[1] |
Ganqin LIU, Hui LI, Hui ZHU, Yukun HUANG, Xingdong LIU.
Public key cryptographic algorithm SM2 optimized implementation on low power embedded platform
[J]. Chinese Journal of Network and Information Security, 2022, 8(6): 29-38.
|
[2] |
Jun LIU, Lin YUAN, Zhishang FENG.
Survey of key management schemes for cluster networks
[J]. Chinese Journal of Network and Information Security, 2022, 8(6): 52-69.
|
[3] |
Yi XIA, Mingjng LAN, Xiaohui CHEN, Junyong LUO, Gang ZHOU, Peng HE.
Survey on explainable knowledge graph reasoning methods
[J]. Chinese Journal of Network and Information Security, 2022, 8(5): 1-25.
|
[4] |
Rongna XIE, Xiaonan FAN, Lin YUAN, Zichen GUO, Jiayu ZHU, Guozhen SHI.
Research on extended access control mechanism in online social network
[J]. Chinese Journal of Network and Information Security, 2021, 7(5): 123-131.
|
[5] |
Guojie LIU,Jianbiao ZHANG.
TPCM-based trusted PXE boot method for servers
[J]. Chinese Journal of Network and Information Security, 2020, 6(6): 105-111.
|
[6] |
Qiao HU,Yupeng HU,Xin LIAO,Zheng QIN,Jianhua SUN,Jiliang ZHANG.
Investigation,analysis and improvement mentality of the revision on information security’s training program to undergraduates in Hunan University
[J]. Chinese Journal of Network and Information Security, 2020, 6(4): 153-158.
|
[7] |
Qiang QU,Hongtao YU,Ruiyang HUANG.
Attention-based approach of detecting spam in social networks
[J]. Chinese Journal of Network and Information Security, 2020, 6(1): 54-61.
|
[8] |
JIA Chunfu,LI Ruiqi,TIAN Meiqi,CHENG Xiaoyang.
Discuss on cultivating mode of information security and law inter-disciplinary talents
[J]. Chinese Journal of Network and Information Security, 2019, 5(3): 31-35.
|
[9] |
Jinxin ZUO,Ziyu GUO,Jin LI,Jie ZHANG,Yueming LU.
Security evaluation method for confidential and stable complex systems
[J]. Chinese Journal of Network and Information Security, 2019, 5(2): 58-65.
|
[10] |
Shudi CHEN,Youwen ZHU.
Shoulder-surfing resistant PIN-entry method
[J]. Chinese Journal of Network and Information Security, 2019, 5(1): 87-93.
|
[11] |
Ying CHENG.
Data protection impact assessment system in the mode of risk management
[J]. Chinese Journal of Network and Information Security, 2018, 4(8): 63-70.
|
[12] |
Zenan WU,Liqin TIAN,Zhigang WANG.
Behavior authentication of Web users based on machine learning
[J]. Chinese Journal of Network and Information Security, 2018, 4(1): 45-51.
|
[13] |
Xin-min FAN.
Practice and exploration of network information security course teaching innovation based on mobile learning and inverted classroom depth integration
[J]. Chinese Journal of Network and Information Security, 2017, 3(9): 61-66.
|
[14] |
Yuan MENG,Pei-qun WU.
Research on professional learning margin of university information security teachers in China
[J]. Chinese Journal of Network and Information Security, 2017, 3(7): 64-69.
|
[15] |
Lian-peng LI,Hong LUO.
Review of domestic and international financial security
[J]. Chinese Journal of Network and Information Security, 2017, 3(2): 9-19.
|