[1] |
Chuntao ZHU, Chengxi YIN, Bolin ZHANG, Qilin YIN, Wei LU.
Forgery face detection method based on multi-domain temporal features mining
[J]. Chinese Journal of Network and Information Security, 2023, 9(3): 123-134.
|
[2] |
Zhao CAI, Tao JING, Shuang REN.
Survey on Ethereum phishing detection technology
[J]. Chinese Journal of Network and Information Security, 2023, 9(2): 21-32.
|
[3] |
Heli WANG, Qiao YAN.
Selfish mining detection scheme based on the characters of transactions
[J]. Chinese Journal of Network and Information Security, 2023, 9(2): 104-114.
|
[4] |
Beiyuan YU, Shanyao REN, Jianwei LIU.
Overview of blockchain assets theft attacks and defense technology
[J]. Chinese Journal of Network and Information Security, 2023, 9(1): 1-17.
|
[5] |
Jin CAO, Xiaoping SHI, Ruhui MA, Hui LI.
Fusion of satellite-ground and inter-satellite AKA protocols for double-layer satellite networks
[J]. Chinese Journal of Network and Information Security, 2023, 9(1): 18-31.
|
[6] |
Fei TANG, Ning GAN, Xianggui YANG, Jinyang WANG.
Anti malicious KGC certificateless signature scheme based on blockchain and domestic cryptographic SM9
[J]. Chinese Journal of Network and Information Security, 2022, 8(6): 9-19.
|
[7] |
Hui GUO, Yong LUO, Xiaolu GUO.
Automotive ethernet controller authentication method based on national cryptographic algorithms
[J]. Chinese Journal of Network and Information Security, 2022, 8(6): 20-28.
|
[8] |
Jun LIU, Lin YUAN, Zhishang FENG.
Survey of key management schemes for cluster networks
[J]. Chinese Journal of Network and Information Security, 2022, 8(6): 52-69.
|
[9] |
Min XIAO, Tao YAO, Yuanni LIU, Yonghong HUANG.
Dynamic and efficient vehicular cloud management scheme with privacy protection
[J]. Chinese Journal of Network and Information Security, 2022, 8(6): 70-83.
|
[10] |
Qi JIANG, Ru FENG, Ruijie ZHANG, Jinhua WANG, Ting CHEN, Fushan WEI.
GRU-based multi-scenario gait authentication for smartphones
[J]. Chinese Journal of Network and Information Security, 2022, 8(5): 26-39.
|
[11] |
Dan LIN, Kaixin LIN, Jiajing WU, Zibin ZHENG.
Bytecode-based approach for Ethereum smart contract classification
[J]. Chinese Journal of Network and Information Security, 2022, 8(5): 111-120.
|
[12] |
Cong YI, Jun HU.
Novel continuous identity authentication method based on mouse behavior
[J]. Chinese Journal of Network and Information Security, 2022, 8(5): 179-188.
|
[13] |
Liquan CHEN, Xiao LI, Zheyi YANG, Sijie QIAN.
Blockchain-based high transparent PKI authentication protocol
[J]. Chinese Journal of Network and Information Security, 2022, 8(4): 1-11.
|
[14] |
Wenbo ZHANG, Simin CHEN, Lifei WEI, Wei SONG, Dongmei HUANG.
State-of-the-art survey of smart contract verification based on formal methods
[J]. Chinese Journal of Network and Information Security, 2022, 8(4): 12-28.
|
[15] |
Feng LIU, Jie YANG, Jiayin QI.
Survey on blockchain privacy protection techniques in cryptography
[J]. Chinese Journal of Network and Information Security, 2022, 8(4): 29-44.
|