-
541
Deniable authentication for multi-party protocol
Published 2016-06-01“…网络与信息安全学报…”
Get full text
Article -
542
Anonymous vehicle authentication scheme based on blockchain technology in the intersection scenario
Published 2020-10-01“…网络与信息安全学报…”
Get full text
Article -
543
Timeout threshold estimation algorithm in mimic multiple executors architecture
Published 2018-10-01“…网络与信息安全学报…”
Get full text
Article -
544
PKI cross-domain authentication scheme based on advanced PBFT algorithm
Published 2020-08-01“…网络与信息安全学报…”
Get full text
Article -
545
Survey on adversarial attacks and defense of face forgery and detection
Published 2023-08-01“…网络与信息安全学报…”
Get full text
Article -
546
Verifiable computation scheme of batch matrix multiplication based on triple perturbation and linear combination
Published 2024-04-01“…网络与信息安全学报…”
Get full text
Article -
547
Adaptive selection method of desensitization algorithm based on privacy risk assessment
Published 2023-06-01“…网络与信息安全学报…”
Get full text
Article -
548
Data augmentation based multi-view contrastive learning graph anomaly detection
Published 2024-10-01“…网络与信息安全学报…”
Get full text
Article -
549
-
550
Innovative professional skills competition to create a police practice talents
Published 2019-06-01“…网络与信息安全学报…”
Get full text
Article -
551
Overview of blockchain assets theft attacks and defense technology
Published 2023-02-01“…网络与信息安全学报…”
Get full text
Article -
552
Image inpainting forensics method based on dual branch network
Published 2022-12-01“…网络与信息安全学报…”
Get full text
Article -
553
Two-party cooperative blind signature based on SM2
Published 2022-12-01“…网络与信息安全学报…”
Get full text
Article -
554
Trajectories anonymous algorithm for association attack
Published 2017-06-01“…网络与信息安全学报…”
Get full text
Article -
555
Practice and exploration of network information security course teaching innovation based on mobile learning and inverted classroom depth integration
Published 2017-09-01“…网络与信息安全学报…”
Get full text
Article -
556
Research on extended access control mechanism in online social network
Published 2021-10-01“…网络与信息安全学报…”
Get full text
Article -
557
Prediction method of 0day attack path based on cyber defense knowledge graph
Published 2022-02-01“…网络与信息安全学报…”
Get full text
Article -
558
Spreading dynamics based key nodes identification in inter-domain routing system
Published 2019-10-01“…网络与信息安全学报…”
Get full text
Article -
559
User interests-based microblog tracing algorithm
Published 2020-12-01“…网络与信息安全学报…”
Get full text
Article -
560
Lightweight mobile Ad Hoc network authentication scheme based on blockchain
Published 2020-08-01“…网络与信息安全学报…”
Get full text
Article