Volume 4,Issue 4,2019 Table of Contents

   
Other Issues:  
  

Contents

A Hierarchical Model of Targeted Cyber Attacks Attribution
  LIU Chaoge, FANG Binxing, LIU Baoxu, CUI Xiang and LIU Qixu
  Published December 1, 2019
  2019,4(4):1-18 [Abstract]  [View PDF(2.71 M)]
  
Open-loop RFID ownership transfer protocol based on PUF
  WEI Min and SUN Ziwen
  Published December 1, 2019
  2019,4(4):19-32 [Abstract]  [View PDF(1.00 M)]
  
Systematic Research on the Side Channel Vulnerabilities of Improved Rotating S-box Masking Scheme
  LIU Zeyi, WANG Tongtong, YIN Zhiyi, GAO Neng, ZHA Daren and TU Chenyang
  Published December 1, 2019
  2019,4(4):33-58 [Abstract]  [View PDF(1.38 M)]
  
Analyzing Transient Effectiveness of Dynamic Platform Technique in Resisting Attacks
  CAI Yutong, CHANG Xiaolin, SHI Yu and CHEN Zhi
  Published December 1, 2019
  2019,4(4):59-67 [Abstract]  [View PDF(1.98 M)]
  
Research on Security Elements Knowledge Graph of Flows in Software-Defined Network
  YOU Ruibang, YUAN Zimu, TU Bibo and MENG Dan
  Published December 1, 2019
  2019,4(4):68-83 [Abstract]  [View PDF(1.13 M)]
  
Research on SDN Control Layer Security Based on Mimic Defense
  DING Shaohu, LI Junfei and JI Xinsheng
  Published December 1, 2019
  2019,4(4):84-93 [Abstract]  [View PDF(1.07 M)]
  
The Related-Key Differential Cryptanalysis of RECTANGLE-80
  WANG Shasha, ZHANG Wentao and XIANG Zejun
  Published December 1, 2019
  2019,4(4):94-108 [Abstract]  [View PDF(614.80 K)]