JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE) ›› 2018, Vol. 53 ›› Issue (1): 1-18.doi: 10.6040/j.issn.1671-9352.2.2017.067
MENG Bo, LU Jin-tian, WANG De-jun, HE Xu-dong
CLC Number:
[1] 张焕国,韩文报,来学嘉,等. 网络空间安全综述[J]. 中国科学(信息科学), 2016, 46(2):125-164. ZHANG Huanguo, HAN Wenbao, LAI Xuejia, et al. Survey on cyberspace security[J]. Scientia Sinica Informationis, 2016, 46(2):125-164. [2] 王世伟. 论信息安全、网络安全、网络空间安全[J]. 中国图书馆学报,2015(2):72-84. WANG Shiwei. On information security, network security and cyberspace security[J]. Journal of Library Science in China, 2015(2):72-84. [3] MIN S K, CHAI S W, HAN M J. An international comparative on cyber security strategy[J]. International Journal of Security and its Applications, 2015, 9(2):13-20. [4] 朱贯淼,曾凡平,袁园,等. 基于污点跟踪的黑盒fuzzing测试[J].小型微型计算机系统, 2012,33(8):1736-1739. ZHU Guanmiao, ZENG Fanping, YUAN Yuan, et al. Blackbox fuzzing testing based on taint check[J]. Journal of Chinese Mini-Micro Computer Systems, 2012, 33(8):1736-1739. [5] 赖英旭,刘增辉,蔡晓田,等. 工业控制系统入侵检测研究综述[J]. 通信学报, 2017, 38(2):143-156. LAI Yingxu, LIU Zenghui, CAI Xiaotian, et al. Research on intrusion detection of industrial control system[J]. Journal on Communications, 2017, 38(2):143-156. [6] 袁琴琴,吕林涛. 基于改进蚁群算法与遗传算法组合的网络入侵检测[J].重庆邮电大学学报(自然科学版), 2017(1):84-89. YUAN Qinqin, LÜ Lintao. Network intrusion detection method based on combination of improved ant colony optimization and genetic algorithm[J]. Journal of Chongqing University of Posts and Telecommunications(Natural Science Edition), 2017(1):84-89. [7] 张密,杨力,张俊伟. FuzzerAPP:Android应用程序组件通信鲁棒性测试[J].计算机研究与发展, 2017,54(2):338-347. ZHANG Mi, YANG Li,ZHANG Junwei. Fuzzer APP: the robustness test of application component communication in android[J]. Journal of Computer Research and Development, 2017, 54(2):338-347. [8] 伊胜伟, 张翀斌, 谢丰, 等. 基于Peach的工业控制网络协议安全分析[J].清华大学学报(自然科学版), 2017,57(1):50-54. YI Shengwei, ZHANG Chongbin, XIE Feng, et al. Security analysis of industrial control network protocols based on peach[J]. J Tsinghua Univ(Sci & Technol), 2017, 57(1):50-54. [9] 陈姝,梁文章. 结合特征点匹配及深度网络检测的运动跟踪[J].电子科技大学学报,2016,45(2):246-251. CHEN Shu, LIANG Wenzhang. Object tracking by combining feature correspondences matching with deep neural network detection[J]. Journal of University of Electronic Science and Technology of China, 2016, 45(2):246-251. [10] 和亮,冯登国,苏璞睿,等. 基于社团并行发现的在线社交网络蠕虫抑制[J]. 计算机学报, 2015, 38(4):846-858. HE Liang, FENG Dengguo, SU Purui, et al. Parallel community detection based worm containment in online social network[J]. Chinese Journal of Computers, 2015, 38(4):846-858. [11] 李可,方滨兴,崔翔,等. 僵尸网络发展研究[J]. 软件学报, 2016,53(10):2189-2206. LI Ke, FANG Binxing, CUI Xiang, et al. Study of botnets trends[J]. Journal of Software, 2016, 53(10):2189-2206. [12] 赵晶玲,陈石磊,曹梦晨,等. 基于离线汇编指令流分析的恶意程序算法识别技术[J].清华大学学报(自然科学版), 2016(5):484-492. ZHAO Jingling, CHEN Shilei, CAO Mengchen, et al. Malware algorithm recognition based on offline instruction-flow analyse[J]. J Tsinghua Univ(Sci & Technol), 2016(5):484-492. [13] 潘吴斌,程光,郭晓军,等. 网络加密流量识别研究综述及展望[J].通信学报,2016,37(9):154-167. PAN Wubin, CHENG Guang, GUO Xiaojun, et al. Review and perspective on encrypted traffic identification research[J]. Journal on Communications, 2016, 37(9):154-167. [14] MATTEO A, ALFREDO P, RICCARDO S. Formal verification of security protocol implementations: a survey[J]. Formal Aspects of Computing, 2014, 26(1):99-123. [15] 雷新锋,宋书民,刘伟兵,等. 计算可靠的密码协议形式化分析综述[J]. 计算机学报, 2014, 37(5):993-1016. LEI Xinfeng, SONG Shumin, LIU Weibing, et al. A survey on computationally sound formal analysis of cryptographic protocol[J]. Chinese Journal of Computers, 2014, 37(5):993-1016. [16] 张焕国, 吴福生,王后珍,等. 密码协议代码执行的安全验证分析综述[J/OL].