-
221
Reusable attribute-based signature with attribute revocation and authenticated key agreement
Published 2024-04-01“…网络与信息安全学报…”
Get full text
Article -
222
Key management scheme with private key self-healing ability in DTN
Published 2017-04-01“…网络与信息安全学报…”
Get full text
Article -
223
Multiple redundant flow fingerprint model based on time slots
Published 2023-02-01“…网络与信息安全学报…”
Get full text
Article -
224
Research on intrusion detection model based on synchronization of heterogenous executer
Published 2025-02-01“…网络与信息安全学报…”
Get full text
Article -
225
Research and prospect of reversible data hiding method with contrast enhancement
Published 2016-04-01“…网络与信息安全学报…”
Get full text
Article -
226
Secure multidimensional interconnection network for the software defined system on wafer
Published 2025-04-01“…网络与信息安全学报…”
Get full text
Article -
227
Proven secure blind adaptor signature scheme based on the SM2
Published 2024-04-01“…网络与信息安全学报…”
Get full text
Article -
228
Recommendation algorithm based on GMM clustering and FOA-GRNN model
Published 2018-12-01“…网络与信息安全学报…”
Get full text
Article -
229
Research on the cultivation of cyber security talents under the perspective of double tops based on Jiangsu province
Published 2021-04-01“…网络与信息安全学报…”
Get full text
Article -
230
Survey on public key encryption with equality test
Published 2018-11-01“…网络与信息安全学报…”
Get full text
Article -
231
Quantum dialogue protocol based on self-dual quantum low density parity check codes
Published 2020-08-01“…网络与信息安全学报…”
Get full text
Article -
232
-
233
Application progress of SGX in trusted computing area
Published 2021-12-01“…网络与信息安全学报…”
Get full text
Article -
234
App-DDoS detection method using partial binary tree based SVM algorithm
Published 2018-03-01“…网络与信息安全学报…”
Get full text
Article -
235
Academic connotation and research trends of privacy computing
Published 2022-12-01“…网络与信息安全学报…”
Get full text
Article -
236
Research on security multi-party computing based on game theory
Published 2018-01-01“…网络与信息安全学报…”
Get full text
Article -
237
Game model based security strategy of heterogeneous controllers in the cloud
Published 2018-09-01“…网络与信息安全学报…”
Get full text
Article -
238
-
239
Preventing man-in-the-middle attacks in DNS through certificate less signature
Published 2021-12-01“…网络与信息安全学报…”
Get full text
Article -
240
Mimic cloud service architecture for cloud applications
Published 2021-02-01“…网络与信息安全学报…”
Get full text
Article