Announcement
Editors Recommend
15 February 2021, Volume 7 Issue 1
Comprehensive Review
Survey of artificial intelligence data security and privacy protection
Kui REN, Quanrun MENG, Shoukun YAN, Zhan QIN
2021, 7(1):  1-10.  doi:10.11959/j.issn.2096-109x.2021001
Asbtract ( 202 )   HTML ( 50)   PDF (780KB) ( 413 )   Knowledge map   
References | Related Articles | Metrics

Artificial intelligence and deep learning algorithms are developing rapidly.These emerging techniques have been widely used in audio and video recognition, natural language processing and other fields.However, in recent years, researchers have found that there are many security risks in the current mainstream artificial intelligence model, and these problems will limit the development of AI.Therefore, the data security and privacy protection was studied in AI.For data and privacy leakage, the model output based and model update based problem of data leakage were studied.In the model output based problem of data leakage, the principles and research status of model extraction attack, model inversion attack and membership inference attack were discussed.In the model update based problem of data leakage, how attackers steal private data in the process of distributed training was discussed.For data and privacy protection, three kinds of defense methods, namely model structure defense, information confusion defense and query control defense were studied.In summarize, the theoretical foundations, classic algorithms of data inference attack techniques were introduced.A few research efforts on the defense techniques were described in order to provoke further research efforts in this critical area.

Topic Ⅰ: Security Architecture Applications of Novel Network
Research on bionic mechanism based endogenous security defense system
Aiqun HU, Lanting FANG, Tao LI
2021, 7(1):  11-19.  doi:10.11959/j.issn.2096-109x.2021002
Asbtract ( 164 )   HTML ( 38)   PDF (818KB) ( 178 )   Knowledge map   
Figures and Tables | References | Related Articles | Metrics

Shell-based security defense technologies such as firewall, intrusion detection and anti-virus cannot be updated in a timely fashion upon identification of attacks.The security defense mechanism is not associated with the security status of network devices, resulting in low security performance.To solve the above problems, an endogenous security defense system based on the bionic security mechanism was proposed.Firstly, imitating the security defense mechanism of the organism, the endogenous security system integrated the security component with each other at the construction process.Secondly, the endogenous security associates all security components through network interconnection, and proposed a defense in depth and comprehensive approach to increase the security of a system.Finally, through the self-learning, endogenous security's ability of threat detection was continuous enhanced.By integrating the security system and information system, an endogenous security defense system was constructed.The endogenous security defense system can handle the challenges such as low defensive efficiency ratio, high-speed data processing, and unknown threats detection.The endogenous security system is an efficient security defense system of “innate growth and independent growth”.It meets the development needs of information systems with “high availability, security and high efficiency”.

Research on cross-domain access control technology
Tianyi ZHU, Fenghua LI, Lin CHENG, Yunchuan GUO
2021, 7(1):  20-27.  doi:10.11959/j.issn.2096-109x.2021003
Asbtract ( 67 )   HTML ( 17)   PDF (680KB) ( 115 )   Knowledge map   
References | Related Articles | Metrics

Based on the latest research at home and abroad, the access control technology in cross-domain data flow were summarized and prospected.Firstly, combined with access control in complex application environments, the development of access control models and data security modelswere summarized.The advantages and disadvantages of access control policy management were analyzed.Secondly, the research on access control policy management from the aspects of data marking, policy matching and policy conflict detection were discussed respectively.Finally, the research status of data marking technology and authorization and extension control technology in unified authorization management were summarized.

Research on security scenarios and security models for 6G networking
Chenglei ZHANG, Yulong FU, Hui LI, Jin CAO
2021, 7(1):  28-45.  doi:10.11959/j.issn.2096-109x.2021004
Asbtract ( 96 )   HTML ( 39)   PDF (11444KB) ( 86 )   Knowledge map   
Figures and Tables | References | Related Articles | Metrics

The concept of 6G has been proposed and has attracted the wide attention of academe.Generally speaking, the 6G network will optimize the performance of 5G, and expand the network scenarios which are difficult to achieve within 5G.However, the introduction of new scenarios and technologies will also bring new security threats to cyber security.The research progress on the key technologies and implementation methods of the 6G were conducted.To summarize a vision of core technologies of 6G, the research work of major 5G/6G research institutions, companies and enterprises were focused on .On this basis, the possible security problems and security challenges in 6G network were put forward.Finally, according to the existing network techniques, the possible solutions and proposed a general security model for 6G networks were discussed.

