[1] |
.
Analysis of Attack Methods of Ransomware Organizations Based on ATT&CK#br#
#br#
[J]. Journal of Information Security Reserach, 2023, 9(11): 1054-.
|
[2] |
.
Research on Data Sharing Management Based on Attributebased Encryption#br#
#br#
[J]. Journal of Information Security Reserach, 2023, 9(11): 1061-.
|
[3] |
.
A Unified Model for Information Extraction in the Field of Network Security for Small Samples
[J]. Journal of Information Security Reserach, 2023, 9(11): 1067-.
|
[4] |
.
An Anonymous Whistleblowing Scheme Based on Metadatahiding
[J]. Journal of Information Security Reserach, 2023, 9(11): 1076-.
|
[5] |
.
The Study of Fair Third Party in Typical Scenarios of Privacy Computing#br#
#br#
[J]. Journal of Information Security Reserach, 2023, 9(11): 1086-.
|
[6] |
.
An Authenticated Key Exchange Protocol for Telecare Medical Information Systems
[J]. Journal of Information Security Reserach, 2023, 9(11): 1102-.
|
[7] |
.
Design and Implementation of ECDSA Collaborative Signature Scheme#br#
#br#
[J]. Journal of Information Security Reserach, 2023, 9(11): 1120-.
|
[8] |
.
[J]. Journal of Information Security Reserach, 2023, 9(E1): 4-.
|
[9] |
.
[J]. Journal of Information Security Reserach, 2023, 9(E1): 12-.
|
[10] |
.
[J]. Journal of Information Security Reserach, 2023, 9(E1): 20-.
|
[11] |
.
[J]. Journal of Information Security Reserach, 2023, 9(E1): 25-.
|
[12] |
.
[J]. Journal of Information Security Reserach, 2023, 9(E1): 29-.
|
[13] |
.
[J]. Journal of Information Security Reserach, 2023, 9(E1): 42-.
|
[14] |
.
[J]. Journal of Information Security Reserach, 2023, 9(E1): 46-.
|
[15] |
.
[J]. Journal of Information Security Reserach, 2023, 9(E1): 55-.
|