计算机学报,2017,40(2). http://kns.cnki.net/kcms/detail/11.1826.TP.20170120.1003.002.html. ZHANG Huanguo, WU Fusheng, WANG Houzhen, et al. A survey:security verification analysis of cryptographic protocols implementations on real code[J/OL]. Chinese Journal of Computers, 2017, 40(2). http://kns.cnki.net/kcms/detail/11.1826.TP.20170120.1003.002.html. [17] MENG Bo, HUANG Chin-Tser, YANG Yitong, et al. Automatic generation of security protocol implementations written in java from abstract specifications proved in the computational model[J]. International Journal of Network Security, 2017, 19(1):138-153. [18] MENG Bo, YANG Yitong, ZHANG Jinli, et al. PV2JAVA: automatic generator of security protocol implementations written in java language from the applied pi calculus proved in the symbolic model[J]. International Journal of Security and Its Applications, 2016, 10(11):211-229. [19] 孟博,王德军.安全协议实施自动化生成与验证[M]. 北京:科学出版社. 2016. MENG Bo, WANG Dejun. Automatic generation and verification of security protocols’ implementations[M]. Beijing: Science Press, 2016. [20] 孟博,王德军.安全远程网络投票协议[M].北京:科学出版社, 2013. MENG Bo, WANG Dejun. Security remote internet voting protocol[M]. Beijing: Science Press, 2013. [21] WANG Xinheng, XU Chuan, JIN Wenqiang, et al. A scalable parallel architecture based on many-core processors for generating HTTP traffic[J]. Applied Science, 2017, 7(2):154. DOI: 10.3390/app7020154 [22] GOUBAULT-LARRECQ J, PARRENNES F. Cryptographic protocol analysis on real c code[C] // Proceedings of the 6th International Conference on Verification, Model Checking, and Abstract Interpretation. New York: ACM, 2005: 363-379. [23] JÜRJENS J. Automated security verification for crypto protocol implementations: verifying the Jessie project[J]. Electronic Notes in Theoretical Computer Science, 2009, 250(1):123-136. [24] CHAKI S, DATTA A. ASPIER: an automated framework for verifying security protocol implementations[C] // Proceedings of the 2009 22nd IEEE Computer Security Foundations Symposium. New York: IEEE, 2009: 172-185. [25] DUPRESSOIR F, GORDON A D, JÜRJENS J, et al. Guiding a general-purpose c verifier to prove cryptographic protocols[C] // Proceedings of the 24th IEEE Computer Security Foundations Symposium. New York: IEEE, 2011: 3-17. [26] BHARGAVAN K, FOURNET C, GORDON A D. Modular verification of security protocol code by typing[C] // Proceedings of the 37th Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages. New York: ACM, 2010: 445-456. [27] BACKES M, MAFFEI M, UNRUH D. Computationally sound verification of source code[C] // Proceedings of the 17th ACM Conference on Computer and Communications Security. New York: ACM, 2010: 387-398. [28] BENGTSON J, BHARGAVAN K, FOURNET C, et al. Refinement types for secure implementations[C] // Proceedings of the 2008 21st IEEE Computer Security Foundations Symposium. Washington: IEEE Computer Society, 2008:17-32. DOI:10.1109/CSF.2008.27. [29] SWAMY N, CHEN C, FOURNET C, et al. Secure distributed programming with value-dependent types[J]. ACM SIGPLAN Notices, 2011, 46(9):266-278. [30] SWAMY N, HRIT C, KELLER C, et al. Semantic purity and effects reunited in F*[C] // Proceedings of 20th ACM SIGPLAN International Conference on Functional Programming. New York: ACM, 2015. https://www.fstar-lang.org/papers/icfp2015/full.pdf. [31] SWAMY N, HRI??