-
281
Multilevel secure access control policy for distributed systems
Published 2017-08-01“…网络与信息安全学报…”
Get full text
Article -
282
New hash function based on C-MD structure and chaotic neural network
Published 2023-06-01“…网络与信息安全学报…”
Get full text
Article -
283
Personalized lightweight distributed network intrusion detection system in fog computing
Published 2023-06-01“…网络与信息安全学报…”
Get full text
Article -
284
Image generation classification method based on convolution neural network
Published 2016-09-01“…网络与信息安全学报…”
Get full text
Article -
285
Improvement of lightweight threshold group signature scheme
Published 2020-08-01“…网络与信息安全学报…”
Get full text
Article -
286
Multi-biometrics fusion based on dynamic weighting of characteristic signal quality
Published 2018-03-01“…网络与信息安全学报…”
Get full text
Article -
287
VMI-based virtual machine remote attestation scheme
Published 2018-12-01“…网络与信息安全学报…”
Get full text
Article -
288
Blockchain-based high transparent PKI authentication protocol
Published 2022-08-01“…网络与信息安全学报…”
Get full text
Article -
289
Survey of artificial intelligence data security and privacy protection
Published 2021-02-01“…网络与信息安全学报…”
Get full text
Article -
290
Survey of control and management mechanisms for time-sensitive network
Published 2021-12-01“…网络与信息安全学报…”
Get full text
Article -
291
Blockchain-based digital copyright trading system
Published 2018-07-01“…网络与信息安全学报…”
Get full text
Article -
292
Application and prospect of blockchain in Metaverse
Published 2022-08-01“…网络与信息安全学报…”
Get full text
Article -
293
Investigation,analysis and improvement mentality of the revision on information security’s training program to undergraduates in Hunan University
Published 2020-08-01“…网络与信息安全学报…”
Get full text
Article -
294
Blockchain-based key management scheme for distributed networks
Published 2018-09-01“…网络与信息安全学报…”
Get full text
Article -
295
-
296
Research on IoT security situation awareness method based on evidence theory
Published 2022-04-01“…网络与信息安全学报…”
Get full text
Article -
297
Network function heterogeneous redundancy deployment method based on immune algorithm
Published 2021-02-01“…网络与信息安全学报…”
Get full text
Article -
298
Research and implement of file safe deposit box based on authentication and authorization
Published 2016-05-01“…网络与信息安全学报…”
Get full text
Article -
299
-
300
Instruction and demonstration-based secure service attribute generation mechanism for textual data
Published 2024-12-01“…网络与信息安全学报…”
Get full text
Article