[1] |
BAO Zhenshan, WANG Kaixuan, ZHANG Wenbo.
A Practical Byzantine Fault Tolerance Consensus Algorithm Based on Tree Topological Network
[J]. Journal of Applied Sciences, 2020, 38(1): 34-50.
|
[2] |
QU Lingfeng, CHEN fan, HE Hongjie, YUAN yuan.
Security Analysis of Image Encryption Algorithm Based on Bit Plane-Pixel Block Scrambling
[J]. Journal of Applied Sciences, 2019, 37(5): 631-642.
|
[3] |
WAN Wu-nan, CHEN Hao, CHEN Jun, ZHANG Shi-bin.
Side Channel Security Analysis of Elliptic Curve Cryptography of Blockchain
[J]. Journal of Applied Sciences, 2019, 37(2): 203-212.
|
[4] |
LI Jing-xuan, XIANG Shi-jun.
Robust Watermarking of RGB Image Against Geometric Attacks
[J]. Journal of Applied Sciences, 2018, 36(2): 393-410.
|
[5] |
YANG Bin, CHEN Xian-yi, HU Wei-feng.
Blind Detection of Image Splicing Based on Shadow Model
[J]. Journal of Applied Sciences, 2016, 34(5): 564-574.
|
[6] |
ZHANG Bo-liang, ZHONG Wei-dong, YANG Xiao-yuan.
Differential Fault Analysis on Feistel Block Cipher in Internet of Things
[J]. Journal of Applied Sciences, 2016, 34(5): 547-554.
|
[7] |
WEI Yong-zhuang 1,2, SU Chong-mao1, MA Chun-bo1.
New Attacks on a Variant ARIA Cipher
[J]. Journal of Applied Sciences, 2013, 31(6): 650-655.
|
[8] |
LI Yun-fei1,2,3 , LIU Qing1, LI Tong1, HAO Lin3.
Cryptanalysis against an Improved RSA Algorithm
[J]. Journal of Applied Sciences, 2013, 31(6): 655-660.
|
[9] |
WANG Zhen-xing1, ZHANG Lian-cheng1, GUO Yi1, LI Shuo2.
Multi-flow Attack Resistance Based on Reordering of Watermark Bits
[J]. Journal of Applied Sciences, 2013, 31(3): 278-284.
|
[10] |
CHEN Zhong-qi, YU Lei, SUI Yong-hua, ZHOU Zhong-liang.
Real-Time Assisted Decision-Making in Air Fighter’s Penetration Attack
[J]. Journal of Applied Sciences, 2012, 30(5): 545-551.
|
[11] |
ZHONG Shang-qin1;2, LIU Fu-qiang3, XU Guo-sheng1;2, YANG Yu1;2, YAO Wen-bin1;2.
Finding Key Host of Network through Iterative Matrix
[J]. Journal of Applied Sciences, 2012, 30(4): 374-378.
|
[12] |
CAO Dong1;2, SONG Yao-liang1.
Multi-party Quantum Covert Communication with Entanglement Private-Keys
[J]. Journal of Applied Sciences, 2012, 30(1): 52-58.
|
[13] |
LIU Tian-hua1, ZHU Hong-feng1, PAN Jeng-shyang2.
Robust and Efficient Password-Authenticated Key Agreement Scheme Based on Elliptic Curve Cryptosystem
[J]. Journal of Applied Sciences, 2012, 30(1): 67-74.
|
[14] |
YANG Kai, MA Jian-feng, YANG Chao.
Novel Trusted Routing in Wireless Mesh Networks
[J]. Journal of Applied Sciences, 2011, 29(3): 221-227.
|
[15] |
LI Rui-jia, LI Rong-bing, LIU Jian-ye, MENG Bo.
Two-Step Fusion Algorithm for ADS/INS Angles of Attack on Transonic Flight
[J]. Journal of Applied Sciences, 2010, 28(1): 99-105.
|