塃CU C, KELLER C, et al. Dependent types and multi-monadic effects in F*[C] // Proceedings of the 43rd annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages(POPL’16). New York: ACM, 2016: 256-270. [32] AIZATULIN M, GORDON A D, JÜRJENS J. Extracting and verifying cryptographic models from C protocol code by symbolic execution[C] // Proceedings of the 18th ACM Conference on Computer and Communications Security. New York: ACM, 2011: 331-340. [33] BHARGAVAN K, FOURNET C, GORDON A D, et al. Verified interoperable implementations of security protocols[C] // ACM Transactions on Programming Languages and Systems. New York: ACM, 2008, 31(1):61 pages. [34] BHARGAVAN K, CORIN R, FOURNET C, et al. Automated computational verification for cryptographic protocol implementations[EB/OL] (2009.1.1)[2017.3.24].http://msr-inria.inria.fr/projects/sec/fs2cv/fs2cv-draft.pdf. [35] BHARGAVAN K, CORIN R, FOURNET C, et al. Cryptographically verified implementations for TLS[C] // Proceedings of the 15th ACM Conference on Computer and Communications Security. New York: ACM, 2008: 459-468. [36] AIZATULIN M, GORDON A D, JÜRJENS J. Extracting and verifying cryptographic models from C protocol code by symbolic execution[C] // Proceedings of the 18th ACM Conference on Computer and Communications Security. New York: ACM, 2011: 331-340. [37] AIZATULIN M, GORDON A, JÜRJENS J. Computational verification of c protocol implementations by symbolic execution[C] // Proceedings of the 2012 19th ACM Conference on Computer and Communications Security. New York: ACM, 2012: 712-723. [38] NICHOLAS O'S. Using Elygah to analyses Java implementations of cryptographic protocols[C] // Proceedings of FCS-ARSPA-WITS'08. New York: IEEE, 2008: 211-223. [39] LI Zimao, MENG Bo, WANG Dejun, et al. Mechanized verification of cryptographic security of cryptographic security protocol implementation in JAVA through model extraction in the computational model[J]. Journal of Software Engineering, 2015, 9(1):1-32. [40] BHARGAVAN K, BLANCHET B, KOBEISSI N. Verified models and reference implementations for the TLS 1.3 standard candidate[C] // Proceedings of the 38th IEEE Symposium on Security and Privacy. New York: IEEE, 2017: 483-502. [41] BAI G D, LEI J, MENG G Z, et al. AUTHSCAN: automatic extraction of web authentication protocols from implementations[C] // Proceedings of the 20th Annual Network & Distributed System Security Symposium, New York: IEEE, 2013. [42] FETT D, KÜSTERS R, SCHMITZ G. Analyzing the browserID SSO System with primary identify provider using an expressive model of the web[C] // Proceedings of 20th European Symposium on Research in Computer Security. Berlin: Springer-Verlag, 2015: 43-65. [43] PELLEGRINO G, TSCHÜRTZ C, Bodden E, et al. jÄk: using dynamic analysis to crawl and test modern web applications[C] / /International Workshop on Recent Advances in Intrusion Detection Research in Attacks, Instructions and Defense, Lecture Notes in Computer Science. Berlin: Springer-Verlag, 2015: 295-316. [44] ZUO Chaoshun, WANG Wubing, WANG Rui, et al. Automatic forgery of cryptographically consistent messages to identify security vulnerabilities in mobile services[C] // Proceedings of The Network and Distributed System Security Symposium 2016(NDSS’16). California: Internet Society, 2016. [45] YE Q, BAI G, WANG K, et al. Formal analysis of a single sign-on protocol implementation for android[C] // Proceedings of 20th International Conference on Engineering of Complex Computer System. New York: IEEE, 2015: 90-99. [46] KOBEISSI N, BHARGAVAN K, BLANCHET B. Automatic verification for secure messaging protocols and their implementations: a symbolic and computational approach[C] // Proceedings of the 2nd IEEE European Symposium on Security and Privacy. New York: IEEE, 2017. [47] ZHOU Y, EVANS D. SSOScan: Automated testing of web applications for single sign-on vulnerabilities[C] // Proceedings of the 23rd USENIX Security Symposium. New York: ACM, 2014: 495-510. [48] SHERNAN E, CARTER