[1] |
Ganqin LIU, Hui LI, Hui ZHU, Yukun HUANG, Xingdong LIU.
Public key cryptographic algorithm SM2 optimized implementation on low power embedded platform
[J]. Chinese Journal of Network and Information Security, 2022, 8(6): 29-38.
|
[2] |
Jun LIU, Lin YUAN, Zhishang FENG.
Survey of key management schemes for cluster networks
[J]. Chinese Journal of Network and Information Security, 2022, 8(6): 52-69.
|
[3] |
Yi XIA, Mingjng LAN, Xiaohui CHEN, Junyong LUO, Gang ZHOU, Peng HE.
Survey on explainable knowledge graph reasoning methods
[J]. Chinese Journal of Network and Information Security, 2022, 8(5): 1-25.
|
[4] |
Guyue LI, Aiqun HU.
Exploration and practice on integration of ideological, political courses into professional courses of cyberspace security specialty
[J]. Chinese Journal of Network and Information Security, 2022, 8(2): 183-189.
|
[5] |
Rongna XIE, Xiaonan FAN, Lin YUAN, Zichen GUO, Jiayu ZHU, Guozhen SHI.
Research on extended access control mechanism in online social network
[J]. Chinese Journal of Network and Information Security, 2021, 7(5): 123-131.
|
[6] |
Jin LI, Jin CAO, Yueyu ZHANG, Meiru ZHANG, Hui LI.
Reverse teaching design of curriculum ideological and political in information security major—Take the wireless communication network security course of Xidian University as an example
[J]. Chinese Journal of Network and Information Security, 2021, 7(3): 166-174.
|
[7] |
Fu XIAO, Haiping HUANG, Sujun HU, Lijuan SUN.
Research on the cultivation of cyber security talents under the perspective of double tops based on Jiangsu province
[J]. Chinese Journal of Network and Information Security, 2021, 7(2): 1-9.
|
[8] |
Guojie LIU,Jianbiao ZHANG.
TPCM-based trusted PXE boot method for servers
[J]. Chinese Journal of Network and Information Security, 2020, 6(6): 105-111.
|
[9] |
Qiao HU,Yupeng HU,Xin LIAO,Zheng QIN,Jianhua SUN,Jiliang ZHANG.
Investigation,analysis and improvement mentality of the revision on information security’s training program to undergraduates in Hunan University
[J]. Chinese Journal of Network and Information Security, 2020, 6(4): 153-158.
|
[10] |
Qiang QU,Hongtao YU,Ruiyang HUANG.
Attention-based approach of detecting spam in social networks
[J]. Chinese Journal of Network and Information Security, 2020, 6(1): 54-61.
|
[11] |
ZHANG Huanguo,DU Ruiying.
Introduction to cyberspace security discipline
[J]. Chinese Journal of Network and Information Security, 2019, 5(3): 4-18.
|
[12] |
XU Tongge,LIU Lianzhong,LIU Jianwei,MAO Jian.
Preliminary study on the cultivation mode of innovative talents in the first-class cyber security college
[J]. Chinese Journal of Network and Information Security, 2019, 5(3): 19-24.
|
[13] |
JIA Chunfu,LI Ruiqi,TIAN Meiqi,CHENG Xiaoyang.
Discuss on cultivating mode of information security and law inter-disciplinary talents
[J]. Chinese Journal of Network and Information Security, 2019, 5(3): 31-35.
|
[14] |
HU Aiqun,LI Guyue,PENG Linning,LI Tao.
Exploration of teaching method incorporating ideological elements for the cutting-edge technology of cyberspace security
[J]. Chinese Journal of Network and Information Security, 2019, 5(3): 54-66.
|
[15] |
CHEN Kai,FU Cai,ZOU Deqing,QIANG Weizhong,CUI Yongquan,HAN Lansheng.
Construction of cyberspace security course system of comprehensive practice and graded customs clearance
[J]. Chinese Journal of Network and Information Security, 2019, 5(3): 67-74.
|