-
561
Research on link detection technology based on dynamic browser fingerprint
Published 2022-08-01“…网络与信息安全学报…”
Get full text
Article -
562
Research progress of access control based on blockchain
Published 2021-12-01“…网络与信息安全学报…”
Get full text
Article -
563
Forgery attacks on several certificateless signature schemes
Published 2020-06-01“…网络与信息安全学报…”
Get full text
Article -
564
System detecting network anomaly with visualization techniques
Published 2018-02-01“…网络与信息安全学报…”
Get full text
Article -
565
Low failure recovery cost controller placement strategy in software defined networks
Published 2020-12-01“…网络与信息安全学报…”
Get full text
Article -
566
Progress of research on privacy protection for data publication and data mining
Published 2016-01-01“…网络与信息安全学报…”
Get full text
Article -
567
Detection of SSL/TLS protocol attacks based on flow spectrum theory
Published 2022-02-01“…网络与信息安全学报…”
Get full text
Article -
568
Quantitative threat situational assessment method for higher secure attribute value device
Published 2020-10-01“…网络与信息安全学报…”
Get full text
Article -
569
Survey on quantitative evaluations of moving target defense
Published 2018-09-01“…网络与信息安全学报…”
Get full text
Article -
570
Security issues and system structure of internet of vehicles
Published 2016-02-01“…网络与信息安全学报…”
Get full text
Article -
571
Static-analysis-based event input generation approach for Android application
Published 2017-06-01“…网络与信息安全学报…”
Get full text
Article -
572
Homomorphic encryption location privacy-preserving scheme based on Markov model
Published 2017-01-01“…网络与信息安全学报…”
Get full text
Article -
573
Truthful incentive mechanism for “digital currency”based on privacy protection
Published 2019-04-01“…网络与信息安全学报…”
Get full text
Article -
574
Compact software/hardware co-design and implementation method of Aigis-sig digital signature scheme
Published 2021-04-01“…网络与信息安全学报…”
Get full text
Article -
575
Post-quantum encryption technology based on BRLWE for internet of things
Published 2022-10-01“…网络与信息安全学报…”
Get full text
Article -
576
Cooperative trajectory prediction system for intelligent and automated connected convoy based on blockchain
Published 2020-06-01“…网络与信息安全学报…”
Get full text
Article -
577
Model of the malicious traffic classification based on hypergraph neural network
Published 2023-10-01“…网络与信息安全学报…”
Get full text
Article -
578
Detecting privacy compliance of mobile applications from the perspective of the "minimum necessary" principle
Published 2024-12-01“…网络与信息安全学报…”
Get full text
Article -
579
Analysis and defense of the BlackEnergy malware in the Ukrainian electric power system
Published 2017-01-01“…网络与信息安全学报…”
Get full text
Article -
580
Rational exchange protocol model based on mixed strategy
Published 2016-03-01“…网络与信息安全学报…”
Get full text
Article