Supported by the National Natural Science Foundation of China (60373087, 60473023).
Thirteen security requirements for an ideal password authentication scheme using smart cards are listed and a new smart card based password authentication scheme with identity anonymity is proposed. The new scheme can...
Supported by the National Natural Science Foundation of China (60373087, 60473023, 90104005, 60673071)
Permutation codes over finite chain rings are introduced; by using the character of the finite chain rings and the knowledge of representation of group, some conditions for existence or non-existence of self-dual perm...
the National Natural Science Foundation of China (Grant Nos. 69973034, 60373087, 60673071)
By some basic transforms and invariant theory, we give two results: 1) an algorithm, which can be used to judge if two Boolean functions are affinely equivalent and to obtain the equivalence relationship if they are...
Supported by the National Natural Science Foundation of China (90104005, 60373087, 60473023) and Network and Information Security Key Laboratory Program of Ministry of Education of China
This paper interprets the essence of XEN and hardware virtualization technology, which make the virtual machine technology become the focus of people's attention again because of its impressive performance. The secur...
Supported by the National Natural Science Foundation of China (60373087,60473023)
Internet voting protocols is the base of the Internet voting systems. In this paper a new practical Internet voting protocol is introduced. The proposed Internet voting protocol does not apply the strong physical assu...
Supported by the National Natural Science Foundation of China (90104005,60373087,60473023) and Key Laboratory of Geo-Informatics of State Bureau of Surveying and Mapping(200626)
Trusted platform model (TPM) is special-purpose integrated circuits (ICs) built into a variety of platforms to enable strong user authentication and machine attestation-essential to prevent inappropriate access to...