| [1] |
.
An Effective Website Fingerprinting Defense Utilizing Padding #br#
Based on the Number of Incoming Cells#br#
[J]. Journal of Information Security Reserach, 2024, 10(12): 1100-.
|
| [2] |
.
Voice Interface Permission Control Based on Command Compliance Analysis
[J]. Journal of Information Security Reserach, 2024, 10(12): 1144-.
|
| [3] |
.
Consortium Blockchain Identity Privacy Protection Scheme Based on Hierarchical Group Signature#br#
[J]. Journal of Information Security Reserach, 2024, 10(12): 1160-.
|
| [4] |
.
Twoway Authentication Scheme for Railway Time Synchronization Protocol
[J]. Journal of Information Security Reserach, 2024, 10(12): 1165-.
|
| [5] |
.
Stream Cipher Cryptosystem Recognition Scheme Based on Hamming Weight
[J]. Journal of Information Security Reserach, 2024, 10(12): 1172-.
|
| [6] |
.
[J]. Journal of Information Security Reserach, 2024, 10(E2): 18-.
|
| [7] |
.
[J]. Journal of Information Security Reserach, 2024, 10(E2): 64-.
|
| [8] |
.
[J]. Journal of Information Security Reserach, 2024, 10(E2): 68-.
|
| [9] |
.
[J]. Journal of Information Security Reserach, 2024, 10(E2): 77-.
|
| [10] |
.
[J]. Journal of Information Security Reserach, 2024, 10(E2): 88-.
|
| [11] |
.
[J]. Journal of Information Security Reserach, 2024, 10(E2): 110-.
|
| [12] |
.
[J]. Journal of Information Security Reserach, 2024, 10(E2): 121-.
|
| [13] |
.
[J]. Journal of Information Security Reserach, 2024, 10(E2): 130-.
|
| [14] |
.
[J]. Journal of Information Security Reserach, 2024, 10(E2): 139-.
|
| [15] |
.
[J]. Journal of Information Security Reserach, 2024, 10(E2): 139-.
|