Network function heterogeneous redundancy deployment method based on immune algorithm
Qingqing ZHANG, Hongbo TANG, Wei YOU, Yingle LI
2021, 7(1):  46-56.  doi:10.11959/j.issn.2096-109x.2021005
Asbtract ( 45 )   HTML ( 22)   PDF (1319KB) ( 46 )   Knowledge map   
Figures and Tables | References | Related Articles | Metrics

Aiming at the problem that the existing security defense methods cannot resist many unknown vulnerabilities and backdoors in the network function virtualization platform, a mimic defense architecture for network function virtualization using mimic defense ideas was proposed, a heterogeneous redundant deployment method based on an immune algorithm for the construction of heterogeneous pools was proposed.Firstly, the degree of heterogeneity between heterogeneous entities was quantitatively evaluated in combination with the entropy value method, then the network function heterogeneous redundant deployment problem was constructed into a minimax problem with the optimization goal of maximizing the degree of heterogeneity between heterogeneous entities, and finally the immune algorithm was used to quickly solve the optimal deployment solution of network functions.Simulation results show that the proposed method can quickly converge to an optimal deployment scheme and ensure that the overall distribution of heterogeneity between heterogeneous bodies is at a high level, effectively increasing the diversity between heterogeneous bodies and improving the attacker's difficulty.

Topic Ⅱ: Blockchain Security
Rapid responsive and efficient multi-valued Byzantine consensus scheme
Wang ZHOU, Honggang HU, Nenghai YU
2021, 7(1):  57-64.  doi:10.11959/j.issn.2096-109x.2021006
Asbtract ( 56 )   HTML ( 17)   PDF (895KB) ( 64 )   Knowledge map   
Figures and Tables | References | Related Articles | Metrics

Due to the increase of network equipments and the uncertainty of the transmission environment, the message delay is also uncertain, and the asynchronous consensus protocol possesses more advantages.Miller et al proposed the first asynchronous consensus protocol HoneyBadgerBFT in 2016, but its transmission efficiency can be optimized furthermore while achieving high throughput.The broadcast protocol in HoneyBadgerBFT was improved by reducing the message complexity in the broadcast process, and adding optional message request process to achieve rapid response and efficient transmission.

Embedding of national cryptographic algorithm in Hyperledger Fabric
Qi CAO, Shuhua RUAN, Xingshu CHEN, Xiao LAN, Hongxia ZHANG, Hongjian JIN
2021, 7(1):  65-75.  doi:10.11959/j.issn.2096-109x.2021007
Asbtract ( 80 )   HTML ( 19)   PDF (2809KB) ( 60 )   Knowledge map   
Figures and Tables | References | Related Articles | Metrics

Hyperledger Fabric is an extensible alliance blockchain platform and provides support for enterprise-level commercial blockchain projects.The cryptographic algorithm is the core technologies of the platform, ensuring the security and non-tampering of the data on the chain.But the original Fabric platform lacks the national cryptographic algorithm support.The embedding and support of the national cryptographic algorithm of the Fabric platform was designed and implemented.Firstly, the interaction logic of between components and the invocation scenario of each type of cryptographic algorithm in the Fabric platform were analyzed, an idea of embedding national cryptographic algorithm support for the platform was proposed.Secondly, the modules and interfaces for SM2, SM3 and SM4 were added to BCCSP of the Fabric platform based on the open source code of national cryptographic algorithm implementation.Thirdly, the interface of cryptographic algorithm invoked by the upper layer of each component is associated to the interface of corresponding national cryptographic algorithms, which realized the invocation support of national cryptographic algorithm for the upper layer applications.Finally, the correctness and effectiveness of the embedded national cryptographic algorithm were verified by creating a fabric-gm test instance.And compared with the performances of the test instance built by the mirror of the native Fabric platform.The experimental results show that the embedded national cryptographic algorithm interfaces are corrected and the generated national cryptographic certificates are effective.Moreover, compared with the native Fabric platform, the network start up time increases by about 3%.In the millisecond unit, the transaction time cost increases by about one time, the dynamic certificate generation time increases by about 9%, and all the performance are within the acceptable range.

Compression of bitcoin blockchain
Xiaojiao CHEN, Xianzheng LIN, Nenghai YU
2021, 7(1):  76-83.  doi:10.11959/j.issn.2096-109x.2021008
Asbtract ( 56 )   HTML ( 10)   PDF (1550KB) ( 46 )   Knowledge map   
Figures and Tables | References | Related Articles | Metrics

The blockchain provides an immutable, transparent, and decentralized method for data storage.However, as the volume of data gradually increases, the public blockchain system requires significant storage space.The bitcoin block's structure was analyzed.A method was introduced to compress the size of transactions in the bitcoin blockchain by encoding specific fields.Experiment shows that the proposed method can reduce the storage space of the bitcoin blockchain by 18.13%.

