[1] |
Wu Zhijun, Zhang Rudan, Yue Meng.
A Method for Joint Detection of Attacks in Named Data Networking
[J]. Journal of Computer Research and Development, 2021, 58(3): 569-582.
|
[2] |
Xie Jia, Hu Yupu, Jiang Mingming.
Lattice-Based Forward Secure Proxy Signatures
[J]. Journal of Computer Research and Development, 2021, 58(3): 583-597.
|
[3] |
Liu Feng, Yang Jie, Li Zhibin, Qi Jiayin.
A Secure Multi-Party Computation Protocol for Universal Data Privacy Protection Based on Blockchain
[J]. Journal of Computer Research and Development, 2021, 58(2): 281-290.
|
[4] |
Li Dequan, Xu Yue, Xue Sheng.
Defending Against Dimensional Saddle Point Attack Based on Adaptive Method with Dynamic Bound
[J]. Journal of Computer Research and Development, 2020, 57(9): 2001-2008.
|
[5] |
Guo Lifeng, Li Zhihao, Hu Lei.
Efficient Public Encryption Scheme with Keyword Search for Cloud Storage
[J]. Journal of Computer Research and Development, 2020, 57(7): 1404-1414.
|
[6] |
Zhang Runlian, Sun Yaping, Wei Yongzhuang, Li Yingxin.
A New Automatic Search Method for Cryptographic S-Box
[J]. Journal of Computer Research and Development, 2020, 57(7): 1415-1423.
|
[7] |
Ma Chencheng, Du Xuehui, Cao Lifeng, Wu Bei.
burst-Analysis Website Fingerprinting Attack Based on Deep Neural Network
[J]. Journal of Computer Research and Development, 2020, 57(4): 746-766.
|
[8] |
Sun Qian, Xue Leiqi, Gao Ling, Wang Hai, Wang Yuxiang.
Selection of Network Defense Strategies Based on Stochastic Game and Tabu Search
[J]. Journal of Computer Research and Development, 2020, 57(4): 767-777.
|
[9] |
Wang Ting, Wang Na, Cui Yunpeng, Li Huan.
The Optimization Method of Wireless Network Attacks Detection Based on Semi-Supervised Learning
[J]. Journal of Computer Research and Development, 2020, 57(4): 791-802.
|
[10] |
Miao Xinliang, Jiang Liehui, Chang Rui.
Survey of Access-Driven Cache-Based Side Channel Attack
[J]. Journal of Computer Research and Development, 2020, 57(4): 824-835.
|
[11] |
Huang Kezhen, Lian Yifeng, Feng Dengguo, Zhang Haixia, Liu Yuling, Ma Xiangliang.
Cyber Security Threat Intelligence Sharing Model Based on Blockchain
[J]. Journal of Computer Research and Development, 2020, 57(4): 836-846.
|
[12] |
Wang Taochun, Jin Xin, Lü Chengmei, Chen Fulong, Zhao Chuanxin.
Privacy Preservation Method of Data Aggregation in Mobile Crowd Sensing
[J]. Journal of Computer Research and Development, 2020, 57(11): 2337-2347.
|
[13] |
Zhou Jun, Shen Huajie, Lin Zhongyun, Cao Zhenfu, Dong Xiaolei.
Research Advances on Privacy Preserving in Edge Computing
[J]. Journal of Computer Research and Development, 2020, 57(10): 2027-2051.
|
[14] |
Wei Lifei, Chen Congcong, Zhang Lei, Li Mengsi, Chen Yujiao, Wang Qin.
Security Issues and Privacy Preserving in Machine Learning
[J]. Journal of Computer Research and Development, 2020, 57(10): 2066-2085.
|
[15] |
Zhao Xiufeng, Fu Yu, Song Weitao.
Circular Secure Homomorphic Encryption Scheme
[J]. Journal of Computer Research and Development, 2020, 57(10): 2117-2124.
|