计算机学报Pub Date : 2014-03-18DOI: 10.3724/SP.J.1016.2013.01337
T. Luo, Ming Zhao, Jingye Li, Guangxin Yue, Xiaojun Wang
{"title":"MAC Protocols in Cognitive Radio Ad Hoc Networks: MAC Protocols in Cognitive Radio Ad Hoc Networks","authors":"T. Luo, Ming Zhao, Jingye Li, Guangxin Yue, Xiaojun Wang","doi":"10.3724/SP.J.1016.2013.01337","DOIUrl":"https://doi.org/10.3724/SP.J.1016.2013.01337","url":null,"abstract":"","PeriodicalId":35776,"journal":{"name":"计算机学报","volume":"36 1","pages":"1337-1348"},"PeriodicalIF":0.0,"publicationDate":"2014-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70040708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Snippet Retrieval Strategy Based on Element Weighting Model: A Snippet Retrieval Strategy Based on Element Weighting Model","authors":"Dexi Liu, Changxuan Wan, X. Liu, Minjuan Zhong, Tengjiao Jiang","doi":"10.3724/SP.J.1016.2013.01729","DOIUrl":"https://doi.org/10.3724/SP.J.1016.2013.01729","url":null,"abstract":"","PeriodicalId":35776,"journal":{"name":"计算机学报","volume":"43 1","pages":"1729-1744"},"PeriodicalIF":0.0,"publicationDate":"2014-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70061590","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
计算机学报Pub Date : 2014-03-17DOI: 10.3724/SP.J.1016.2013.01194
Rui Li, Yaping Lin, Yeqing Yi, Yu-peng Hu
{"title":"A Privacy and Integrity Preserving Range Query Protocol in Two-Tiered Sensor Networks: A Privacy and Integrity Preserving Range Query Protocol in Two-Tiered Sensor Networks","authors":"Rui Li, Yaping Lin, Yeqing Yi, Yu-peng Hu","doi":"10.3724/SP.J.1016.2013.01194","DOIUrl":"https://doi.org/10.3724/SP.J.1016.2013.01194","url":null,"abstract":"","PeriodicalId":35776,"journal":{"name":"计算机学报","volume":"36 1","pages":"1194-1209"},"PeriodicalIF":0.0,"publicationDate":"2014-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70040684","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
计算机学报Pub Date : 2014-03-17DOI: 10.3724/SP.J.1016.2013.01177
Xunyun Nie, Zhaohu Xu, Yong-jian Liao, Ting Zhong
{"title":"Cryptanalysis of Extended Multivariate Public Key Cryptosystem: Cryptanalysis of Extended Multivariate Public Key Cryptosystem","authors":"Xunyun Nie, Zhaohu Xu, Yong-jian Liao, Ting Zhong","doi":"10.3724/SP.J.1016.2013.01177","DOIUrl":"https://doi.org/10.3724/SP.J.1016.2013.01177","url":null,"abstract":"","PeriodicalId":35776,"journal":{"name":"计算机学报","volume":"36 1","pages":"1177-1182"},"PeriodicalIF":0.0,"publicationDate":"2014-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70040609","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
计算机学报Pub Date : 2014-03-17DOI: 10.3724/SP.J.1016.2013.01168
Song Li, Yongfeng Huang, Jianjun Lu
{"title":"Detection of QIM Steganography in Low Bit-Rate Speech Codec Based on Statistical Models and SVM: Detection of QIM Steganography in Low Bit-Rate Speech Codec Based on Statistical Models and SVM","authors":"Song Li, Yongfeng Huang, Jianjun Lu","doi":"10.3724/SP.J.1016.2013.01168","DOIUrl":"https://doi.org/10.3724/SP.J.1016.2013.01168","url":null,"abstract":"","PeriodicalId":35776,"journal":{"name":"计算机学报","volume":"36 1","pages":"1168-1176"},"PeriodicalIF":0.0,"publicationDate":"2014-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70040546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
计算机学报Pub Date : 2014-03-17DOI: 10.3724/SP.J.1016.2013.01139
Gong Zheng, Liu Shusheng, Wen Yamin, Tang Shaohua
{"title":"Biclique Analysis on the Reduced-Round PRESENT","authors":"Gong Zheng, Liu Shusheng, Wen Yamin, Tang Shaohua","doi":"10.3724/SP.J.1016.2013.01139","DOIUrl":"https://doi.org/10.3724/SP.J.1016.2013.01139","url":null,"abstract":"Due to its excellent hardware performance and elegant design,the lightweight block cipher PRESENT attracts widely attention from both industry and academy society.In this paper,we present a new Biclique cryptanalysis on 21-round PRESENT,which can recover secret key with 278.9 time complexity and 264 chosen ciphertexts.Moreover,our Biclique attack can be extended to PRESENT-128 and the compression function of DM-PRESENT with the same rounds.Compared with the published results,our new Biclique analysis has the advantage on its memory complexity.","PeriodicalId":35776,"journal":{"name":"计算机学报","volume":"36 1","pages":"1139-1148"},"PeriodicalIF":0.0,"publicationDate":"2014-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70040110","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Approach for Resolving Inconsistency Conflicts in Access Control Policies: An Approach for Resolving Inconsistency Conflicts in Access Control Policies","authors":"Ruiyin Li, Jianfeng Lu, Tianyan Li, Xi-Wu Gu, Zhuo Tang","doi":"10.3724/SP.J.1016.2013.01210","DOIUrl":"https://doi.org/10.3724/SP.J.1016.2013.01210","url":null,"abstract":"","PeriodicalId":35776,"journal":{"name":"计算机学报","volume":"36 1","pages":"1210-1223"},"PeriodicalIF":0.0,"publicationDate":"2014-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70040739","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}