[1] |
WANG Yu-fei LIU Bei-bei HU Yong-jian ZHU Mei-neng.
Detection of Time Domain Forgery of H.265 /HEVC Video
[J]. Journal of South China University of Technology (Natural Science Edition), 2017, 45(1): 26-34.
|
[2] |
Luo Jian-gao Han Guo-qiang Wo Yan Liang Peng.
Lossless Image Authentication Algorithm with Dynamic Adjustable Tamper Localization Accuracy
[J]. Journal of South China University of Technology (Natural Science Edition), 2011, 39(7): 121-126,145.
|
[3] |
Sun Chun-hui Li Hui Yang Yang Lv Chao.
A Side-Channel Attack Method Based on Chosen Plaintext-Timing Difference
[J]. Journal of South China University of Technology (Natural Science Edition), 2011, 39(2): 100-107.
|
[4] |
Deng Yu-qiao Du Ming-hui Liang Ya-ling Liao Bing.
Error-Correcting Digital Signature Scheme Based on Knapsack Problem
[J]. Journal of South China University of Technology (Natural Science Edition), 2010, 38(6): 46-49.
|
[5] |
Yuan Feng Hu Yu-pu Ou Hai-wen Zhao Dong.
Break of the C*- Scheme Symmetry Caused by Projection
[J]. Journal of South China University of Technology (Natural Science Edition), 2010, 38(5): 86-89.
|
[6] |
He De-biao Chen Jian-hua Hu Jin.
Design and Implementation of High-Speed Coprocessor for Elliptic Curve Cryptography
[J]. Journal of South China University of Technology (Natural Science Edition), 2010, 38(5): 90-94.
|
[7] |
Yuan Feng Hu Yu-pu Ou Hai-wen Li Shun-bo .
An Improved RMPKC Scheme
[J]. Journal of South China University of Technology (Natural Science Edition), 2010, 38(11): 135-140.
|
[8] |
Li Ming-xiang Han Bo-tao Zhu Jian-yong Zheng Xue-fen Yan Peng.
Identity-Based Proxy Signature Scheme Secure in Standard Model
[J]. Journal of South China University of Technology (Natural Science Edition), 2009, 37(5): 118-122,129.
|
[9] |
Deng Yu-qiao Du Ming-hui .
Access Granting Protocol of DRM System Based on Proxy Signature Scheme
[J]. Journal of South China University of Technology (Natural Science Edition), 2008, 36(9): 55-58.
|
[10] |
Wang Tian-yin Wen Qiao-yan .
Cryptanalysis of Secret-Sharing Multi-Signature Scheme Without Trusted Centre
[J]. Journal of South China University of Technology (Natural Science Edition), 2008, 36(9): 52-54.
|
[11] |
Pαng Liαo-jun Li Hui-xian wang Yu-min.
Verifiable (t , n) Threshold Secret-Sharing Scheme and Its Security
[J]. Journal of South China University of Technology (Natural Science Edition), 2007, 35(1): 102-105.
|
[12] |
Lu Ming-xin Fu Xiαo-tong Zhαng Ning Xiao Guo-zhen.
Secret Sharing-Multisignature Scheme Without a Trusted Center
[J]. Journal of South China University of Technology (Natural Science Edition), 2007, 35(1): 99-101,105.
|
[13] |
Liu Yi Zhang Ling.
Securely Alternative Route Protocol ßased on Mobile Agents
[J]. Journal of South China University of Technology (Natural Science Edition), 2007, 35(1): 84-88.
|
[14] |
Wo Yan Han Guo-qiang.
Image Content Authentication Technique Based on Laplacian Pyramid
[J]. Journal of South China University of Technology (Natural Science Edition), 2007, 35(1): 34-37,69.
|
[15] |
Du Xin-jun Wang Ying Ge Jian-hua Wang Yu-min.
ID-Based Chameleon Signature Scheme from Bilinear Pairing
[J]. Journal of South China University of Technology (Natural Science Edition), 2005, 33(6): 23-27.
|