| Volume 4,Issue 2,2019 Table of Contents
Contents | | | A Survey on the Analysis of the Concrete Hardness of LWE | | BI Lei, LI Shuaigang, LIU Yamin, ZHANG Jiang and FAN Shuqin | | Published June 1, 2019 | | 2019,4(2):1-12 [Abstract] [View PDF(637.58 K)] | | | | On Post-Quantum Provable Security | | JIANG Haodong and LIU Yamin | | Published June 1, 2019 | | 2019,4(2):13-19 [Abstract] [View PDF(287.67 K)] | | | | Recent progress of code-based post-quantum public key cryptography | | WANG Liping and QI Yanhong | | Published June 1, 2019 | | 2019,4(2):20-28 [Abstract] [View PDF(359.39 K)] | | | | Encryption and Signature Algorithms from NTRU | | HE Jingnan and ZHANG Zhenfei | | Published June 1, 2019 | | 2019,4(2):29-36 [Abstract] [View PDF(712.16 K)] | | | | Research on Mimic DNS Architectural Strategy Based on Generalized Stochastic Petri Net | | REN Quan, WU Jiangxing and HE Lei | | Published June 1, 2019 | | 2019,4(2):37-52 [Abstract] [View PDF(1.17 M)] | | | | Android malware detection method based on data-flow deep learning algorithm | | ZHU Dali, JIN Hao, WU Di, JING Pengfei and YANG Ying | | Published June 1, 2019 | | 2019,4(2):53-68 [Abstract] [View PDF(744.10 K)] | | | | Diskaller:Kernel Vulnerability Parallel Mining Model Based on Coverage Guidance | | TU Xuwen, WANG Xiaofeng, GAN Shuitao and CHEN Aiguo | | Published June 1, 2019 | | 2019,4(2):69-82 [Abstract] [View PDF(1.01 M)] | | | | Event Database Construction Techniques | | XUE Cong, GAO Neng, ZHA Daren, WANG Lei, YIN Zhiyi and ZENG Zehua | | Published June 1, 2019 | | 2019,4(2):83-106 [Abstract] [View PDF(2.49 M)] | | |
|