[1] |
CAI Si-mu, WANG Li-bin.
A Universally-composable Secure Non-interactive Commitment Scheme
[J]. Computer and Modernization, 2024, 0(01): 6-12.
|
[2] |
HAN Dong-song, SHA Le-tian, ZHAO Chuang-ye.
Worm and Agent-based Attack Modeling for Industrial Control Systems
[J]. Computer and Modernization, 2023, 0(10): 107-114.
|
[3] |
YE Li-ming, CHEN Wei-wen.
A Cascaded Insulator Defect Detection Model Combining Semantic Segmentation and Object Detection
[J]. Computer and Modernization, 2023, 0(06): 82-88.
|
[4] |
LIU Jun, YUAN Lin, FENG Zhi-shang, ZHANG Biao, LIU Chao.
Efficient Healing Key Management Scheme for UAV Group
[J]. Computer and Modernization, 2023, 0(06): 103-109.
|
[5] |
ZHA Kai-jin, WANG Zhi-bo, HE Yue-shun, XU Hong-zhen.
Survey on Blockchain Security Protection
[J]. Computer and Modernization, 2023, 0(06): 110-117.
|
[6] |
DENG Yin-juan, DU Hong-zhen, DOU Xiao-xia.
Registered Users Public Key Searchable Encryption Scheme with Secure-channel Free
[J]. Computer and Modernization, 2020, 0(09): 43-48.
|
[7] |
DENG Ming-wei, OU Wei, YANG Jie.
Safety Analysis of Three Classic Blockchain Consensus Mechanisms
[J]. Computer and Modernization, 2020, 0(06): 34-.
|
[8] |
ZHANG Xi, WANG Jian.
A Public Integrity Auditing Scheme Based on Blind Signature for Shared Data in Cloud
[J]. Computer and Modernization, 2020, 0(04): 60-.
|
[9] |
WU Ke-he, CHEN Hong-xiang, LI Wei.
Research on Beidou Secure Transport Protocol Based on SM9 Identity Password
[J]. Computer and Modernization, 2020, 0(02): 41-.
|
[10] |
ZHANG Yi, WANG Bo.
Image Encryption Based on Fractional Rossler Chaotic Sequence
[J]. Computer and Modernization, 2019, 0(12): 119-.
|
[11] |
WEN Ting-ting, LI Hong-zhe.
Elastic Load Balancing Algorithm for Cloud Computing Service
[J]. Computer and Modernization, 2019, 0(10): 28-.
|
[12] |
LI He-ting, FENG Ren-jun, CHEN Hai-yan, JING Dong-sheng.
Intrusion Detection Based on Heterogeneous Convolutional Neural Network
[J]. Computer and Modernization, 2019, 0(10): 117-.
|
[13] |
ZHANG Su-ning, WANG Yue-juan, WU Shui-ming, JING Dong-sheng.
Network Intrusion Data Clustering Algorithm Based on Krylov Subspace
[J]. Computer and Modernization, 2019, 0(10): 121-.
|
[14] |
SHANG Jing-wei1,2, JIANG Rong1,2, HU Xiao-han1,2, SHI Ming-yue1,2.
Medical Big Data and Privacy Leakage
[J]. Computer and Modernization, 2019, 0(07): 111-.
|
[15] |
ZHANG Peng, ZHOU Liang.
Trust-based Dynamic Multi-level Access Control Model
[J]. Computer and Modernization, 2019, 0(07): 116-.
|