable Step LMS
Dengao Li, Jinqiang Liu, Jumin Zhao, Gang Wu, and Xiaofang Zhao
Analysis of Specialized Production of Transaction Services Based on Essential Services Quantity
Li Wang, Yueting Chai, and Yi Liu
Campus Bus Network Design and Evaluation Based on the Route Property
Jishiyu Ding, Shuo Feng, Li Li, and Yi Zhang