•  
  •  
 
Tsinghua Science and Technology

Volume 24, Issue 5 (2019)

Research Articles

PDF

WiSH: WiFi-Based Real-Time Human Detection
Tianmeng Hang, Yue Zheng, Kun Qian, Chenshu Wu, Zheng Yang, Xiancun Zhou, Yunhao Liu, and Guilin Chen

PDF

Specification and Verification of a Topology-Aware Access Control Model for Cyber-Physical Space
Yan Cao, Zhiqiu Huang, Shuanglong Kan, Dajuan Fan, and Yang Yang

PDF

Cloud Virtual Machine Lifecycle Security Framework Based on Trusted Computing
Xin Jin, Qixu Wang, Xiang Li, Xingshu Chen, and Wei Wang

PDF

Key-Recovery Attacks on LED-Like Block Ciphers
Linhong Xu, Jiansheng Guo, Jingyi Cui, and Mingming Li

PDF

Lattice-Based Double-Authentication-Preventing Ring Signature for Security and Privacy in Vehicular Ad-Hoc Networks
Jinhui Liu, Yong Yu, Jianwei Jia, Shijia Wang, Peiru Fan, Houzhen Wang, and Huanguo Zhang

PDF

SIV: A Structural Integrity Verification Approach of Cloud Components with Enhanced Privacy
Bo Zhao, Peiru Fan, Pengyuan Zhao, Mingtao Ni, and Jinhui Liu

PDF

Communication-Based Attacks Detection in Android Applications
Chuan Ma, Tao Wang, Limin Shen, Dongkui Liang, Shuping Chen, and Dianlong You

TST cover