[1] |
Zhao CAI, Tao JING, Shuang REN.
Survey on Ethereum phishing detection technology
[J]. Chinese Journal of Network and Information Security, 2023, 9(2): 21-32.
|
[2] |
Heli WANG, Qiao YAN.
Selfish mining detection scheme based on the characters of transactions
[J]. Chinese Journal of Network and Information Security, 2023, 9(2): 104-114.
|
[3] |
Beiyuan YU, Shanyao REN, Jianwei LIU.
Overview of blockchain assets theft attacks and defense technology
[J]. Chinese Journal of Network and Information Security, 2023, 9(1): 1-17.
|
[4] |
Fei TANG, Ning GAN, Xianggui YANG, Jinyang WANG.
Anti malicious KGC certificateless signature scheme based on blockchain and domestic cryptographic SM9
[J]. Chinese Journal of Network and Information Security, 2022, 8(6): 9-19.
|
[5] |
Dan LIN, Kaixin LIN, Jiajing WU, Zibin ZHENG.
Bytecode-based approach for Ethereum smart contract classification
[J]. Chinese Journal of Network and Information Security, 2022, 8(5): 111-120.
|
[6] |
Liquan CHEN, Xiao LI, Zheyi YANG, Sijie QIAN.
Blockchain-based high transparent PKI authentication protocol
[J]. Chinese Journal of Network and Information Security, 2022, 8(4): 1-11.
|
[7] |
Wenbo ZHANG, Simin CHEN, Lifei WEI, Wei SONG, Dongmei HUANG.
State-of-the-art survey of smart contract verification based on formal methods
[J]. Chinese Journal of Network and Information Security, 2022, 8(4): 12-28.
|
[8] |
Feng LIU, Jie YANG, Jiayin QI.
Survey on blockchain privacy protection techniques in cryptography
[J]. Chinese Journal of Network and Information Security, 2022, 8(4): 29-44.
|
[9] |
Xiaoling SONG, Yong LIU, Jingnan DONG, Yongfei HUANG.
Application and prospect of blockchain in Metaverse
[J]. Chinese Journal of Network and Information Security, 2022, 8(4): 45-65.
|
[10] |
Lin JIN, Youliang TIAN.
Multi-authority attribute hidden for electronic medical record sharing scheme based on blockchain
[J]. Chinese Journal of Network and Information Security, 2022, 8(4): 66-76.
|
[11] |
Pengkun JIANG, Wenyin ZHANG, Jiuru WANG, Shanyun HUANG, Wanshui SONG.
Blockchain covert communication scheme based on the cover of normal transactions
[J]. Chinese Journal of Network and Information Security, 2022, 8(4): 77-86.
|
[12] |
Jianlin NIU, Zhiyu REN, Xuehui DU.
Cross-domain authentication scheme based on consortium blockchain
[J]. Chinese Journal of Network and Information Security, 2022, 8(3): 123-133.
|
[13] |
Baoqin ZHAI, Jian WANG, Lei HAN, Jiqiang LIU, Jiahao HE, Tianhao LIU.
Hierarchical proxy consensus optimization for IoV based on blockchain and trust value
[J]. Chinese Journal of Network and Information Security, 2022, 8(3): 142-153.
|
[14] |
Jiaren YU, Youliang TIAN, Hui LIN.
Design of miner type identification mechanism based on reputation management model
[J]. Chinese Journal of Network and Information Security, 2022, 8(1): 128-138.
|
[15] |
Zhensheng GAO, Lifeng CAO, Xuehui DU.
Research progress of access control based on blockchain
[J]. Chinese Journal of Network and Information Security, 2021, 7(6): 68-87.
|