Journal of Information Security Reserach ›› 2025, Vol. 11 ›› Issue (E2): 162-.
Previous Articles Next Articles
Online:2025-12-27
Published:2025-12-28
梁波1梁滏浩2
1(市场监督管理总局网数中心北京100045) 2(湘潭大学数学与计算科学学院湖南湘潭411105)
通讯作者:
梁波
高级工程师.主要研究方向为电子政务信息化建设和科技管理.
liangbo@samr.gov.cn
作者简介:梁波
高级工程师.主要研究方向为电子政务信息化建设和科技管理.
liangbo@samr.gov.cn
梁滏浩
主要研究方向为优化理论与方法.
1612576549@qq.com
[1]郝玉蓉, 朴春慧, 颜嘉麒, 等. 一种面向LDP的政府民意数据隐私保护方法[J]. 计算机仿真, 2023, 40(3): 377384[2]杨久华, 沈苏彬. 一种基于区块链的物联网访问控制方案[J]. 计算机技术与发展, 2023, 33(12): 136142[3]赵文静, 边根庆. 基于同态加密的跨链交易数据隐私保护[J]. 计算机系统应用, 2024, 33(9): 105113[4]Deshmukh M, Rawat A S. Lightweight symmetric key encryption for text using XOR operation and permutation matrix[J]. International Journal of Information Technology, 2023, 15(7): 35553562[5]Yang M, Wang H, Wan Z. PULABE: An efficient and quantumresistant CPABE with policy update in cloud storage[J]. IEEE Trans on Services Computing, 2023, 17(3): 11261139 |
| [1] | . Research Progress on Detection Technologies for Network Attack Based on Large Language Model#br# [J]. Journal of Information Security Reserach, 2026, 12(1): 16-. |
| [2] | . Smart Contract Vulnerabilities Based on Differential Evolutionary Algorithms and Solution Time Prediction Detection#br# [J]. Journal of Information Security Reserach, 2026, 12(1): 24-. |
| [3] | . PUFbased Identity Authentication for Internet of Things Against Machine Learning Attacks in Zerotrust Architecture#br# [J]. Journal of Information Security Reserach, 2026, 12(1): 33-. |
| [4] | . Object Removal Video Tampering Detection and Localization Based on Learnable Ptuning#br# [J]. Journal of Information Security Reserach, 2026, 12(1): 61-. |
| [5] |
.
The EU Artificial Intelligence Regulatory Sandbox System and Its Enlightenment#br#
#br#
[J]. Journal of Information Security Reserach, 2026, 12(1): 82-.
|
| [6] | . [J]. Journal of Information Security Reserach, 2025, 11(E2): 2-. |
| [7] | . [J]. Journal of Information Security Reserach, 2025, 11(E2): 8-. |
| [8] | . [J]. Journal of Information Security Reserach, 2025, 11(E2): 12-. |
| [9] | . [J]. Journal of Information Security Reserach, 2025, 11(E2): 15-. |
| [10] | . [J]. Journal of Information Security Reserach, 2025, 11(E2): 19-. |
| [11] | . [J]. Journal of Information Security Reserach, 2025, 11(E2): 25-. |
| [12] | . [J]. Journal of Information Security Reserach, 2025, 11(E2): 31-. |
| [13] | . [J]. Journal of Information Security Reserach, 2025, 11(E2): 35-. |
| [14] | . [J]. Journal of Information Security Reserach, 2025, 11(E2): 44-. |
| [15] | . [J]. Journal of Information Security Reserach, 2025, 11(E2): 48-. |
| Viewed | ||||||
|
Full text |
|
|||||
|
Abstract |
|
|||||