[1] |
Yilong WANG, Zhenyu LI, Daofu GONG, Fenlin LIU.
Image double fragile watermarking algorithm based on block neighborhood
[J]. Chinese Journal of Network and Information Security, 2023, 9(3): 38-48.
|
[2] |
Renfeng CHEN, Hongbin ZHU.
Research on credit card transaction security supervision based on PU learning
[J]. Chinese Journal of Network and Information Security, 2023, 9(3): 73-78.
|
[3] |
Guanyun FENG, Cai FU, Jianqiang LYU, Lansheng HAN.
Insider threat detection based on operational attention and data augmentation
[J]. Chinese Journal of Network and Information Security, 2023, 9(3): 102-112.
|
[4] |
Genlin XIE, Guozhen CHENG, Yawen WANG, Qingfeng WANG.
Software diversity evaluating method based on gadget feature analysis
[J]. Chinese Journal of Network and Information Security, 2023, 9(3): 161-173.
|
[5] |
Peng HOU, Zhixin LI, Fei ZHANG, Xu SUN, Dan CHEN, Yihao CUI, Hanbing ZHANG, Yinan JIN, Hongfeng CHAI.
Technology and practice of intelligent governance for financial data security
[J]. Chinese Journal of Network and Information Security, 2023, 9(3): 174-187.
|
[6] |
Min XIAO, Faying MAO, Yonghong HUANG, Yunfei CAO.
Anonymous trust management scheme of VANET based on attribute signature
[J]. Chinese Journal of Network and Information Security, 2023, 9(2): 33-45.
|
[7] |
Jianlong XU, Jian LIN, Yusen LI, Zhi XIONG.
Distributed user privacy preserving adjustable personalized QoS prediction model for cloud services
[J]. Chinese Journal of Network and Information Security, 2023, 9(2): 70-80.
|
[8] |
Xunxun CHEN, Mingzhe LI, Ning LYU, Liang HUANG.
Intrinsic assurance: a systematic approach towards extensible cybersecurity
[J]. Chinese Journal of Network and Information Security, 2023, 9(1): 92-102.
|
[9] |
Jiashuo SONG, Zhenzhen LI, Haiyang DING, Zichen LI.
Efficient and fully simulated oblivious transfer protocol on elliptic curve
[J]. Chinese Journal of Network and Information Security, 2023, 9(1): 158-166.
|
[10] |
Fenghua LI, Hui LI, Ben NIU, Weidong QIU.
Academic connotation and research trends of privacy computing
[J]. Chinese Journal of Network and Information Security, 2022, 8(6): 1-8.
|
[11] |
Fei TANG, Ning GAN, Xianggui YANG, Jinyang WANG.
Anti malicious KGC certificateless signature scheme based on blockchain and domestic cryptographic SM9
[J]. Chinese Journal of Network and Information Security, 2022, 8(6): 9-19.
|
[12] |
Xue BAI, Baodong QIN, Rui GUO, Dong ZHENG.
Two-party cooperative blind signature based on SM2
[J]. Chinese Journal of Network and Information Security, 2022, 8(6): 39-51.
|
[13] |
Jun LIU, Lin YUAN, Zhishang FENG.
Survey of key management schemes for cluster networks
[J]. Chinese Journal of Network and Information Security, 2022, 8(6): 52-69.
|
[14] |
Min XIAO, Tao YAO, Yuanni LIU, Yonghong HUANG.
Dynamic and efficient vehicular cloud management scheme with privacy protection
[J]. Chinese Journal of Network and Information Security, 2022, 8(6): 70-83.
|
[15] |
Jiaying LIN, Wenbo ZHOU, Weiming ZHANG, Nenghai YU.
Lip forgery detection via spatial-frequency domain combination
[J]. Chinese Journal of Network and Information Security, 2022, 8(6): 146-155.
|