-
661
Survey on blockchain privacy protection techniques in cryptography
Published 2022-08-01“…网络与信息安全学报…”
Get full text
Article -
662
Rapid IO routing strategy based on improved glowworm swarm optimization algorithm
Published 2018-06-01“…网络与信息安全学报…”
Get full text
Article -
663
Blur detection of digital forgery using mathematical morphology
Published 2017-04-01“…网络与信息安全学报…”
Get full text
Article -
664
Two-layer threat analysis model integrating macro and micro
Published 2021-02-01“…网络与信息安全学报…”
Get full text
Article -
665
Multi-authority attribute-based encryption with efficient user revocation in cloud computing
Published 2016-02-01“…网络与信息安全学报…”
Get full text
Article -
666
Control method to prevent malicious UAV intrusion into electricity inspection area
Published 2018-06-01“…网络与信息安全学报…”
Get full text
Article -
667
5G-based smart airport network security scheme design and security analysis
Published 2023-10-01“…网络与信息安全学报…”
Get full text
Article -
668
Sketch-based caching method for significant DNS queries
Published 2024-10-01“…网络与信息安全学报…”
Get full text
Article -
669
Attribute-based encryption schema with group signatures
Published 2019-02-01“…网络与信息安全学报…”
Get full text
Article -
670
Efficient and safe auditable mixed-coin service scheme based on blind signature
Published 2020-08-01“…网络与信息安全学报…”
Get full text
Article -
671
Factorization of big integer and the security of RSA
Published 2017-05-01“…网络与信息安全学报…”
Get full text
Article -
672
Aeronautical Ad Hoc network node failure analysis method
Published 2021-12-01“…网络与信息安全学报…”
Get full text
Article -
673
Privacy protection system based on Hook for Android
Published 2018-04-01“…网络与信息安全学报…”
Get full text
Article -
674
MLAR:large-scale network alias resolution for IP geolocation
Published 2020-08-01“…网络与信息安全学报…”
Get full text
Article -
675
State-of-the-art survey of smart contract verification based on formal methods
Published 2022-08-01“…网络与信息安全学报…”
Get full text
Article -
676
Pseudo-siamese network image tampering localization model based on reinforced samples
Published 2024-02-01“…网络与信息安全学报…”
Get full text
Article -
677
Design and implementation of proxy-protected proxy signature based on SM2
Published 2017-09-01“…网络与信息安全学报…”
Get full text
Article -
678
-
679
Block cipher mode research based on identifier of text files
Published 2017-03-01“…网络与信息安全学报…”
Get full text
Article -
680
Anonymous trust management scheme of VANET based on attribute signature
Published 2023-04-01“…网络与信息安全学报…”
Get full text
Article