Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Netinfo Security
1671-1122
2015 Issue 8
A Revocable Authorization Provable Data Possession Scheme in Clouds
ZHAO Yang;,CHEN Yang;,XIONG Hu;,REN Hua-qiang;
..............
page:1-7
Research and Implementation on Anonymous Broadcast Encryption Scheme under the Mixing Mechanism
ZHANG Jian-hong;,DONG Qiao-cui;
..............
page:8-13
Power Analysis Attack against SM4 in Frequency Domain
WANG Min;,RAO Jin-tao;,WU Zhen;,DU Zhi-bo;
..............
page:14-19
Research on Internet of Things Security Based on Support Vector Machines with Balanced Binary Decision Tree
ZHANG Xiao-hui;,LIN Bo-gang;
..............
page:20-25
An Anti-tampering Tag Authentication Method Based on RFID and Digital Watermarking
WU Xiao;,CHANG Cheng;,TAN Wen-jie;,CHENG Jiu-jun;
..............
page:26-34
Massive Data Encryption Storage Strategy Based on Multi-core Cluster
WU Yan-na;,ZHAO Ze-mao;,HU Jing-fang;,LIANG Bin;
..............
page:35-40
Improved LEACH Algorithm Based on Dynamic Key Management
LIU Wei;,YE Qing;,WANG Cheng;
..............
page:41-46
An Improved Method for Enhancing the Security of WAPI
HU Xue;,FENG Hua-min;,CHEN Ying-ya;,WU Yang-yang;
..............
page:47-52
Research on Query Privacy Anonymity Algorithm Based on Grid Clustering
ZHANG Fu-xia;,JIANG Chao-hui;
..............
page:53-58
Discussion on Constructing Secure and Reliable IPv6 Customer Premise Network
JIN Zhi-hu;,GAN Yu-xi;,JIN Yi;,HU Long-bin;
..............
page:59-66
Research on Information System Controllability Evaluation
GAO Jun-feng;,CUI Yu-hua;,LUO Sen-lin;,JIAO Long-long;
..............
page:67-75
Research of Insider Threats and Countermeasures under Cloud Service
HE Ying-rui;,WANG Jing-ya;
..............
page:76-81
2015 nian 6 yue ji suan ji bing du yi qing fen xi
li dong ;, meng bin ;
..............
page:82-82
2015 nian 6 yue shi da zhong yao an quan lou dong fen xi
zhong guo ke xue yuan da xue guo jia ji suan ji wang luo ru qin fang fan zhong xin bei jing 100049;
..............
page:83-84
2015 nian 6 yue wang luo an quan jian ce shu ju fa bu
xu yuan ;, rao zuo ;
..............
page:85-86
di san jie zhong guo da shu ju ji shu gao feng lun tan zhao kai
..............
page:87-87
quan guo zhong dian hu lian wang zhan he fu wu qi ye an quan guan li gong zuo hui yi zai jing zhao kai
..............
page:87-87
di san jie zhong guo zhi hui kong zhi da hui zai jing ju ban
..............
page:87-87
2015 zhong guo wang luo an quan lun tan cheng gong zhao kai
..............
page:88-88
2015 zhong guo ren gong zhi neng da hui zai jing zhao kai
..............
page:88-88
zhong guo hu lian wang fa zhan ji jin hui zheng shi cheng li
..............
page:89-89
shan shi wang ke shou yao can jia rsa2015 ya tai ji ri ben da hui
..............
page:89-89
di shi liu jie quan guo rong cuo ji suan xue shu hui yi cftc2015 yuan man bi mu
..............
page:89-89
2015 nian xin yi dai xin xi ji shu chan ye biao zhun hua lun tan zai jing zhao kai
..............
page:90-90
zuo nan da xue wang luo kong jian an quan xue yuan cheng li
..............
page:90-90
di ba jie quan guo da xue sheng xin xi an quan jing sai jue sai ju xing
..............
page:90-90
2014 nian 4 ji du jian ce he ge an quan chan pin ming dan
gong an bu ji suan ji xin xi xi tong an quan chan pin zhi liang jian du jian yan zhong xin ;
..............
page:91-91
2014 nian 4 ji du jian ce he ge an quan chan pin ming dan xu biao
..............
page:92-92
2014 nian 4 ji du jian ce he ge an quan chan pin ming dan xu biao
..............
page:93-93
2014 nian 4 ji du jian ce he ge an quan chan pin ming dan xu biao
..............
page:94-94
2015 nian 1 ji du jian ce he ge an quan chan pin ming dan
gong an bu ji suan ji xin xi xi tong an quan chan pin zhi liang jian du jian yan zhong xin ;
..............
page:95-95
2015 nian 1 ji du jian ce he ge an quan chan pin ming dan xu biao
..............
page:96-96