[1] |
Wei JIN, Fenghua LI, Ziyan ZHOU, Xiyang SUN, Yunchuan GUO.
Cache of cryptographic key based on query popularity
[J]. Chinese Journal of Network and Information Security, 2023, 9(1): 83-91.
|
[2] |
Jun LIU, Lin YUAN, Zhishang FENG.
Survey of key management schemes for cluster networks
[J]. Chinese Journal of Network and Information Security, 2022, 8(6): 52-69.
|
[3] |
Liquan CHEN, Xiao LI, Zheyi YANG, Sijie QIAN.
Blockchain-based high transparent PKI authentication protocol
[J]. Chinese Journal of Network and Information Security, 2022, 8(4): 1-11.
|
[4] |
Baoqin ZHAI, Jian WANG, Lei HAN, Jiqiang LIU, Jiahao HE, Tianhao LIU.
Hierarchical proxy consensus optimization for IoV based on blockchain and trust value
[J]. Chinese Journal of Network and Information Security, 2022, 8(3): 142-153.
|
[5] |
Bo ZHAO, Anqi YUAN, Yang AN.
Application progress of SGX in trusted computing area
[J]. Chinese Journal of Network and Information Security, 2021, 7(6): 126-142.
|
[6] |
Wei GU, Jian SHEN, Yongjun REN.
Secure key-sharing algorithm based on smart grid
[J]. Chinese Journal of Network and Information Security, 2021, 7(4): 141-146.
|
[7] |
Guojie LIU, Jianbiao ZHANG, Ping YANG, Zheng LI.
Research on the trusted environment of container cloud based on the TPCM
[J]. Chinese Journal of Network and Information Security, 2021, 7(4): 164-174.
|
[8] |
Guojie LIU,Jianbiao ZHANG.
TPCM-based trusted PXE boot method for servers
[J]. Chinese Journal of Network and Information Security, 2020, 6(6): 105-111.
|
[9] |
Bo ZHAO, Xiang LI, Fei YAN, Liqiang ZHANG, Huanguo ZHANG.
Trusted platform for third-party cloud computing online evaluation and analysis technology
[J]. Chinese Journal of Network and Information Security, 2019, 5(5): 90-104.
|
[10] |
Jiyang LI,Pengyuan ZHAO,Zhe LIU.
Trusted access scheme for intranet mobile terminal based on encrypted SD card
[J]. Chinese Journal of Network and Information Security, 2019, 5(4): 108-118.
|
[11] |
Suqing LIN.
Verifiable outsourced attribute-based encryption with access update
[J]. Chinese Journal of Network and Information Security, 2019, 5(1): 37-49.
|
[12] |
Qianyi DAI,Kaiyong XU,Song GUO,Guoming CAI,Zhicheng ZHOU.
Blockchain-based key management scheme for distributed networks
[J]. Chinese Journal of Network and Information Security, 2018, 4(9): 23-35.
|
[13] |
Fanming LIU,Wei SHI.
Blockchain-based ARP defense scheme
[J]. Chinese Journal of Network and Information Security, 2018, 4(9): 36-43.
|
[14] |
Junjie LIU,Jia ZHAO,Qiang ZHANG,Jiqiang LIU,Lei HAN.
Research on key management scheme for military vehicle network
[J]. Chinese Journal of Network and Information Security, 2018, 4(8): 39-46.
|
[15] |
Jianbiao ZHANG,Yuanxi ZHU,Jun HU,Xiao WANG.
Scheme of virtual machine trusted migration in cloud environment
[J]. Chinese Journal of Network and Information Security, 2018, 4(1): 6-14.
|