[1] |
LI Ning, LI Bochao.
Token-based UTM Architecture for Mobile Internet
[J]. Netinfo Security, 2020, 20(3): 18-28.
|
[2] |
WANG Chonghua, LI Jun, CHEN Xuehong.
Research on Industrial Internet Platform Security Protection
[J]. Netinfo Security, 2019, 19(9): 6-10.
|
[3] |
ZHOU Yihua, LV Zhuqing, YANG Yuguang, SHI Weimin.
Data Deposit Management System Based on Blockchain Technology
[J]. Netinfo Security, 2019, 19(8): 8-14.
|
[4] |
LI Lin, ZHANG Xuxia.
National Secret Substitution of zk-snark Bilinear Pair
[J]. Netinfo Security, 2019, 19(10): 10-15.
|
[5] |
CHEN Yan, GE Jianyong, LAI Jing, LU Zhen.
Security System of the Information System in the Cloud
[J]. 信息网络安全, 2018, 18(4): 79-86.
|
[6] |
LV Congdong, HAN Zhen.
A Security Model of Cloud Computing Based on IP Model
[J]. 信息网络安全, 2018, 18(11): 27-32.
|
[7] |
KANG Baoyuan, WANG Jiaqiang, SHAO Dongyang, LI Chunqing.
A Secure Authentication and Key Agreement Protocol for Heterogeneous Ad Hoc Wireless Sensor Networks
[J]. 信息网络安全, 2018, 18(1): 23-30.
|
[8] |
GU Chunhua, GAO Yuan, TIAN Xiuxia.
Security Optimized RBAC Access Control Model
[J]. 信息网络安全, 2017, 17(5): 74-79.
|
[9] |
LIANG Zhong, ZHOU Jiakun, ZHU Han, CHEN Bo.
Research on Aggregation Technology for Information Security Knowledge Based on Security Ontology
[J]. 信息网络安全, 2017, 17(4): 78-85.
|
[10] |
ZHOU Jingzhe, CHEN Changsong.
Analysis of Network Information Security in the Cloud Computing Architecture
[J]. 信息网络安全, 2017, 17(11): 74-79.
|
[11] |
SU Qi, WANG Wei, LIU Yin, YU Zhanpeng.
Research on the Scheme of Information Security Protection in Electric Power Industry
[J]. 信息网络安全, 2017, 17(11): 84-88.
|
[12] |
HUANG Nana, WAN Liang, DENG Xuankun, YI Huifan.
A Cross Site Script Vulnerability Detection Technology Based on Sequential Minimum Optimization Algorithm
[J]. 信息网络安全, 2017, 17(10): 55-62.
|
[13] |
ZHANG Lei, YU Dongsheng, YANG Jun, HU Jiming.
Research on Information Security Supervision Strategy Based on Private Cloud Model
[J]. 信息网络安全, 2017, 17(10): 86-89.
|
[14] |
WANG Yubin, CHEN Si, CHENG Nan.
Research on Industrial Control System Security Defense
[J]. 信息网络安全, 2016, 16(9): 35-39.
|
[15] |
FU Xin, LU Yuhua, SHAO Zijian.
Research on Information Security Simulation Experimental Platform of Public Security Video Monitoring System
[J]. 信息网络安全, 2016, 16(9): 56-59.
|