H, TIAN D, et al. More guidelines than rules: CSRF vulnerabilities from noncompliant OAuth 2.0 implementations[C] //Proceedings of 12th International Conferences on Detection of Intrusions and Malware, and Vulnerability Assessment(DIMVA 2015). Berlin: Springer-Verlag, 2015: 239-260. [49] SUDHODANAN A, ARMANDO A, CARBONE R, et al. Attack patterns for black-box security testing of multi-party web applications[C] // Proceedings of The Network and Distributed System Security Symposium 2016, California: Internet Society, 2016. [50] FETT D, KUESTERS R, SCHMITZ G. SPRESSO: A secure, privacy-respecting single sign-on system for the web[C] // Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. New York: ACM, 2015: 1358-1369. [51] 吴礼发,王辰,洪征,等.协议状态机推断技术研究进展[J].计算机应用研究,2015,32(7):1931-1936. WU Lifa, WANG CHEN, HONG Zheng, et al. Overview on protocol state machine inference: a survey[J]. Application Research of Computer, 2015, 32(7):1931-1936. [52] 潘璠,吴礼发,杜有翔,等.协议逆向工程研究进展[J].计算机应用研究,2011,28(8):2801-2806. PAN Fan, WU Lifa, DU Youxiang, et al. Overviews on protocol reverse engineering[J]. Application Research of Computer, 2011, 28(8):2801-2806. [53] NARAYAN J, SHUKLAS K T, CLANCY C T. A survey of automatic protocol reverse engineering tools[J]. ACM Computing Survey, 2015, 48(3):1-26. [54] DUCHÊNE J, GUERNIC C J, ALATA E, et al. State of the art of network protocol reverse engineering tools[J]. Journal of Computer Virology and Hacking Techniques, 2017: 1-16. [55] BEDDOE M. Protocol information Project[EB/OL].(2004-10-05)[2017.4.23].http://www.4tphi.net/~awalters/PI/PI.html. [56] CUI W D, KANNAN J K, WANG H. Discover: automatic protocol reverse engineering from network trace[C] // Proceedings of the 16th USENIX Security Symposium on USENIX Security Symposium, USENIX Association Berkely. New York: ACM, 2007: No.14. [57] TRIFILÒ A, BURSCHKA S, BIERSACK E. Traffic to protocol reverse engineering[C] // Proceedings of the 2009 IEEE Symposium on Computational Intelligence in Security and Defense Application(CISDA2009). New York: IEEE, 2009: 257-264. [58] WANG Y P, LI X J, MENG J, et al. 2011a. Biprominer: automatic mining of binary protocol features[C] // Proceedings of 12th International Conference on Parallel and Distributed Computing, Applications and Technologies(PDCAT). New York: IEEE, 2011: 179–184. [59] WANG Yipeng, YUN Xiaochun, SHAFIQ M Z, et al. A semantics aware approach to automated reverse engineering unknown protocols[C] // Proceedings of 20th IEEE International Conference on Network Protocols(ICNP). New York: IEEE, 2012. [60] BERMUDEZ I, TONGAONKARA A, ILIOFOTOUB M, et al. Towards automatic protocol field inference[J]. Computer Communications, 2016, 84(C):40-51. [61] KRUEGER T, KRAMER N, RIECK K. ASAP: automatic semantics-ware analysis of network payloads[C] // Proceedings of the ECML/PKDD Workshop on Privacy and Security Issues in Data Mining and Machine Learning(PSDML2010). Berlin: Springer Verlag, 2010: 50-63. [62] LUO Jianzhen, YU Shunzheng. Position-based automatic reverse engineering of network protocols[J]. Journal of Network and Computer Applications, 2013, 36(3): 1070-1077. [63] 戴理,舒辉, 黄荷洁. 基于数据流分析的网络协议逆向解析技术[J]. 计算机应用,2013, 33(5):1217-1221. DAI Li, SHU Hui, HUANG Hejie. Network protocol reverse parsing technique based on dataflow analysis[J].Journal of Computer Applications, 2013, 33(5):1217-1221. [64] ZHANG Zhuo, ZHANG Zhibin, LEE P P C, et al. Proword: an unsupervised approach to protocol feature word extraction[C] // Proceedings of IEEE Conference on Computer Communications, IEEE INFOCOM 2014. New York: IEEE, 2014: 1393-1401. [65] YUN Xiaochun, WANG Yipeng, ZHANG Yongzheng, et al. A semantics-aware approach to the automated network protocol identification[J]. IEEE/ACM Transactions on Networking. 