Tsinghua Science and Technology

ISSN 1007-0214 e-ISSN 1878-7606 CN 11-3745/N
Editor-in-Chief: Jiaguang Sun
Open Access
Journal Home > Previous Issue
Previous Issue
Volume 21
Issue 3, June 2016
pp.243-360 11 articles
Special Issue On Information Security
Open Access
Providing Location-Aware Location Privacy Protection for Mobile Location-Based Services
https://doi.org/10.1109/TST.2016.7488736
Published: 13 June 2016
2016, 21 (3): 243-259
Downloads: 12 | Views: 398 | PDF (2.3 MB)
Open Access
An Efficient Location Privacy Protection Scheme Based on the Chinese Remainder Theorem
https://doi.org/10.1109/TST.2016.7488737
Published: 13 June 2016
2016, 21 (3): 260-269
Downloads: 16 | Views: 458 | PDF (782.3 KB)
Open Access
Private Proximity Detection for Convex Polygons
https://doi.org/10.1109/TST.2016.7488738
Published: 13 June 2016
2016, 21 (3): 270-280
Downloads: 9 | Views: 356 | PDF (845.3 KB)
Open Access
An Improved String-Searching Algorithm and Its Application in Component Security Testing
https://doi.org/10.1109/TST.2016.7488739
Published: 13 June 2016
2016, 21 (3): 281-294
Downloads: 7 | Views: 366 | PDF (1.7 MB)
Open Access
On the Linear Complexity of New Generalized Cyclotomic Binary Sequences of Order Two and Period pqr
https://doi.org/10.1109/TST.2016.7488740
Published: 13 June 2016
2016, 21 (3): 295-301
Downloads: 6 | Views: 334 | PDF (272.7 KB)
Open Access
New Public-Key Cryptosystem Based on the Morphism of Polynomials Problem
https://doi.org/10.1109/TST.2016.7488741
Published: 13 June 2016
2016, 21 (3): 302-311
Downloads: 16 | Views: 439 | PDF (506.5 KB)
Open Access
TPM-Based Remote Attestation for Wireless Sensor Networks
https://doi.org/10.1109/TST.2016.7488742
Published: 13 June 2016
2016, 21 (3): 312-321
Downloads: 9 | Views: 398 | PDF (577.5 KB)
Open Access
An Anomalous Behavior Detection Model in Cloud Computing
https://doi.org/10.1109/TST.2016.7488743
Published: 13 June 2016
2016, 21 (3): 322-332
Downloads: 23 | Views: 513 | PDF (1.5 MB)
Open Access
Optimization of Key Predistribution Protocol Based on Supernetworks Theory in Heterogeneous WSN
https://doi.org/10.1109/TST.2016.7488744
Published: 13 June 2016
2016, 21 (3): 333-343
Downloads: 12 | Views: 424 | PDF (524.6 KB)
Open Access
Cryptanalysis of Public Key Cryptosystems Based on Non-Abelian Factorization Problems
https://doi.org/10.1109/TST.2016.7488745
Published: 13 June 2016
2016, 21 (3): 344-351
Downloads: 23 | Views: 438 | PDF (439.9 KB)
Open Access
Test Data Generation for Stateful Network Protocol Fuzzing Using a Rule-Based State Machine
https://doi.org/10.1109/TST.2016.7488746
Published: 13 June 2016
2016, 21 (3): 352-360
Downloads: 15 | Views: 344 | PDF (622.9 KB)