-
261
Proof of storage with corruption identification and recovery for dynamic group users
Published 2022-10-01“…网络与信息安全学报…”
Get full text
Article -
262
Predicting correlation relationships of entities between attack patterns and techniques based on word embedding and graph convolutional network
Published 2023-08-01“…网络与信息安全学报…”
Get full text
Article -
263
-
264
Design of miner type identification mechanism based on reputation management model
Published 2022-02-01“…网络与信息安全学报…”
Get full text
Article -
265
Research progress in code reuse attacking and defending
Published 2018-03-01“…网络与信息安全学报…”
Get full text
Article -
266
Pre-authentication and group management based secure handover for space-earth integration network
Published 2016-07-01“…网络与信息安全学报…”
Get full text
Article -
267
Universal patching method for side-channel vulnerabilities based on atomic obfuscation
Published 2022-04-01“…网络与信息安全学报…”
Get full text
Article -
268
Hybrid-chain-based supervision scheme for privacypreserving trading system
Published 2023-12-01“…网络与信息安全学报…”
Get full text
Article -
269
Fault-injection attack on countermeasure algorithms of RSA-CRT cryptosystem
Published 2019-02-01“…网络与信息安全学报…”
Get full text
Article -
270
Trusted access scheme for intranet mobile terminal based on encrypted SD card
Published 2019-08-01“…网络与信息安全学报…”
Get full text
Article -
271
Secure data collection method of WSN based on mobile Sink
Published 2021-02-01“…网络与信息安全学报…”
Get full text
Article -
272
Flexible and collaborative data group sharing scheme with fairness and verifiability
Published 2025-02-01“…网络与信息安全学报…”
Get full text
Article -
273
Data sharing scheme for 5G IoT based on blockchain
Published 2020-08-01“…网络与信息安全学报…”
Get full text
Article -
274
Fair secret sharing scheme using asymmetric bivariate polynomial
Published 2019-02-01“…网络与信息安全学报…”
Get full text
Article -
275
Review on the safety of LIDAR-based point cloud object detection
Published 2025-02-01“…网络与信息安全学报…”
Get full text
Article -
276
Privacy-preserving multi-dimensional multi-function data aggregation scheme in smart grid
Published 2025-06-01“…网络与信息安全学报…”
Get full text
Article -
277
Survey on anomaly detection technology based on logs
Published 2020-12-01“…网络与信息安全学报…”
Get full text
Article -
278
Large-scale measurement and analysis on misconfigurations of DNSSEC from recursive side
Published 2024-10-01“…网络与信息安全学报…”
Get full text
Article -
279
Credit risk identification of high-risk online lending enterprises based on neural network model
Published 2017-12-01“…网络与信息安全学报…”
Get full text
Article -
280
RAP detection method based on AP fingerprint
Published 2018-05-01“…网络与信息安全学报…”
Get full text
Article