•  
  •  
 
Tsinghua Science and Technology

Volume 23, Issue 5 (2018)

Research Articles

PDF

SecureWeb: Protecting Sensitive Information Through the Web Browser Extension with a Security Token
Shuang Liang, Yue Zhang, Bo Li, Xiaojie Guo, Chunfu Jia, and Zheli Liu

PDF

Efficient Feature Extraction Using Apache Spark for Network Behavior Anomaly Detection
Xiaoming Ye, Xingshu Chen, Dunhu Liu, Wenxian Wang, Li Yang, Gang Liang, and Guolin Shao

PDF

Revocable Hierarchical Identity-Based Broadcast Encryption
Dawei Li, Jianwei Liu, Zongyang Zhang, Qianhong Wu, and Weiran Liu

PDF

A Generic TC-Based Method to Find the Weakness in Different Phases of Masking Schemes
Ming Tang, Yuguang Li, Yanbin Li, Pengbo Wang, Dongyan Zhao, Weigao Chen, and Huanguo Zhang

PDF

Software System Evolution Analysis Method Based on Algebraic Topology
Chun Shan, Liyuan Liu, Jingfeng Xue, Changzhen Hu, and Hongjin Zhu

PDF

Secure Authentication Protocol for Mobile Payment
Kai Fan, Hui Li, Wei Jiang, Chengsheng Xiao, and Yintang Yang

PDF

Side-Channel Attacks in a Real Scenario
Ming Tang, Maixing Luo, Junfeng Zhou, Zhen Yang, Zhipeng Guo, Fei Yan, and Liang Liu

PDF

Secure Device Pairing via Handshake Detection
Zhenge Guo, Xueguang Gao, Qiang Ma, and Jizhong Zhao

TST cover