Pub Date : 2014-03-18DOI: 10.3724/SP.J.1016.2013.01337
T. Luo, Ming Zhao, Jingye Li, Guangxin Yue, Xiaojun Wang
{"title":"MAC Protocols in Cognitive Radio Ad Hoc Networks: MAC Protocols in Cognitive Radio Ad Hoc Networks","authors":"T. Luo, Ming Zhao, Jingye Li, Guangxin Yue, Xiaojun Wang","doi":"10.3724/SP.J.1016.2013.01337","DOIUrl":"https://doi.org/10.3724/SP.J.1016.2013.01337","url":null,"abstract":"","PeriodicalId":35776,"journal":{"name":"计算机学报","volume":"36 1","pages":"1337-1348"},"PeriodicalIF":0.0,"publicationDate":"2014-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70040708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Snippet Retrieval Strategy Based on Element Weighting Model: A Snippet Retrieval Strategy Based on Element Weighting Model","authors":"Dexi Liu, Changxuan Wan, X. Liu, Minjuan Zhong, Tengjiao Jiang","doi":"10.3724/SP.J.1016.2013.01729","DOIUrl":"https://doi.org/10.3724/SP.J.1016.2013.01729","url":null,"abstract":"","PeriodicalId":35776,"journal":{"name":"计算机学报","volume":"43 1","pages":"1729-1744"},"PeriodicalIF":0.0,"publicationDate":"2014-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70061590","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-03-17DOI: 10.3724/SP.J.1016.2013.01194
Rui Li, Yaping Lin, Yeqing Yi, Yu-peng Hu
{"title":"A Privacy and Integrity Preserving Range Query Protocol in Two-Tiered Sensor Networks: A Privacy and Integrity Preserving Range Query Protocol in Two-Tiered Sensor Networks","authors":"Rui Li, Yaping Lin, Yeqing Yi, Yu-peng Hu","doi":"10.3724/SP.J.1016.2013.01194","DOIUrl":"https://doi.org/10.3724/SP.J.1016.2013.01194","url":null,"abstract":"","PeriodicalId":35776,"journal":{"name":"计算机学报","volume":"36 1","pages":"1194-1209"},"PeriodicalIF":0.0,"publicationDate":"2014-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70040684","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-03-17DOI: 10.3724/SP.J.1016.2013.01177
Xunyun Nie, Zhaohu Xu, Yong-jian Liao, Ting Zhong
{"title":"Cryptanalysis of Extended Multivariate Public Key Cryptosystem: Cryptanalysis of Extended Multivariate Public Key Cryptosystem","authors":"Xunyun Nie, Zhaohu Xu, Yong-jian Liao, Ting Zhong","doi":"10.3724/SP.J.1016.2013.01177","DOIUrl":"https://doi.org/10.3724/SP.J.1016.2013.01177","url":null,"abstract":"","PeriodicalId":35776,"journal":{"name":"计算机学报","volume":"36 1","pages":"1177-1182"},"PeriodicalIF":0.0,"publicationDate":"2014-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70040609","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-03-17DOI: 10.3724/SP.J.1016.2013.01168
Song Li, Yongfeng Huang, Jianjun Lu
{"title":"Detection of QIM Steganography in Low Bit-Rate Speech Codec Based on Statistical Models and SVM: Detection of QIM Steganography in Low Bit-Rate Speech Codec Based on Statistical Models and SVM","authors":"Song Li, Yongfeng Huang, Jianjun Lu","doi":"10.3724/SP.J.1016.2013.01168","DOIUrl":"https://doi.org/10.3724/SP.J.1016.2013.01168","url":null,"abstract":"","PeriodicalId":35776,"journal":{"name":"计算机学报","volume":"36 1","pages":"1168-1176"},"PeriodicalIF":0.0,"publicationDate":"2014-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70040546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-03-17DOI: 10.3724/SP.J.1016.2013.01139
Gong Zheng, Liu Shusheng, Wen Yamin, Tang Shaohua
Due to its excellent hardware performance and elegant design,the lightweight block cipher PRESENT attracts widely attention from both industry and academy society.In this paper,we present a new Biclique cryptanalysis on 21-round PRESENT,which can recover secret key with 278.9 time complexity and 264 chosen ciphertexts.Moreover,our Biclique attack can be extended to PRESENT-128 and the compression function of DM-PRESENT with the same rounds.Compared with the published results,our new Biclique analysis has the advantage on its memory complexity.
{"title":"Biclique Analysis on the Reduced-Round PRESENT","authors":"Gong Zheng, Liu Shusheng, Wen Yamin, Tang Shaohua","doi":"10.3724/SP.J.1016.2013.01139","DOIUrl":"https://doi.org/10.3724/SP.J.1016.2013.01139","url":null,"abstract":"Due to its excellent hardware performance and elegant design,the lightweight block cipher PRESENT attracts widely attention from both industry and academy society.In this paper,we present a new Biclique cryptanalysis on 21-round PRESENT,which can recover secret key with 278.9 time complexity and 264 chosen ciphertexts.Moreover,our Biclique attack can be extended to PRESENT-128 and the compression function of DM-PRESENT with the same rounds.Compared with the published results,our new Biclique analysis has the advantage on its memory complexity.","PeriodicalId":35776,"journal":{"name":"计算机学报","volume":"36 1","pages":"1139-1148"},"PeriodicalIF":0.0,"publicationDate":"2014-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70040110","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Approach for Resolving Inconsistency Conflicts in Access Control Policies: An Approach for Resolving Inconsistency Conflicts in Access Control Policies","authors":"Ruiyin Li, Jianfeng Lu, Tianyan Li, Xi-Wu Gu, Zhuo Tang","doi":"10.3724/SP.J.1016.2013.01210","DOIUrl":"https://doi.org/10.3724/SP.J.1016.2013.01210","url":null,"abstract":"","PeriodicalId":35776,"journal":{"name":"计算机学报","volume":"36 1","pages":"1210-1223"},"PeriodicalIF":0.0,"publicationDate":"2014-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70040739","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}