Bitcoin blockchain based information convert transmission
Tao ZHANG, Qianhong WU, Zongxun TANG
2021, 7(1):  84-92.  doi:10.11959/j.issn.2096-109x.2021009
Asbtract ( 59 )   HTML ( 16)   PDF (801KB) ( 63 )   Knowledge map   
Figures and Tables | References | Related Articles | Metrics

To meet efficient, safe, covert and stable transmission of confidential information, the transaction data structures, location and capacity of potential convert channels were analyzed.Then a formal security model of covert transmission in the bitcoin blockchain environment was proposed, which would not break the transaction structures, add special transaction content, can overcome shortcomings of traditional convert channels and protect the anonymity of both sender and receiver.The proposed security model opens a promising avenue of covert transmission, which is of great significance to promote the secure transmission technologies for the national special applications.

Papers
Privacy protection key distribution protocol for edge computing
Jian SHEN, Tianqi ZHOU, Chen WANG, Huijie YANG
2021, 7(1):  93-100.  doi:10.11959/j.issn.2096-109x.2021010
Asbtract ( 76 )   HTML ( 17)   PDF (1815KB) ( 77 )   Knowledge map   
Figures and Tables | References | Related Articles | Metrics

Aiming at the privacy protection problem in the multi-application scenarios of edge computing, two policy-based key distribution protocols were proposed.The proposed protocols are based on the concept of constrained pseudo-random functions to achieve efficient and flexible policy selection.Specifically, based on the GGM pseudo-random number generator, the key distribution protocol with a prefix-predicate is constructed, which can effectively support lightweight and efficient key distribution.Moreover, based on the multilinear pairing, the key distribution protocol with a bit fixing predicate is constructed.This protocol can support flexible and fine-grained strategy selection and is suitable for dynamic and flexible multi-device scenarios in heterogeneous networks.Finally, the security proof of the proposed protocols is presented.

Mimic cloud service architecture for cloud applications
Liming PU, Hongquan WEI, Xing LI, Yiming JIANG
2021, 7(1):  101-112.  doi:10.11959/j.issn.2096-109x.2021011
Asbtract ( 42 )   HTML ( 8)   PDF (1894KB) ( 40 )   Knowledge map   
Figures and Tables | References | Related Articles | Metrics

In order to solve the problem of the lack of heterogeneity and dynamics of cloud application services with a single executor, and the difficulty of dealing with the security threats of unknown vulnerabilities and backdoors, a mimic cloud service architecture was proposed.In this architecture, the application services provided by the cloud platform were constructed into a service package based on mimic defense technology, so that the application services had the endogenous security features and robustness brought by mimic structure.At the same time, two key mimic cloud services operating mechanism,policy scheduling and adjudication mechanism were discussed.The experimental results and analysis show that the mimic cloud service obtains better security and its response time delay can be reduced by reducing the performance difference of the executor.

Moving target defense against adversarial attacks
Bin WANG, Liang CHEN, Yaguan QIAN, Yankai GUO, Qiqi SHAO, Jiamin WANG
2021, 7(1):  113-120.  doi:10.11959/j.issn.2096-109x.2021012
Asbtract ( 46 )   HTML ( 4)   PDF (1315KB) ( 64 )   Knowledge map   
Figures and Tables | References | Related Articles | Metrics

Deep neural network has been successfully applied to image classification, but recent research work shows that deep neural network is vulnerable to adversarial attacks.A moving target defense method was proposed by means of dynamic switching model with a Bayes-Stackelberg game strategy, which could prevent an attacker from continuously obtaining consistent information and thus blocked its construction of adversarial examples.To improve the defense effect of the proposed method, the gradient consistency among the member models was taken as a measure to construct a new loss function in training for improving the difference among the member models.Experimental results show that the proposed method can improve the moving target defense performance of the image classification system and significantly reduce the attack success rate against the adversarial examples.

