|
New Public Key Encryption with Equality Test Based on non-Abelian Factorization Problems |
|
|
Huijun Zhu
Licheng Wang
Shuming Qiu
Xinxin Niu
|
|
|
KSII Transactions on Internet and Information Systems, VOL 12 NO. 02 PP. 0764 ~ 0785 2018. 02 |
|
|
Feature Selection to Mine Joint Features from High-dimension Space for Android Malware Detection |
|
|
Yanping Xu
Chunhua Wu
Kangfeng Zheng
Xinxin Niu
Tianling Lu
|
|
|
KSII Transactions on Internet and Information Systems, VOL 11 NO. 09 PP. 4658 ~ 4679 2017. 09 |
|
|
Flow-based Anomaly Detection Using Access Behavior Profiling and Time-sequenced Relation Mining |
|
|
Weixin Liu
Kangfeng Zheng
Bin Wu
Chunhua Wu
Xinxin Niu
|
|
|
KSII Transactions on Internet and Information Systems, VOL 10 NO. 06 PP. 2781 ~ 2800 2016. 06 |
|
|
Defense Strategy of Network Security based on Dynamic Classification |
|
|
Jinxia Wei
Ru Zhang
Jianyi Liu
Xinxin Niu
Yixian Yang
|
|
|
KSII Transactions on Internet and Information Systems, VOL 09 NO. 12 PP. 5116 ~ 5134 2015. 12 |
|
|
A (k,t,n) verifiable multi-secret sharing scheme based on adversary structure |
|
|
Jing Li
Licheng Wang
Jianhua Yan
Xinxin Niu
Yixian Yang
|
|
|
KSII Transactions on Internet and Information Systems, VOL 08 NO. 12 PP. 4552 ~ 4567 2014. 12 |
|