Volume 3,Issue 5,2018 Table of Contents

Other Issues:  


5G Security: Requirements Analysis and Architecture Design Towards CT and IT Convergent Evolution
  LI Hongjia, WANG Liming, XU Zhen and YANG Chang
  Published October 1, 2018
  2018,3(5):1-14 [Abstract]  [View PDF(838.09 K)]
A Multi-Authority Attribute-based Signcryption Scheme
  NIE Xuyun, BAO Yangyang, SUN Jianfei, XIONG Hu and QIN Zhiguang
  Published October 1, 2018
  2018,3(5):15-24 [Abstract]  [View PDF(992.55 K)]
Research on Targeted Password Guessing Using Neural Networks
  ZHOU Huan, LIU Qixu, CUI Xiang and ZHANG Fangjiao
  Published October 1, 2018
  2018,3(5):25-37 [Abstract]  [View PDF(1.48 M)]
Search of Internet of Thing Information in the Cyberspace
  LI Qiang, JIA Yuxuan, SONG Jinke, LI Hong, ZHU Hongsong and SUN Limin
  Published October 1, 2018
  2018,3(5):38-53 [Abstract]  [View PDF(679.92 K)]
A Framework of Multi-id Identity-based Fully Homomorphic Encryption with Short Ciphertexts
  WANG Xueqing, WANG Biao and XUE Rui
  Published October 1, 2018
  2018,3(5):54-63 [Abstract]  [View PDF(493.62 K)]
The Modeling and Risk Assessment on Redundancy Adjudication of Mimic Defense
  LI Weichao, ZHANG Zheng, WANG Liqun and WU Jiangxing
  Published October 1, 2018
  2018,3(5):64-74 [Abstract]  [View PDF(700.79 K)]
A Framework based on Gadget Weighted Tagging (GWT) to Protect Against Code Reuse Attacks
  MA Mengyu, CHEN Liwei, SHI Gang and MENG Dan
  Published October 1, 2018
  2018,3(5):75-91 [Abstract]  [View PDF(1.27 M)]
A Survey on Differential Privacy
  LI Xiaoguang, LI Hui, LI Fenghua and ZHU Hui
  Published October 1, 2018
  2018,3(5):92-104 [Abstract]  [View PDF(777.77 K)]
Physical Layer Security Transmission Technology Based on Polarization-Shift Keying in Wireless Communications
  LI Min, LIANG Lili and WEI Dong
  Published October 1, 2018
  2018,3(5):105-117 [Abstract]  [View PDF(2.11 M)]