-
21
Shoulder-surfing resistant PIN-entry method
Published 2019-02-01“…网络与信息安全学报…”
Get full text
Article -
22
JPEG recapture image tamper detection method based on block effect grid offset
Published 2017-12-01“…网络与信息安全学报…”
Get full text
Article -
23
Data traceability mechanism based on consortium chain
Published 2023-10-01“…网络与信息安全学报…”
Get full text
Article -
24
Dynamic hierarchical quantum information sharing protocol
Published 2016-12-01“…网络与信息安全学报…”
Get full text
Article -
25
Cyber security entity recognition method based on residual dilation convolution neural network
Published 2020-10-01“…网络与信息安全学报…”
Get full text
Article -
26
Efficient and fully simulated oblivious transfer protocol on elliptic curve
Published 2023-02-01“…网络与信息安全学报…”
Get full text
Article -
27
Evidence classification method of chat text based on DSR and BGRU model
Published 2022-04-01“…网络与信息安全学报…”
Get full text
Article -
28
Verification on policies for network functions in SDN/NFV-based environment
Published 2021-06-01“…网络与信息安全学报…”
Get full text
Article -
29
Multi-objective optimization placement strategy for SDN security controller considering Byzantine attributes
Published 2021-06-01“…网络与信息安全学报…”
Get full text
Article -
30
Research on parallel coordinate visualization technology based on principal component analysis and K-means clustering
Published 2017-08-01“…网络与信息安全学报…”
Get full text
Article -
31
Research on continuous monitoring of cloud computing service
Published 2016-10-01“…网络与信息安全学报…”
Get full text
Article -
32
Task scheduling optimization strategy for roadside unit based on security strength
Published 2024-04-01“…网络与信息安全学报…”
Get full text
Article -
33
Malicious code within model detection method based on model similarity
Published 2023-08-01“…网络与信息安全学报…”
Get full text
Article -
34
Location privacy protection method based on lightweight K-anonymity incremental nearest neighbor algorithm
Published 2023-06-01“…网络与信息安全学报…”
Get full text
Article -
35
Access control model for multi-source heterogeneous data in big data environment
Published 2019-02-01“…网络与信息安全学报…”
Get full text
Article -
36
Two improved content extraction signature schemes
Published 2017-04-01“…网络与信息安全学报…”
Get full text
Article -
37
Unknown attack detection model based on network behavior analysis
Published 2016-06-01“…网络与信息安全学报…”
Get full text
Article -
38
Abnormal link detection algorithm based on semi-local structure
Published 2022-02-01“…网络与信息安全学报…”
Get full text
Article -
39
Elliptic curve ElGamal encryption based location privacy-preserving scheme
Published 2020-06-01“…网络与信息安全学报…”
Get full text
Article -
40