[1] |
Yilong WANG, Zhenyu LI, Daofu GONG, Fenlin LIU.
Image double fragile watermarking algorithm based on block neighborhood
[J]. Chinese Journal of Network and Information Security, 2023, 9(3): 38-48.
|
[2] |
Zheng XU.
Further accelerating the search of differential characteristics based on the SAT method
[J]. Chinese Journal of Network and Information Security, 2022, 8(5): 129-139.
|
[3] |
Zhe LI,Yiliang HAN,Yu LI.
Improved RLCE public key encryption scheme based on Polar codes
[J]. Chinese Journal of Network and Information Security, 2020, 6(5): 110-118.
|
[4] |
Jian LIU,Yi ZHANG,Yuling LIU,Hao HU.
Analysis and design of visual secret sharing scheme for gray image
[J]. Chinese Journal of Network and Information Security, 2020, 6(4): 140-147.
|
[5] |
Jing WANG,Zumeng LI.
Forgery attacks on several certificateless signature schemes
[J]. Chinese Journal of Network and Information Security, 2020, 6(3): 108-112.
|
[6] |
Suqing LIN.
Verifiable outsourced attribute-based encryption with access update
[J]. Chinese Journal of Network and Information Security, 2019, 5(1): 37-49.
|
[7] |
Li LI,Siqin ZHOU,Qin LIU,Debiao HE.
Blockchain-based digital copyright trading system
[J]. Chinese Journal of Network and Information Security, 2018, 4(7): 22-29.
|
[8] |
Yu FU,Lianliang SUN,Xiaoping WU.
QR code security management system based on WPKI and iris recognition
[J]. Chinese Journal of Network and Information Security, 2018, 4(5): 62-68.
|
[9] |
You YU,Yu FU,Xiaoping WU.
Destruction strategy for disks based on AES encrypted storage
[J]. Chinese Journal of Network and Information Security, 2018, 4(4): 72-76.
|
[10] |
Yu-dan TIAN,Yong-zhuang WEI.
New cryptanalysis of the authenticated cipher model JAMBU
[J]. Chinese Journal of Network and Information Security, 2017, 3(7): 53-57.
|
[11] |
Xing-lan ZHANG,Xiang LIU.
Secure efficient and verifiable large linear equations solve outsourcing computing scheme
[J]. Chinese Journal of Network and Information Security, 2017, 3(6): 1-7.
|
[12] |
Deng-pan YE,Fang-fang MA,Yuan MEI.
Steganalysis based on transfer learning
[J]. Chinese Journal of Network and Information Security, 2017, 3(1): 23-30.
|
[13] |
Xin-xia SONG,Zhi-gang CHEN,Guo-min ZHOU.
NTRU-type fully homomorphic encryption scheme without key switching
[J]. Chinese Journal of Network and Information Security, 2017, 3(1): 39-45.
|
[14] |
Cong-hua ZHOU,Wei-he CHEN,Zhi-feng LIU.
Formal specification and security verification of usage control model based on PAT
[J]. Chinese Journal of Network and Information Security, 2016, 2(3): 52-67.
|
[15] |
Xia WU,Heng-yue JIA,Jian-ming ZHU.
Entangled state testing in the quantum Byzantine agreement
[J]. Chinese Journal of Network and Information Security, 2016, 2(11): 30-38.
|