-
581
Design of privacy-preserving authentication protocol for service invocation
Published 2018-03-01“…网络与信息安全学报…”
Get full text
Article -
582
-
583
Survey on the development of mimic defense in cyberspace:from mimic concept to “mimic+” ecology
Published 2022-04-01“…网络与信息安全学报…”
Get full text
Article -
584
Identity preserving face completion with generative adversarial networks
Published 2018-08-01“…网络与信息安全学报…”
Get full text
Article -
585
Multi-scale Logo detection algorithm based on convolutional neural network
Published 2020-04-01“…网络与信息安全学报…”
Get full text
Article -
586
Information tracing model based on PageRank
Published 2017-08-01“…网络与信息安全学报…”
Get full text
Article -
587
Method on intrusion detection for industrial internet based on light gradient boosting machine
Published 2023-04-01“…网络与信息安全学报…”
Get full text
Article -
588
Dynamic hierarchical quantum secret sharing protocol based on high-dimensional GHZ state
Published 2024-10-01“…网络与信息安全学报…”
Get full text
Article -
589
Protocol to enhance the security of Early data in TLS 1.3
Published 2017-12-01“…网络与信息安全学报…”
Get full text
Article -
590
Partial blind signature scheme based on SM9 algorithm
Published 2021-08-01“…网络与信息安全学报…”
Get full text
Article -
591
Digital multi-signature scheme based on bilinear pairing
Published 2016-06-01“…网络与信息安全学报…”
Get full text
Article -
592
Research on privacy-preserving learning machines
Published 2016-06-01“…网络与信息安全学报…”
Get full text
Article -
593
-
594
Enhanced method based on virtual registers rotation
Published 2018-05-01“…网络与信息安全学报…”
Get full text
Article -
595
High speed national secret SM4 optical fiber communication system scheme based on FPGA
Published 2023-12-01“…网络与信息安全学报…”
Get full text
Article -
596
Research progress and trend of text summarization
Published 2018-06-01“…网络与信息安全学报…”
Get full text
Article -
597
Overview of privacy preserving in social network
Published 2016-04-01“…网络与信息安全学报…”
Get full text
Article -
598
STE-based encrypted relational database scheme with reduced leakages
Published 2024-04-01“…网络与信息安全学报…”
Get full text
Article -
599
Research on FAHP based Trojan attack effect evaluation
Published 2016-07-01“…网络与信息安全学报…”
Get full text
Article -
600
Automatic search algorithm for differential characteristics in ARX ciphers
Published 2016-05-01“…网络与信息安全学报…”
Get full text
Article