[1] |
Ning LI, Bochao LI.
Token-based UTM Architecture for Mobile Internet
[J]. Netinfo Security, 2020, 20(3): 18-28.
|
[2] |
Yuan LIU, Wei QIAO.
Research and Optimization of Container Network Based on Kubernetes Cluster System in Cloud Environment
[J]. Netinfo Security, 2020, 20(3): 36-44.
|
[3] |
Jiameng BAI, Yingshuai KOU, Zeyi LIU, Daren ZHA.
Docker-based RBAC Task Management System
[J]. Netinfo Security, 2020, 20(1): 75-82.
|
[4] |
Liangqin REN, Wei WANG, Qiongxiao WANG, Linli LU.
A New Cloud Cryptographic Computing Platform Architecture and Implementation
[J]. Netinfo Security, 2019, 19(9): 91-95.
|
[5] |
Yi YU, Liangshuang LV, Xiaojian LI, Tianbo WANG.
Dynamic Network Topology Description Language for Mobile Cloud Computing Scenario
[J]. Netinfo Security, 2019, 19(9): 120-124.
|
[6] |
Zixuan WANG, Liangshuang LV, Xiaojian LI, Tianbo WANG.
A Shared Storage-based Virtual Machine Application Distribution Strategy for OpenStack
[J]. Netinfo Security, 2019, 19(9): 125-129.
|
[7] |
Yanpeng CUI, Luming FENG, Zheng YAN, Huaqing LIN.
Research on Software Security Model of Cloud Computing Based on Program Slicing Technology
[J]. Netinfo Security, 2019, 19(7): 31-41.
|
[8] |
Xinrui GE, Wei CUI, Rong HAO, Jia YU.
Verifiable Keywords Ranked Search Scheme over Encrypted Cloud Data
[J]. Netinfo Security, 2019, 19(7): 82-89.
|
[9] |
Chunqi TIAN, Jing LI, Wei WANG, Liqing ZHANG.
A Method for Improving the Performance of Spark on Container Cluster Based on Machine Learning
[J]. Netinfo Security, 2019, 19(4): 11-19.
|
[10] |
Pu ZHAO, Wei CUI, Rong HAO, Jia YU.
A Secure Outsourcing Computation Scheme for El-Gamal Signature Generation
[J]. Netinfo Security, 2019, 19(3): 81-86.
|
[11] |
Zhenfeng ZHANG, Zhiwen ZHANG, Ruichao WANG.
Model of Cloud Computing Security and Compliance Capability for Classified Protection of Cybersecurity 2.0
[J]. Netinfo Security, 2019, 19(11): 1-7.
|
[12] |
Xinyang FENG, Jianjing SHEN.
A Yarn and NMF Based Big Data Clustering Algorithm
[J]. Netinfo Security, 2018, 18(8): 43-49.
|
[13] |
Yuan TAO, Tao HUANG, Mohan ZHANG, Shuilin LI.
Research and Development Trend Analysis of Key Technologies for Cyberspace Security Situation Awareness
[J]. Netinfo Security, 2018, 18(8): 79-85.
|
[14] |
Qi ZHANG, Xijun LIN, Haipeng QU.
Identity-based Encryption Scheme Support Authorization Equality Test in Cloud Environment
[J]. Netinfo Security, 2018, 18(6): 52-60.
|
[15] |
Jianbiao ZHANG, Shisong YANG, Shanshan TU, Xiao WANG.
Research on vTPCM Trust Management Technology for Cloud Computing Environment
[J]. Netinfo Security, 2018, 18(4): 9-14.
|