Secure data collection method of WSN based on mobile Sink
Chunyu MIAO, Yuan FAN, Hui LI, Kaiqiang GE, Xiaomeng ZHANG
2021, 7(1):  121-129.  doi:10.11959/j.issn.2096-109x.2021013
Asbtract ( 41 )   HTML ( 14)   PDF (1235KB) ( 22 )   Knowledge map   
Figures and Tables | References | Related Articles | Metrics

At present, WSN data collection method based on mobile Sink has some problems, such as low detection rate of network attack and large memory cost, which makes the network vulnerable to network attack and difficult to be applied in practice.To solve this problem, a secure data collection WSN method of WSN based on mobile Sink was proposed, which used convex hull algorithm of energy perception to identify data collection points, used elliptic encryption algorithm (ECC) to generate key for all nodes in the network, used ElGamal algorithm to realize node identity and message authentication, and used support vector machine (SVM) to identify network attack types.The simulation results show that the proposed secure data collection method has good performance in attack detection rate, memory overhead and packet delivery rate.

Research on security defense of mobile edge computing
Lu CHEN, Hongbo TANG, Wei YOU, Yi BAI
2021, 7(1):  130-142.  doi:10.11959/j.issn.2096-109x.2021014
Asbtract ( 79 )   HTML ( 16)   PDF (2031KB) ( 87 )   Knowledge map   
Figures and Tables | References | Related Articles | Metrics

Mobile Edge Computing can solve the problem of heavy backhaul link overloaded and long delay effectively by further extending the telecommunication cellular network to other wireless access networks.However, the MEC nodes are exposed to the edge of the network whose computing resource, storage capacity and energy resource are limited, they are more vulnerable to the illegal attacks by attackers.Based on the briefly analysis of the security threats faced by mobile edge computing, some key problems and challenges of mobile edge computing for four different security subjects, device security, node security, network resources and tasks, and migration security are summed up and expounded, and the existing security solutions were summarized.Finally, the open research and future development trend of mobile edge computing security defense on three aspects that limited resource defense model in the dynamic scene, resource deployment based on comprehensive trust and user-centered service reliability assurance are discussed.

Two-layer threat analysis model integrating macro and micro
Cheng SUN, Hao HU, Yingjie YANG, Hongqi ZHANG
2021, 7(1):  143-156.  doi:10.11959/j.issn.2096-109x.2021015
Asbtract ( 39 )   HTML ( 7)   PDF (2462KB) ( 35 )   Knowledge map   
Figures and Tables | References | Related Articles | Metrics

The existing threat analysis models failed to comprehensively analyze the propagation of advanced security threats integrating the threat development trend and propagation path.In order to solve the problem, a two-layer threat analysis model named TL-TAM was established.The upper layer of the model depicted the threat development trend.The lower layer depicted the threat propagation path considering social engineering and networks can.Based on the model, prediction algorithm of threat development was proposed.The experimental result shows that the model can comprehensively analyze the threat propagation at multiple levels, overcome the defect that the threat analysis model based on attack graph is limited to technical vulnerability attack, and is more suitable for dynamic tracking analysis of advanced security threats.

Dynamic privacy measurement model and evaluation system for mobile edge crowdsensing
Mingfeng ZHAO, Chen LEI, Yang ZHONG, Jinbo XIONG
2021, 7(1):  157-166.  doi:10.11959/j.issn.2096-109x.2021016
Asbtract ( 66 )   HTML ( 12)   PDF (17060KB) ( 53 )   Knowledge map   
Figures and Tables | References | Related Articles | Metrics

To tackle the problems of users not having intuitive cognition of the dynamic privacy changes contained in their sensing data in mobile edge crowdsensing (MECS) and lack of personalized privacy risk warning values in the data uploading stage, a dynamic privacy measurement (DPM) model was proposed.A structured representation of data obtained by a user participating in a sensing task was introduced and was transformed it into a numerical matrix.Then privacy attribute preference and timeliness were presented to quantify the dynamic privacy changes of data.With this, personalized privacy thresholds of users based on the numerical matrix were reasonably calculated.Finally, differential privacy processing was performed on the numerical matrix, and a model evaluation system was designed for the proposed model.The simulation results show that the DPM model was effective and practical.According to the given example, a data utility of approximately 0.7 can be achieved, and the degree of privacy protection can be significantly improved as the noise level increases, adapting to the MECS of IoT.

