[1] |
Ganqin LIU, Hui LI, Hui ZHU, Yukun HUANG, Xingdong LIU.
Public key cryptographic algorithm SM2 optimized implementation on low power embedded platform
[J]. Chinese Journal of Network and Information Security, 2022, 8(6): 29-38.
|
[2] |
Jun LIU, Lin YUAN, Zhishang FENG.
Survey of key management schemes for cluster networks
[J]. Chinese Journal of Network and Information Security, 2022, 8(6): 52-69.
|
[3] |
Yi XIA, Mingjng LAN, Xiaohui CHEN, Junyong LUO, Gang ZHOU, Peng HE.
Survey on explainable knowledge graph reasoning methods
[J]. Chinese Journal of Network and Information Security, 2022, 8(5): 1-25.
|
[4] |
Rongna XIE, Xiaonan FAN, Lin YUAN, Zichen GUO, Jiayu ZHU, Guozhen SHI.
Research on extended access control mechanism in online social network
[J]. Chinese Journal of Network and Information Security, 2021, 7(5): 123-131.
|
[5] |
Jin LI, Jin CAO, Yueyu ZHANG, Meiru ZHANG, Hui LI.
Reverse teaching design of curriculum ideological and political in information security major—Take the wireless communication network security course of Xidian University as an example
[J]. Chinese Journal of Network and Information Security, 2021, 7(3): 166-174.
|
[6] |
Guojie LIU,Jianbiao ZHANG.
TPCM-based trusted PXE boot method for servers
[J]. Chinese Journal of Network and Information Security, 2020, 6(6): 105-111.
|
[7] |
Qiao HU,Yupeng HU,Xin LIAO,Zheng QIN,Jianhua SUN,Jiliang ZHANG.
Investigation,analysis and improvement mentality of the revision on information security’s training program to undergraduates in Hunan University
[J]. Chinese Journal of Network and Information Security, 2020, 6(4): 153-158.
|
[8] |
Qiang QU,Hongtao YU,Ruiyang HUANG.
Attention-based approach of detecting spam in social networks
[J]. Chinese Journal of Network and Information Security, 2020, 6(1): 54-61.
|
[9] |
JIA Chunfu,LI Ruiqi,TIAN Meiqi,CHENG Xiaoyang.
Discuss on cultivating mode of information security and law inter-disciplinary talents
[J]. Chinese Journal of Network and Information Security, 2019, 5(3): 31-35.
|
[10] |
Jinxin ZUO,Ziyu GUO,Jin LI,Jie ZHANG,Yueming LU.
Security evaluation method for confidential and stable complex systems
[J]. Chinese Journal of Network and Information Security, 2019, 5(2): 58-65.
|
[11] |
Shudi CHEN,Youwen ZHU.
Shoulder-surfing resistant PIN-entry method
[J]. Chinese Journal of Network and Information Security, 2019, 5(1): 87-93.
|
[12] |
Ying CHENG.
Data protection impact assessment system in the mode of risk management
[J]. Chinese Journal of Network and Information Security, 2018, 4(8): 63-70.
|
[13] |
Zenan WU,Liqin TIAN,Zhigang WANG.
Behavior authentication of Web users based on machine learning
[J]. Chinese Journal of Network and Information Security, 2018, 4(1): 45-51.
|
[14] |
Xin-min FAN.
Practice and exploration of network information security course teaching innovation based on mobile learning and inverted classroom depth integration
[J]. Chinese Journal of Network and Information Security, 2017, 3(9): 61-66.
|
[15] |
Lian-peng LI,Hong LUO.
Review of domestic and international financial security
[J]. Chinese Journal of Network and Information Security, 2017, 3(2): 9-19.
|