Tsinghua Science and Technology

ISSN 1007-0214 e-ISSN 1878-7606 CN 11-3745/N
Editor-in-Chief: Jiaguang SUN
Open Access
Journal Home > Previous Issue
Previous Issue
Volume 19
Issue 5, October 2014
pp.421-542 13 articles
Special Section On Information Security
Open Access
An Improved ID-Based Group Key Agreement Protocol
https://doi.org/10.1109/TST.2014.6919818
Published: 13 October 2014
2014, 19 (5): 421-428
Downloads: 7 | Views: 390 | PDF (237.6 KB)
Open Access
Worst-Input Mutation Approach to Web Services Vulnerability Testing Based on SOAP Messages
https://doi.org/10.1109/TST.2014.6919819
Published: 13 October 2014
2014, 19 (5): 429-441
Downloads: 30 | Views: 480 | PDF (1 MB)
Open Access
A Class of the Hamming Weight Hierarchy of Linear Codes with Dimension 5
https://doi.org/10.1109/TST.2014.6919820
Published: 13 October 2014
2014, 19 (5): 442-451
Downloads: 14 | Views: 338 | PDF (702 KB)
Open Access
Privacy Quantification Model Based on the Bayes Conditional Risk in Location-Based Services
https://doi.org/10.1109/TST.2014.6919821
Published: 13 October 2014
2014, 19 (5): 452-462
Downloads: 7 | Views: 388 | PDF (516.4 KB)
Open Access
Attribute-Based Encryption for Circuits on Lattices
https://doi.org/10.1109/TST.2014.6919822
Published: 13 October 2014
2014, 19 (5): 463-469
Downloads: 19 | Views: 598 | PDF (3 MB)
Open Access
Dynamic Measurement Protocol in Infrastructure as a Service
https://doi.org/10.1109/TST.2014.6919823
Published: 13 October 2014
2014, 19 (5): 470-477
Downloads: 12 | Views: 453 | PDF (640.3 KB)
Open Access
Targeted Fully Homomorphic Encryption Based on a Double Decryption Algorithm for Polynomials
https://doi.org/10.1109/TST.2014.6919824
Published: 13 October 2014
2014, 19 (5): 478-485
Downloads: 16 | Views: 357 | PDF (287.9 KB)
Open Access
An Efficient and Practical Public Key Cryptosystem with CCA-Security on Standard Model
https://doi.org/10.1109/TST.2014.6919825
Published: 13 October 2014
2014, 19 (5): 486-495
Downloads: 9 | Views: 367 | PDF (1.3 MB)
Open Access
Research and Practice of Dynamic Network Security Architecture for IaaS Platforms
https://doi.org/10.1109/TST.2014.6919826
Published: 13 October 2014
2014, 19 (5): 496-507
Downloads: 23 | Views: 431 | PDF (10.7 MB)
Open Access
Malicious Code Detection Model Based on Behavior Association
https://doi.org/10.1109/TST.2014.6919827
Published: 13 October 2014
2014, 19 (5): 508-515
Downloads: 9 | Views: 384 | PDF (777.3 KB)
Regular Articles
Open Access
Characteristics of a Two-Class Polling System Model
https://doi.org/10.1109/TST.2014.6919828
Published: 13 October 2014
2014, 19 (5): 516-520
Downloads: 8 | Views: 446 | PDF (1.2 MB)
Open Access
SwiftArray: Accelerating Queries on Multidimensional Arrays
https://doi.org/10.1109/TST.2014.6919829
Published: 13 October 2014
2014, 19 (5): 521-530
Downloads: 19 | Views: 447 | PDF (2.4 MB)
Open Access
Microblogging Reposting Mechanism: An Information Adoption Perspective
https://doi.org/10.1109/TST.2014.6919830
Published: 13 October 2014
2014, 19 (5): 531-542
Downloads: 48 | Views: 526 | PDF (320.1 KB)