[1] |
Jianlong XU, Jian LIN, Yusen LI, Zhi XIONG.
Distributed user privacy preserving adjustable personalized QoS prediction model for cloud services
[J]. Chinese Journal of Network and Information Security, 2023, 9(2): 70-80.
|
[2] |
Zhe SUN, Hong NING, Lihua YIN, Binxing FANG.
Preliminary study on the construction of a data privacy protection course based on a teaching-in-practice range
[J]. Chinese Journal of Network and Information Security, 2023, 9(1): 178-188.
|
[3] |
Xue BAI, Baodong QIN, Rui GUO, Dong ZHENG.
Two-party cooperative blind signature based on SM2
[J]. Chinese Journal of Network and Information Security, 2022, 8(6): 39-51.
|
[4] |
Min XIAO, Tao YAO, Yuanni LIU, Yonghong HUANG.
Dynamic and efficient vehicular cloud management scheme with privacy protection
[J]. Chinese Journal of Network and Information Security, 2022, 8(6): 70-83.
|
[5] |
Dong LI, Yanni HAO, Shenghui PENG, Ruijie ZI, Ximeng LIU.
Network security of the National Natural Science Foundation of China: today and prospects
[J]. Chinese Journal of Network and Information Security, 2022, 8(6): 92-101.
|
[6] |
Chenxin LU, Bing CHEN, Ning DING, Liquan CHEN, Ge WU.
Identity-based anonymous cloud auditing scheme with compact tags
[J]. Chinese Journal of Network and Information Security, 2022, 8(6): 156-168.
|
[7] |
Shengzhi MING, Jianming ZHU, Zhiyuan SUI, Xian ZHANG.
Online medical privacy protection strategy under information value-added mechanism
[J]. Chinese Journal of Network and Information Security, 2022, 8(6): 169-177.
|
[8] |
Dibin SHAN, Xuehui DU, Wenjuan WANG, Aodi LIU, Na WANG.
Access control relationship prediction method based on GNN dual source learning
[J]. Chinese Journal of Network and Information Security, 2022, 8(5): 40-55.
|
[9] |
Chao MU, Xin WANG, Ming YANG, Heng ZHANG, Zhenya CHEN, Xiaoming WU.
Hardcoded vulnerability detection approach for IoT device firmware
[J]. Chinese Journal of Network and Information Security, 2022, 8(5): 98-110.
|
[10] |
Xian ZHANG, Jianming ZHU, Zhiyuan SUI, Shengzhi MING.
Analysis on anonymity and regulation of digital currency transactions based on game theory
[J]. Chinese Journal of Network and Information Security, 2022, 8(5): 150-157.
|
[11] |
Feng LIU, Jie YANG, Jiayin QI.
Survey on blockchain privacy protection techniques in cryptography
[J]. Chinese Journal of Network and Information Security, 2022, 8(4): 29-44.
|
[12] |
Lin JIN, Youliang TIAN.
Multi-authority attribute hidden for electronic medical record sharing scheme based on blockchain
[J]. Chinese Journal of Network and Information Security, 2022, 8(4): 66-76.
|
[13] |
Weicheng ZHANG, Hongquan WEI, Shuxin LIU, Liming PU.
Fast handover authentication scheme in 5G mobile edge computing scenarios
[J]. Chinese Journal of Network and Information Security, 2022, 8(3): 154-168.
|
[14] |
Zhensheng GAO, Lifeng CAO, Xuehui DU.
Research progress of access control based on blockchain
[J]. Chinese Journal of Network and Information Security, 2021, 7(6): 68-87.
|
[15] |
Jiashun ZHOU, Na WANG, Xuehui DU.
Multi-party efficient audit mechanism for data integrity based on blockchain
[J]. Chinese Journal of Network and Information Security, 2021, 7(6): 113-125.
|