Chinese Journal of Network and Information Security. 2017 Vol. 3 (3): 71-77 doi: 10.11959/j.issn.2096-109x.2017.00157
Abstract5647)   HTML44)    PDF (169KB)(61036)    Knowledge map   
Survey of block chain
Xin SHEN,Qing-qi PEI,Xue-feng LIU
Chinese Journal of Network and Information Security. 2016 Vol. 2 (11): 11-20 doi: 10.11959/j.issn.2096-109x.2016.00107
Abstract14896)   HTML664)    PDF (461KB)(23303)    Knowledge map   
Study on BGP route leak
Jia JIA,Zhi-wei YAN,Guang-gang GENG,Jian JIN
Chinese Journal of Network and Information Security. 2016 Vol. 2 (8): 54-61 doi: 10.11959/j.issn.2096-109x.2016.00074
Abstract2534)   HTML24)    PDF (472KB)(19794)    Knowledge map   
Research on host malcode detection using machine learning
Dong ZHANG,Yao ZHANG,Gang LIU,Gui-xiang SONG
Chinese Journal of Network and Information Security. 2017 Vol. 3 (7): 25-32 doi: 10.11959/j.issn.2096-109x.2017.00179
Abstract2303)   HTML57)    PDF (648KB)(11482)    Knowledge map   
Supply chain dynamic multi-center coordination authentication model based on block chain
Jian-ming ZHU,Yong-gui FU
Chinese Journal of Network and Information Security. 2016 Vol. 2 (1): 27-33 doi: 10.11959/j.issn.2096-109x.2016.00019
Abstract5609)   HTML82)    PDF (1052KB)(10517)    Knowledge map   
Research progress and trend of text summarization
Tuosiyu MING, Hongchang CHEN
Chinese Journal of Network and Information Security. 2018 Vol. 4 (6): 1-10 doi: 10.11959/j.issn.2096-109x.2018048
Abstract5168)   HTML43)    PDF (568KB)(9288)    Knowledge map   
Define cyberspace security
Binxing FANG
Chinese Journal of Network and Information Security. 2018 Vol. 4 (1): 1-5 doi: 10.11959/j.issn.2096-109x.2018002
Abstract3765)   HTML76)    PDF (456KB)(9199)    Knowledge map   
Machine learning security and privacy:a survey
Lei SONG, Chunguang MA, Guanghan DUAN
Chinese Journal of Network and Information Security. 2018 Vol. 4 (8): 1-11 doi: 10.11959/j.issn.2096-109x.2018067
Abstract5072)   HTML98)    PDF (701KB)(7957)    Knowledge map   
Analysis and enlightenment on the cybersecurity strategy of various countries in the world
Yu-xiao LI,Yong-jiang XIE
Chinese Journal of Network and Information Security. 2016 Vol. 2 (1): 1-5 doi: 10.11959/j.issn.2096-109x.2016.00017
Abstract2096)   HTML19)    PDF (374KB)(7953)    Knowledge map   
Research of phishing detection technology
Xi ZHANG,Zhi-wei YAN,Hong-tao LI,Guang-gang GENG
Chinese Journal of Network and Information Security. 2017 Vol. 3 (7): 7-24 doi: 10.11959/j.issn.2096-109x.2017.00180
Abstract1953)   HTML21)    PDF (870KB)(7802)    Knowledge map   
Survey of DDoS defense:challenges and directions
Fei CHEN,Xiao-hong BI,Jing-jing WANG,Yuan LIU
Chinese Journal of Network and Information Security. 2017 Vol. 3 (10): 16-24 doi: 10.11959/j.issn.2096-109x.2017.00202
Abstract2239)   HTML29)    PDF (555KB)(7647)    Knowledge map   
Machine learning algorithm for intelligent detection of WebShell
Hua DAI,Jing LI,Xin-dai LU,Xin SUN
Chinese Journal of Network and Information Security. 2017 Vol. 3 (4): 51-57 doi: 10.11959/j.issn.2096-109x.2017.00126
Abstract2498)   HTML26)    PDF (671KB)(7472)    Knowledge map   
Symbolic execution based control flow graph extraction method for Android native codes
Hui-ying YAN,Zhen-ji ZHOU,Li-fa WU,Zheng HONG,He SUN
Chinese Journal of Network and Information Security. 2017 Vol. 3 (7): 33-46 doi: 10.11959/j.issn.2096-109x.2017.00178
Abstract1311)   HTML5)    PDF (619KB)(7324)    Knowledge map   
Data security and protection techniques in big data:a survey
Kai-min WEI,Jian WENG,Kui REN
Chinese Journal of Network and Information Security. 2016 Vol. 2 (4): 1-11 doi: 10.11959/j.issn.2096-109x.2016.00046
