Tsinghua Science and Technology Open Access Editor-in-Chief: Jiaguang SUN
Volume 25 Issue 5, October 2020
PP. 553-700
|
13 articles
Special Section on Trusted Computing and Information Security
Open Access
An Automatic Analysis Approach Toward Indistinguishability of Sampling on the LWE Problem
Published: 16 March 2020
2020, 25(5): 553-563
Open Access
Modified Multi-Key Fully Homomorphic Encryption Based on NTRU Cryptosystem without Key-Switching
Published: 16 March 2020
2020, 25(5): 564-578
Open Access
An Attribute-Based Encryption Scheme Based on Unrecognizable Trapdoors
Published: 16 March 2020
2020, 25(5): 579-588
Open Access
A Novel Hybrid Method to Analyze Security Vulnerabilities in Android Applications
Published: 16 March 2020
2020, 25(5): 589-603
Open Access
A Memory-Related Vulnerability Detection Approach Based on Vulnerability Features
Published: 16 March 2020
2020, 25(5): 604-613
Open Access
Fast Carrier Selection of JPEG Steganography Appropriate for Application
Published: 16 March 2020
2020, 25(5): 614-624
Open Access
ePUF: A Lightweight Double Identity Verification in IoT
Published: 16 March 2020
2020, 25(5): 625-635
Regular Article
Open Access
Improving Semantic Part Features for Person Re-identification with Supervised Non-local Similarity
Published: 16 March 2020
2020, 25(5): 636-646
Open Access
Optimal Data Transmission in Backscatter Communication for Passive Sensing Systems
Published: 16 March 2020
2020, 25(5): 647-658
Open Access
Analysis of a Firm’s Optimal Size Based on Accessible Market Capacity
Published: 16 March 2020
2020, 25(5): 659-667
Open Access
Hybrid Structure Reliability Analysis Based on the Damped Newton Method
Published: 16 March 2020
2020, 25(5): 668-677
Open Access
BAM: A Block-Based Bayesian Method for Detecting Genome-Wide Associations with Multiple Diseases
Published: 16 March 2020
2020, 25(5): 678-689
Open Access
Real-Time Facial Pose Estimation and Tracking by Coarse-to-Fine Iterative Optimization
Published: 16 March 2020
2020, 25(5): 690-700