[1] |
.
Zero Trust IAM Architecture Technology Based on Dynamic Risk #br#
Assessment Mechanism#br#
[J]. Journal of Information Security Reserach, 2023, 9(12): 1190-.
|
[2] |
.
Design and Practice of Open Government Data Platform Based on Privacypreserving Computation
[J]. Journal of Information Security Reserach, 2023, 9(12): 1203-.
|
[3] |
.
Research on the Practice of DevSecOps in the Construction of Digital Government
[J]. Journal of Information Security Reserach, 2023, 9(12): 1210-.
|
[4] |
.
Data Life Cycle Safety Monitoring Method Driven by Big Data
[J]. Journal of Information Security Reserach, 2023, 9(12): 1226-.
|
[5] |
.
[J]. Journal of Information Security Reserach, 2023, 9(E2): 21-.
|
[6] |
.
[J]. Journal of Information Security Reserach, 2023, 9(E2): 37-.
|
[7] |
.
[J]. Journal of Information Security Reserach, 2023, 9(E2): 41-.
|
[8] |
.
[J]. Journal of Information Security Reserach, 2023, 9(E2): 87-.
|
[9] |
.
[J]. Journal of Information Security Reserach, 2023, 9(E2): 100-.
|
[10] |
.
[J]. Journal of Information Security Reserach, 2023, 9(E2): 104-.
|
[11] |
.
[J]. Journal of Information Security Reserach, 2023, 9(E2): 118-.
|
[12] |
.
[J]. Journal of Information Security Reserach, 2023, 9(E2): 53-.
|
[13] |
.
[J]. Journal of Information Security Reserach, 2023, 9(E2): 62-.
|
[14] |
.
The Study of Fair Third Party in Typical Scenarios of Privacy Computing#br#
#br#
[J]. Journal of Information Security Reserach, 2023, 9(11): 1086-.
|
[15] |
.
[J]. Journal of Information Security Reserach, 2023, 9(E1): 20-.
|