2016, 24(1):583-595. [66] TAO S Y, YU H G, LI Q. Bit-oriented format extraction approach for automatic binary protocol reverse engineering[J]. IET Communications, 2016, 10(6):709-716. [67] XIAO Mingming, ZHANG Shilong, LUO Yuping. Automatic network protocol message format analysis[J]. Journal of Intelligent & Fuzzy Systems, 2016, 31(4):2271-2279. [68] ROWE P D, GUTTMAN J D, LISKOV M D. Measuring protocol strength with security goals[J]. International journal of Information Security, 2016, 15(6):575-596. [69] LIM J, REPS T, LIBLIT B. Extracting Output Formats from Executables[C] // Proceedings of the 13th Working Conference on Reverse Engineering, WCRE’06. New York: IEEE, 2006: 167-178. [70] CABALLERO J, YIN H, LIANG Z K, et al. Polyglot: automatic extraction of protocol message format using dynamic binary analysis[C] // Proceedings of the 14th ACM Conference on Computer and Communications Security. New York: ACM, 2007: 317-329. [71] WONDRACEK G, COMPARETTI P M, KRUEGEL C, et al. Automayic network protocol analysis[C] // Proceedings of the 16th Annual Network & Distributed System Security Symposium(NDSS’2008). California: Internet Society, 2008. [72] LIN Zhiqiang, JIANG Xuxian, XU Dongyan, et al. Automatic protocol format reverse engineering through context-aware monitored execution[C] // Proceedings of 15th Symposium on Network and Distributed System Security, NDSS’2008. California: Internet Society, 2008. [73] COMPARETTI P M, WONDRACEK G, KRUEGEL C, et al. Prospex: protocol specification extraction[C] // Proceedings of 30th IEEE Symposium on Security & Privacy. New York: IEEE, 2009: 110-125. [74] CUI W D, PEINADO M, CHEN K, et al. Tupni: automatic reverse engineering of input formats[C] // Proceedings of 15th ACM Conference on Computer and Communications Security. New York: ACM, 2008: 391-402. [75] WANG Z, IANG X X, CUI W D, et al. ReFormat: automatic reverse engineering of encrypted messages[C] // Proceedings of the 14th European conference on Research in Computer Security. Berlin: Springer- Verlag, 2009: 200-215. [76] LIN Zhiqiang, ZHANG Xiangyu, XU Dongyan. Reverse engineering input syntactic structure from program execution and its applications[J].IEEE Transaction on Software Engineering, 2010, 36(5):688-703. [77] LUTZ N, TELLENBACH B.Towards revealing Attackers’ intent by automatically decrypting networking traffic.[EB/OL].[2017-04-02].http://www.kutter-fonds.ethz.ch/App_Themes/default/datalinks/NoeLutz-08.pdf. [78] CABALLERO J, POOSANKAM P, KREIBICH C, et al. Dispatcher: enabling active botnet infiltration using automatic protocol reverse-engineering[C] // Proceedings of the 16th ACM Conference on Computer and Communications Security. New York: ACM, 2009: 621-634. [79] LIU Min, JIA Chunfu, LIU Lu, et al. Extracting sent message formats from executables using backward slicing[C] // Proceedings of 4th International Conference on Emerging Intelligent Data and Web Technologies(EIDWT). New York: IEEE, 2013: 377-384. [80] 石小龙,祝跃飞,刘龙,等. 加密通信协议的一种逆向分析方法[J]. 计算机应用研究,2015,32(1):214-217, 221. SHI Xiaolong, ZHU Yuefei, LIU Long, et al. Method of encrypted protocol reverse engineering[J]. Application Research of Computers, 2015, 32(1):214-217, 221. [81] WEN Lin, FEI Jinlong, ZHU Yuefei, et al. A method of multiple encryption and sectional encryption protocol reverse engineering[C] // Proceedings of 10th International Conference on Computational Intelligence and Security. New York: IEEE, 2015: 420-424. [82] LI Meijian, WANG Yongjun, XIE Peidai,et al. Reverse analysis of secure communication protocol based on taint analysis[C] // Proceedings of 2014 Communications Security Conference. New York: IEEE, 2014. [83] 朱玉娜,韩继红,袁霖,等. 