supported by National Key R&D Program of China (Grant No. 2016YFB0800700);National Natural Science Foundation of China (Grant Nos. 61572460, 61272481);Open Project Program of State Key Laboratory of Information Security (Grant No. 2017-ZD-01);National Information Security Special Projects of National Development and Reform Commission of China (Grant No. (2012)1424);Programme of Introducing Talents of Discipline to Universities (111 Project) (Grant No. B16037)
Dear editor,We propose a new vulnerability risk assessment system,CVSS.PCA,for improving CVSS based on principal component analysis(PCA)[1].With the increasing number of security vulnerabilities,vulnerability risk mea...
supported by the National Key Research and Development Project of China (No.2016YFB0800703);the National Natural Science Foundation of China (No.61572460, No.61272481, No.61602361);the China Postdoctoral Science Foundation (No.2016M602776);the National Information Security Special Projects of National Development and Reform Commission of China (No.(2012)1424);the Open Project Program of the State Key Laboratory of Information Security (No.2017-ZD-01);the China 111 Project (No.B16037)
A lot of authenticated quantum dialogue protocols are springing up. Many of them have the problem of information leakage, or suffer from Man-In-TheMiddle attack. Some protocols can guarantee security, but have relativ...
supported by National Natural Science Foundation of China (Grant Nos. 61572460, 61272481, 61303239);Open Project Program of the State Key Laboratory of Information Security (Grant Nos. 2015-MS-06, 2015-MS04)
For an Android app tester,it is often needed to trigger the specific behaviors of an app.However,most of the existing Android GUI exploration tools only pursue high code coverage,rather than triggering the specific be...
supported by the National Natural Science Foundation of China(No.61572460,No.61272481);the National Key Research and Development Project(No.2016YFB0800703);Open Fund of Beijing Key Laboratory of IOT Information Security Technology(No.J6V0011104);the China Postdoctoral Science Foundation(No.2015M582622);the National Information Security Special Projects of National Development,the Reform Commission of China(No.(2012)1424);the China 111 Project(No.B16037)
Ciphertext policy attribute-based encryption(CP-ABE)is becoming a new primitive for finegrained access control.It neither produces multiple encrypted copies of the same data nor suffers from the severe burden of key d...
supported in part by National Information Security Special Projects of National Development and Reform Commission of China (Grant No. (2012)1424);National Natural Science Foundation of China (Grant Nos. 61572460, 61272481, 61303239);Open Project Program of the State Key Laboratory of Information Security (Grant No. 2015-MS-04)
Input validation vulnerabilities are common in Android apps, especially in inter-component communications. Malicious attacks can exploit this kind of vulnerability to bypass Android security mechanism and compromise t...
supported in part by National Natural Science Foundation of China(Grant Nos. 61301091, 61572460, 61272481);Open Foundation of State Key Laboratory of Information Security (Grant No. 2015-MS-14);New Star Team of Xi’an University of Posts and Telecommunications
Dear editor,Federal Communications Commission found that most of the allocated spectrum bands are not efficiently utilized by the licensed primary users(PU).In order to improve spectrum utilization,it has been sugge...
supported by the National Natural Science Foundation of China(No.61272481,No.61402434);China Post-doctoral Science Foundation Funded Project(No.2014M550085);the Open Fund of State Key Laboratory of Information Security(No.2014-12)
Key exchange protocols using both smart card and password are widely used nowadays since they provide greater convenience and stronger security than protocols using only a password.Most of these protocols are often li...
supported in part by the National Natural Science Foundation of China (61272481, 61572460, 61402352);the National Key Research and Development Project (2016YFB0800703);the National Information Security Special Projects of National Development;the Reform Commission of China [(2012)1424];China 111 Project (No. B16037)
As cloud computing is becoming prevalent, data owners are motivated to delegate complex data managements to the commercial cloud for economic savings. Sensitive data is usually encrypted before being uploaded to the c...