| |
| 5G Security: Requirements Analysis and Architecture Design Towards CT and IT Convergent Evolution |
| LI Hongjia, WANG Liming, XU Zhen and YANG Chang |
| Published October 1, 2018 |
| 2018,3(5):1-14 [Abstract] [View PDF(838.09 K)] |
| |
| A Multi-Authority Attribute-based Signcryption Scheme |
| NIE Xuyun, BAO Yangyang, SUN Jianfei, XIONG Hu and QIN Zhiguang |
| Published October 1, 2018 |
| 2018,3(5):15-24 [Abstract] [View PDF(992.55 K)] |
| |
| Research on Targeted Password Guessing Using Neural Networks |
| ZHOU Huan, LIU Qixu, CUI Xiang and ZHANG Fangjiao |
| Published October 1, 2018 |
| 2018,3(5):25-37 [Abstract] [View PDF(1.48 M)] |
| |
| Search of Internet of Thing Information in the Cyberspace |
| LI Qiang, JIA Yuxuan, SONG Jinke, LI Hong, ZHU Hongsong and SUN Limin |
| Published October 1, 2018 |
| 2018,3(5):38-53 [Abstract] [View PDF(679.92 K)] |
| |
| A Framework of Multi-id Identity-based Fully Homomorphic Encryption with Short Ciphertexts |
| WANG Xueqing, WANG Biao and XUE Rui |
| Published October 1, 2018 |
| 2018,3(5):54-63 [Abstract] [View PDF(493.62 K)] |
| |
| The Modeling and Risk Assessment on Redundancy Adjudication of Mimic Defense |
| LI Weichao, ZHANG Zheng, WANG Liqun and WU Jiangxing |
| Published October 1, 2018 |
| 2018,3(5):64-74 [Abstract] [View PDF(700.79 K)] |
| |
| A Framework based on Gadget Weighted Tagging (GWT) to Protect Against Code Reuse Attacks |
| MA Mengyu, CHEN Liwei, SHI Gang and MENG Dan |
| Published October 1, 2018 |
| 2018,3(5):75-91 [Abstract] [View PDF(1.27 M)] |
| |
| A Survey on Differential Privacy |
| LI Xiaoguang, LI Hui, LI Fenghua and ZHU Hui |
| Published October 1, 2018 |
| 2018,3(5):92-104 [Abstract] [View PDF(777.77 K)] |
| |
| Physical Layer Security Transmission Technology Based on Polarization-Shift Keying in Wireless Communications |
| LI Min, LIANG Lili and WEI Dong |
| Published October 1, 2018 |
| 2018,3(5):105-117 [Abstract] [View PDF(2.11 M)] |
| |