[1] |
Lingshu LI, Jiangxing WU, Wei ZENG, Wenyan LIU.
Strategy of container migration and honeypot deployment based on signal game in cloud environment
[J]. Chinese Journal of Network and Information Security, 2022, 8(3): 87-96.
|
[2] |
Shang LIU, Yinzhang GUO.
Multi-authority based CP-ABE proxy re-encryption scheme for cloud computing
[J]. Chinese Journal of Network and Information Security, 2022, 8(3): 176-188.
|
[3] |
Yi ZHANG, Liqin TIAN, Zenan WU, Wenxing WU.
Trust evaluation optimization mechanism for cloud user behavior based on FANP
[J]. Chinese Journal of Network and Information Security, 2022, 8(2): 175-182.
|
[4] |
Ying WU,Xuan LI,Biao JIN,Rongrong JIN.
Survey on the privacy-preserving content based image retrieval
[J]. Chinese Journal of Network and Information Security, 2019, 5(4): 14-28.
|
[5] |
Ying LI, Chunguang MA.
Overview of searchable encryption research
[J]. Chinese Journal of Network and Information Security, 2018, 4(7): 13-21.
|
[6] |
Mengyang YU,Hui LIN,Youliang TIAN.
New cross-layer reputation mechanism for mobile cloud computing
[J]. Chinese Journal of Network and Information Security, 2018, 4(3): 51-58.
|
[7] |
Yuanhao WANG,Hongbo LI,Yuzhao CUI,Qingwen GUO,Qiong HUANG.
Survey on public key encryption with equality test
[J]. Chinese Journal of Network and Information Security, 2018, 4(11): 13-22.
|
[8] |
Jianbiao ZHANG,Yuanxi ZHU,Jun HU,Xiao WANG.
Scheme of virtual machine trusted migration in cloud environment
[J]. Chinese Journal of Network and Information Security, 2018, 4(1): 6-14.
|
[9] |
Weifeng LI,Weizhong QIANG,Weiming LI,Deqing ZOU.
Research on forensics of privacy violations in cloud environment
[J]. Chinese Journal of Network and Information Security, 2018, 4(1): 26-35.
|
[10] |
Yuan-zhao GAO,Xue-juan LI,Bing-long LI,Xi-xi WU.
Cloud computing forensic model
[J]. Chinese Journal of Network and Information Security, 2017, 3(9): 13-23.
|
[11] |
Xing-lan ZHANG,Xiang LIU.
Secure efficient and verifiable large linear equations solve outsourcing computing scheme
[J]. Chinese Journal of Network and Information Security, 2017, 3(6): 1-7.
|
[12] |
De-yu YUAN,Xiao-juan WANG,Jian-chao WAN.
Influence of Internet plus on cyberspace security and the technology development trend in Internet plus era
[J]. Chinese Journal of Network and Information Security, 2017, 3(5): 1-9.
|
[13] |
Jiang-yong SHI,Yue-xiang YANG,Wen-hua LI,Sen WANG.
Research on SDN-based cloud security application
[J]. Chinese Journal of Network and Information Security, 2017, 3(5): 10-25.
|
[14] |
Fei CHEN,Xiao-hong BI,Jing-jing WANG,Yuan LIU.
Survey of DDoS defense:challenges and directions
[J]. Chinese Journal of Network and Information Security, 2017, 3(10): 16-24.
|
[15] |
Guang SUN,Xiao-ping FAN,Wang-dong JIANG,Hang-jun ZHOU,Sheng-zong LIU,Chun-hong GONG,Jing ZHU.
Software watermarking scheme with cloud computing constraints
[J]. Chinese Journal of Network and Information Security, 2016, 2(9): 12-21.
|