| |
| A Hierarchical Model of Targeted Cyber Attacks Attribution |
| LIU Chaoge, FANG Binxing, LIU Baoxu, CUI Xiang and LIU Qixu |
| Published December 1, 2019 |
| 2019,4(4):1-18 [Abstract] [View PDF(2.71 M)] |
| |
| Open-loop RFID ownership transfer protocol based on PUF |
| WEI Min and SUN Ziwen |
| Published December 1, 2019 |
| 2019,4(4):19-32 [Abstract] [View PDF(1.00 M)] |
| |
| Systematic Research on the Side Channel Vulnerabilities of Improved Rotating S-box Masking Scheme |
| LIU Zeyi, WANG Tongtong, YIN Zhiyi, GAO Neng, ZHA Daren and TU Chenyang |
| Published December 1, 2019 |
| 2019,4(4):33-58 [Abstract] [View PDF(1.38 M)] |
| |
| Analyzing Transient Effectiveness of Dynamic Platform Technique in Resisting Attacks |
| CAI Yutong, CHANG Xiaolin, SHI Yu and CHEN Zhi |
| Published December 1, 2019 |
| 2019,4(4):59-67 [Abstract] [View PDF(1.98 M)] |
| |
| Research on Security Elements Knowledge Graph of Flows in Software-Defined Network |
| YOU Ruibang, YUAN Zimu, TU Bibo and MENG Dan |
| Published December 1, 2019 |
| 2019,4(4):68-83 [Abstract] [View PDF(1.13 M)] |
| |
| Research on SDN Control Layer Security Based on Mimic Defense |
| DING Shaohu, LI Junfei and JI Xinsheng |
| Published December 1, 2019 |
| 2019,4(4):84-93 [Abstract] [View PDF(1.07 M)] |
| |
| The Related-Key Differential Cryptanalysis of RECTANGLE-80 |
| WANG Shasha, ZHANG Wentao and XIANG Zejun |
| Published December 1, 2019 |
| 2019,4(4):94-108 [Abstract] [View PDF(614.80 K)] |
| |