[1] |
Yihua ZHOU, Zhuqing LV, Yuguang YANG, Weimin SHI.
Data Deposit Management System Based on Blockchain Technology
[J]. Netinfo Security, 2019, 19(8): 8-14.
|
[2] |
Lin LI, Xuxia ZHANG.
National Secret Substitution of zk-snark Bilinear Pair
[J]. Netinfo Security, 2019, 19(10): 10-15.
|
[3] |
Yan CHEN, Jianyong GE, Jing LAI, Zhen LU.
Security System of the Information System in the Cloud
[J]. Netinfo Security, 2018, 18(4): 79-86.
|
[4] |
Congdong LV, Zhen HAN.
A Security Model of Cloud Computing Based on IP Model
[J]. Netinfo Security, 2018, 18(11): 27-32.
|
[5] |
Baoyuan KANG, Jiaqiang WANG, Dongyang SHAO, Chunqing LI.
A Secure Authentication and Key Agreement Protocol for Heterogeneous Ad Hoc Wireless Sensor Networks
[J]. Netinfo Security, 2018, 18(1): 23-30.
|
[6] |
GU Chunhua, GAO Yuan, TIAN Xiuxia.
Security Optimized RBAC Access Control Model
[J]. 信息网络安全, 2017, 17(5): 74-79.
|
[7] |
LIANG Zhong, ZHOU Jiakun, ZHU Han, CHEN Bo.
Research on Aggregation Technology for Information Security Knowledge Based on Security Ontology
[J]. 信息网络安全, 2017, 17(4): 78-85.
|
[8] |
ZHOU Jingzhe, CHEN Changsong.
Analysis of Network Information Security in the Cloud Computing Architecture
[J]. 信息网络安全, 2017, 17(11): 74-79.
|
[9] |
SU Qi, WANG Wei, LIU Yin, YU Zhanpeng.
Research on the Scheme of Information Security Protection in Electric Power Industry
[J]. 信息网络安全, 2017, 17(11): 84-88.
|
[10] |
Nana HUANG, Liang WAN, Xuankun DENG, Huifan YI.
A Cross Site Script Vulnerability Detection Technology Based on Sequential Minimum Optimization Algorithm
[J]. Netinfo Security, 2017, 17(10): 55-62.
|
[11] |
WANG Yubin, CHEN Si, CHENG Nan.
Research on Industrial Control System Security Defense
[J]. 信息网络安全, 2016, 16(9): 35-39.
|
[12] |
FU Xin, LU Yuhua, SHAO Zijian.
Research on Information Security Simulation Experimental Platform of Public Security Video Monitoring System
[J]. 信息网络安全, 2016, 16(9): 56-59.
|
[13] |
YU Shiyuan, WANG Yutian, LIU Xin.
Burpsuite Extender Apply in Vulnerability Scanning
[J]. 信息网络安全, 2016, 16(9): 94-97.
|
[14] |
LI Tao, ZHANG Chi.
Research on Network Security Risk Model Based on the Information Security Level Protection Standards
[J]. 信息网络安全, 2016, 16(9): 177-183.
|
[15] |
CHEN Xiaobing, CHEN Kai, XU Zhen, WANG Liming.
Security Supervisory Scheme for Industrial Control Networks
[J]. 信息网络安全, 2016, 16(7): 61-70.
|