-
121
Identity authentication scheme based on identity-based encryption
Published 2016-06-01“…网络与信息安全学报…”
Get full text
Article -
122
Survey of big-data-analysis-resistant privacy protection
Published 2016-04-01“…网络与信息安全学报…”
Get full text
Article -
123
Adversarial method for malicious ELF file detection based on deep reinforcement learning
Published 2024-10-01“…网络与信息安全学报…”
Get full text
Article -
124
Survey of DDoS defense:challenges and directions
Published 2017-10-01“…网络与信息安全学报…”
Get full text
Article -
125
Research on cross-domain trustable blockchain based decentralized DNS architecture
Published 2020-04-01“…网络与信息安全学报…”
Get full text
Article -
126
Automatic detection method of software upgrade vulnerability based on network traffic analysis
Published 2020-02-01“…网络与信息安全学报…”
Get full text
Article -
127
Review on security risks of key components in industrial control system
Published 2022-06-01“…网络与信息安全学报…”
Get full text
Article -
128
Research on networking troubleshooting method based on software defined network
Published 2016-12-01“…网络与信息安全学报…”
Get full text
Article -
129
Key generation method based on reconfigurable intelligent surface in quasi-static scene
Published 2021-04-01“…网络与信息安全学报…”
Get full text
Article -
130
Survey of trustworthy pervasive social networking
Published 2016-02-01“…网络与信息安全学报…”
Get full text
Article -
131
Decentralized searchable encryption scheme based on dynamic accumulator
Published 2019-04-01“…网络与信息安全学报…”
Get full text
Article -
132
A hierarchy model on the research fields of cyberspace security technology
Published 2015-12-01“…网络与信息安全学报…”
Get full text
Article -
133
Research and simulation of timing attacks on ECC
Published 2016-04-01“…网络与信息安全学报…”
Get full text
Article -
134
Visual explanation method for reversible neural networks
Published 2023-12-01“…网络与信息安全学报…”
Get full text
Article -
135
Moving target defense against adversarial attacks
Published 2021-02-01“…网络与信息安全学报…”
Get full text
Article -
136
Personal data privacy protection method based onvertical partitioning
Published 2024-10-01“…网络与信息安全学报…”
Get full text
Article -
137
Generation and verification method of trusted signature seal incorporating handwriting features
Published 2024-02-01“…网络与信息安全学报…”
Get full text
Article -
138
-
139
Approach on runtime monitoring based on the embedded trusted platforms
Published 2017-10-01“…网络与信息安全学报…”
Get full text
Article -
140
Supply chain dynamic multi-center coordination authentication model based on block chain
Published 2016-01-01“…网络与信息安全学报…”
Get full text
Article