基于熵估计的安全协议密文域识别方法[J]. 电子与信息学报,2016, 38(8):1865-1871. ZHU Yuna, HAN Jihong, YUAN Lin, et al. Protocol ciphertext field identification by entropy estimating[J]. Journal of Electronics & Information Technology, 2016, 38(8):1865-1871. [84] NEWSOME J, BRUMLEY D, FRANKLIN J, et al. Replayer: automatic protocol relay by binary analysis[C] // Proceedings of 13th ACM Conference on Computer and Communications Security. New York: ACM, 2006: 311-321. [85] HTTPS使用率—Google透明度报告[EB/OL].(2017.4.16)[2017.4.25]. https://www.google.com/transparencyreport/https/metrics/?hl=zh-CN. The usage of HTTPS-Transparency report of google[EB/OL].(2017.4.16)[2017.4.25] https://www.google.com/transparencyreport/https/metrics/?hl=zh-CN. |
[1] | YAN Yan, HAO Xiao-hong. Differential privacy partitioning algorithm based on adaptive density grids [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(9): 12-22. |
[2] | JIAO Hong-ru, QIN Jing. Quantum secret sharing scheme realizing all hyperstar quantum access structure [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(9): 62-68. |
[3] | XU Li-dong, WANG Ming-qiang. A meet-in-the-middle attack on 10-round AES-128 [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(7): 39-45. |
[4] | ZHANG Jian-biao, LI Zhi-gang, LIU Guo-jie, WANG Chao, WANG Wei. Process active dynamic measurement method for Windows environment [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(7): 46-50. |
[5] | CUI Zhao-yang, SUN Jia-qi, XU Song-yan, JIANG Xin. A secure clustering algorithm of Ad Hoc network for colony UAVs [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(7): 51-59. |
[6] | LIU Zheng, NIU Fang-lin, QIAN Da-xing, CAI Xi-biao, GUO Ying. Design of anti-eavesdropping code based on fountain codes [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(7): 60-64. |
[7] | LIU Ming-ming, ZHANG Min-qing, LIU Jia, GAO Pei-xian. Steganalysis method based on shallow convolution neural network [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(3): 63-70. |
[8] | RUAN Shu-hua, WENG Jun-hao, MAO Hui, CHEN Xue-lian. Metric model for cloud computing security risk assessment [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(3): 71-76. |
[9] | KANG Hai-yan, HUANG Yu-xuan, CHEN Chu-qiao. Enhancing privacy for geographic information based on video analysis [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(1): 19-29. |
[10] | TAN Ren, YIN Xiao-chuan, JIAO Xian-long, LIAN Zhe, CHEN Yu-xin. Software defined APT attack moving target defense network architecture [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(1): 38-45. |
[11] | SUN Ze-rui, WANG Ji-jun, LI Guo-xiang, XIA Guo-en. New reversible data hiding algorithm based on interpolation images [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(1): 46-52. |
[12] | SUN Liang, CHEN Xiao-chun, ZHONG Yang, LIN Zhi-peng, REN Tong. Secure startup mechanism of server based on trusted BMC [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(1): 89-94. |
[13] | YAO Ke, ZHU Bin-rui, QIN Jing. Verifiable public key searchable encryption protocol based on biometrics [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(11): 11-22. |
[14] | HAN Pan-pan, QIN Jing. Verifiable and searchable encryption scheme for outsourced database in cloud computing [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(9): 41-53. |
[15] | DING Yi-tao, YANG Hai-bin, YANG Xiao-yuan, ZHOU Tan-ping. A reversible image data hiding scheme in Homomorphic encrypted domain [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(7): 104-110. |
|