-
101
EN-Bypass: a security assessment method on e-mail user interface notification
Published 2023-06-01“…网络与信息安全学报…”
Get full text
Article -
102
GDPR-oriented intelligent checking method of privacy policies compliance
Published 2023-12-01“…网络与信息安全学报…”
Get full text
Article -
103
Video inter-frame tampering detection algorithm fusing multiple features
Published 2020-02-01“…网络与信息安全学报…”
Get full text
Article -
104
Improved meet-in-the-middle attack on Joltik-BC-128
Published 2024-10-01“…网络与信息安全学报…”
Get full text
Article -
105
P2P network identity authentication mechanism based on trusted alliance
Published 2020-04-01“…网络与信息安全学报…”
Get full text
Article -
106
Differentially private sequence generative adversarial networks for data privacy masking
Published 2020-08-01“…网络与信息安全学报…”
Get full text
Article -
107
-
108
PCPIR-V:parallel privacy protected algorithms for nearest neighbor query based on Spark
Published 2016-05-01“…网络与信息安全学报…”
Get full text
Article -
109
Message encryption and authentication mechanism based on wireless physical layer key
Published 2018-08-01“…网络与信息安全学报…”
Get full text
Article -
110
Training of information security undergraduate in the education mode of cyberspace security
Published 2019-06-01“…网络与信息安全学报…”
Get full text
Article -
111
E-invoice authenticity verification scheme based on signature verification
Published 2019-12-01“…网络与信息安全学报…”
Get full text
Article -
112
Provably secure social network privacy-preserving scheme
Published 2016-08-01“…网络与信息安全学报…”
Get full text
Article -
113
Defense scheme for the world state based attack in Ethereum
Published 2022-04-01“…网络与信息安全学报…”
Get full text
Article -
114
Research on cyberspace surveying and mapping technology
Published 2016-09-01“…网络与信息安全学报…”
Get full text
Article -
115
Virtualization security:the good,the bad and the ugly
Published 2016-10-01“…网络与信息安全学报…”
Get full text
Article -
116
Dynamic heterogeneous scheduling method based on Stackelberg game model in container cloud
Published 2021-06-01“…网络与信息安全学报…”
Get full text
Article -
117
Research on the SQL injection filtering based on SQL syntax tree
Published 2016-11-01“…网络与信息安全学报…”
Get full text
Article -
118
Robustness evaluation of commercial liveness detection platform
Published 2022-02-01“…网络与信息安全学报…”
Get full text
Article -
119
Entangled state testing in the quantum Byzantine agreement
Published 2016-11-01“…网络与信息安全学报…”
Get full text
Article -
120
Dynamic and efficient vehicular cloud management scheme with privacy protection
Published 2022-12-01“…网络与信息安全学报…”
Get full text
Article