Editing
 Editor Work
    Editor
 Editor-in-chief
    Download
Download
More   
Quick Search DOI Advanced
  Current Issue
2020 Vol. 20, No. 3
Published: 10 March 2020

 
1 Research on the Quantitative Calculation Method Resulting from the Conclusions in the Assessment of Classified Protection of Cybersecurity
MA Li
DOI: 10.3969/j.issn.1671-1122.2020.03.001
2020 Vol. 20 (3): 1-8 [Abstract] ( 14 ) [RICH HTML] ( 0 ) PDF (7080 KB)  ( 8 )
9 Multipath Solution and Blocking Method of Network Attack Traffic Based on Topology Analysis
SONG Yubo, FAN Ming, YANG Junjie, HU Aiqun
DOI: 10.3969/j.issn.1671-1122.2020.03.002
2020 Vol. 20 (3): 9-17 [Abstract] ( 8 ) [RICH HTML] ( 0 ) PDF (8848 KB)  ( 6 )
18 Token-based UTM Architecture for Mobile Internet
LI Ning, LI Bochao
DOI: 10.3969/j.issn.1671-1122.2020.03.003
2020 Vol. 20 (3): 18-28 [Abstract] ( 10 ) [RICH HTML] ( 0 ) PDF (13062 KB)  ( 4 )
29 Fault - tolerant and Verifiable Public Key Searchable Encryption Scheme Based on FBDH Algorithm
ZHOU Quan, YANG Ningbin, XU Shumei
DOI: 10.3969/j.issn.1671-1122.2020.03.004
2020 Vol. 20 (3): 29-35 [Abstract] ( 11 ) [RICH HTML] ( 0 ) PDF (7085 KB)  ( 4 )
36 Research and Optimization of Container Network Based on Kubernetes Cluster System in Cloud Environment
LIU Yuan, QIAO Wei
DOI: 10.3969/j.issn.1671-1122.2020.03.005
2020 Vol. 20 (3): 36-44 [Abstract] ( 22 ) [RICH HTML] ( 0 ) PDF (9838 KB)  ( 6 )
45 Intranet Log Anomaly Detection Model Based on Conformal Prediction
GU Zhaojun, REN Yitong, LIU Chunbo, WANG Zhi
DOI: 10.3969/j.issn.1671-1122.2020.03.006
2020 Vol. 20 (3): 45-50 [Abstract] ( 9 ) [RICH HTML] ( 0 ) PDF (7280 KB)  ( 5 )
51 Authenticated Multiparty Quantum Secret Sharing Protocol with d-level Single Particle
LIU Xiaofen, CHEN Xiaofeng, LIAN Guiren, LIN Song
DOI: 10.3969/j.issn.1671-1122.2020.03.007
2020 Vol. 20 (3): 51-55 [Abstract] ( 11 ) [RICH HTML] ( 0 ) PDF (5963 KB)  ( 5 )
56 Research on Blockchain Performance Scalability and Security
MAO Zhilai, LIU Yanan, SUN Huiping, CHEN Zhong
DOI: 10.3969/j.issn.1671-1122.2020.03.008
2020 Vol. 20 (3): 56-64 [Abstract] ( 9 ) [RICH HTML] ( 0 ) PDF (10411 KB)  ( 7 )
65 A Browser Security Model for Preventing TLS Protocol Downgrade Attacks
ZHANG Xinglong, LI Yuting, CHENG Qingfeng, GUO Lulu
DOI: 10.3969/j.issn.1671-1122.2020.03.009
2020 Vol. 20 (3): 65-74 [Abstract] ( 11 ) [RICH HTML] ( 0 ) PDF (11103 KB)  ( 10 )
75 A Cloud Storage Encrypted Data Deduplication Method Based on Authorization Records
ZHANG Yi, LIU Hongyan, XIAN Hequn, TIAN Chengliang
DOI: 10.3969/j.issn.1671-1122.2020.03.010
2020 Vol. 20 (3): 75-82 [Abstract] ( 11 ) [RICH HTML] ( 0 ) PDF (8829 KB)  ( 5 )
83 IPv6 Network Attack Source Tracing Method Based on iTrace_v6
WANG Tengfei, CAI Manchun, LU Tianliang, YUE Ting
DOI: 10.3969/j.issn.1671-1122.2020.03.011
2020 Vol. 20 (3): 83-89 [Abstract] ( 18 ) [RICH HTML] ( 0 ) PDF (8062 KB)  ( 6 )
90 CP-ABE Scheme Supporting Attribute Revocation and Outsourcing Decryption
LIU Peng, HE Qian, LIU Wangyang, CHENG Xu
DOI: 10.3969/j.issn.1671-1122.2020.03.012
2020 Vol. 20 (3): 90-97 [Abstract] ( 11 ) [RICH HTML] ( 0 ) PDF (9175 KB)  ( 2 )
    Editorial Notice
More   
    Cooperation Unit
More   
    Links
Links
More   

Copyright © Network Security
Tel: 010-88118778/88114408/88111078 E-mail:gassbj@163.com
By Beijing Magtech Co. design and development