Abstract3411)   HTML41)    PDF (1446KB)(6902)    Knowledge map   
Suggestions on cyber security talents cultivation
Hui LI,Ning ZHANG
Chinese Journal of Network and Information Security. 2015 Vol. 1 (1): 18-23 doi: 10.11959/j.issn.2096-109x.2015.00003
Abstract1868)   HTML27)    PDF (357KB)(6882)    Knowledge map   
Review of key technology and its application of blockchain
Feng ZHANG, Boxuan SHI, Wenbao JIANG
Chinese Journal of Network and Information Security. 2018 Vol. 4 (4): 22-29 doi: 10.11959/j.issn.2096-109x.2018028
Abstract3777)   HTML135)    PDF (690KB)(6580)    Knowledge map   
Malware classification method based on static multiple-feature fusion
Bo-wen SUN,Yan-yi HUANG,Qiao-kun WEN,Bin TIAN,Peng WU,Qi LI
Chinese Journal of Network and Information Security. 2017 Vol. 3 (11): 68-76 doi: 10.11959/j.issn.2096-109x.2017.00217
Abstract1306)   HTML32)    PDF (529KB)(6393)    Knowledge map   
Progress of research on privacy protection for data publication and data mining
Jiao WANG,Ke-feng FAN,Yong WANG
Chinese Journal of Network and Information Security. 2016 Vol. 2 (1): 18-26 doi: 10.11959/j.issn.2096-109x.2016.00021
Abstract1385)   HTML10)    PDF (965KB)(6280)    Knowledge map   
Study of Row Hammer attack
Wenwei WANG,Peishun LIU
Chinese Journal of Network and Information Security. 2018 Vol. 4 (1): 69-75 doi: 10.11959/j.issn.2096-109x.2018007
Abstract970)   HTML9)    PDF (577KB)(5808)    Knowledge map   
Analysis of cyberspace security based on game theory
Jian-ming ZHU,Qin WANG
Chinese Journal of Network and Information Security. 2015 Vol. 1 (1): 43-49 doi: 10.11959/j.issn.2096-109x.2015.00006
Abstract1767)   HTML11)    PDF (764KB)(5749)    Knowledge map   
Survey of block chain
Xin SHEN,Qing-qi PEI,Xue-feng LIU
Chinese Journal of Network and Information Security. 2016 Vol. 2 (11): 11-20
doi: 10.11959/j.issn.2096-109x.2016.00107
Abstract( 14896 )   HTML PDF (461KB) (23303 Knowledge map   
Relation extraction based on CNN and Bi-LSTM
Xiaobin ZHANG, Fucai CHEN, Ruiyang HUANG
Chinese Journal of Network and Information Security. 2018 Vol. 4 (9): 44-51
doi: 10.11959/j.issn.2096-109x.2018074
Abstract( 8178 )   HTML PDF (618KB) (3390 Knowledge map   
Blockchain-based digital copyright trading system
Li LI,Siqin ZHOU,Qin LIU,Debiao HE
Chinese Journal of Network and Information Security. 2018 Vol. 4 (7): 22-29
doi: 10.11959/j.issn.2096-109x.2018060
Abstract( 8031 )   HTML PDF (771KB) (3157 Knowledge map   
Chinese Journal of Network and Information Security. 2017 Vol. 3 (3): 71-77
doi: 10.11959/j.issn.2096-109x.2017.00157
Abstract( 5647 )   HTML PDF (169KB) (61036 Knowledge map   
Supply chain dynamic multi-center coordination authentication model based on block chain
Jian-ming ZHU,Yong-gui FU
Chinese Journal of Network and Information Security. 2016 Vol. 2 (1): 27-33
doi: 10.11959/j.issn.2096-109x.2016.00019
Abstract( 5609 )   HTML PDF (1052KB) (10517 Knowledge map   
Copyright Information
Bimonthly, started in 2015
Authorized by:Ministry of Industry and Information Technology of the People's Republic of China
Sponsored by:Posts and Telecommunications Press
Co-sponsored by:Xidian University, Beihang University, Huazhong University of Science and Technology, Zhejiang University
Edited by:Editorial Board of Chinese Journal of Network and Information Security
Editor-in-Chief:FANG Bin-xing
Executive Editor-in-Chief:LI Feng-hua
Director:YI Dong-shan
Address:F8,You Dian Publisher Building,No.11,Chengshousi Road,Fengtai District,Beijing 100078,PR China
Tel:+8610-81055479, 81055456
Fax:+86-81055464
ISSN 2096-109X
CN 10-1366/TP
visited
Total visitors:
Visitors of today:
Now online: