
| index | Title |
| 1 | CCA2 secure biometric identity based encryption with constant-size ciphertext Author(s):Yang Yang, Yu-pu Hu, Le-you Zhang,... Clicked:10510 Download:4607 Cited:1 <Full Text> Journal of Zhejiang University Science C 2011 Vol.12 No.10 P.819-827 DOI:10.1631/jzus.C1000429 |
| 2 | Moving target defense: state of the art and characteristics Author(s):Gui-lin CAI, Bao-sheng WANG, Wei H... Clicked:9693 Download:7176 Cited:1 <Full Text> <PPT> 2697 Frontiers of Information Technology & Electronic Engineering 2016 Vol.17 No.11 P.1122-1153 DOI:10.1631/FITEE.1601321 |
| 3 | Design and implementation of a novel enterprise network defense system by maneuvering multi-dimensional net... Author(s):Yang Chen, Hong-chao HU, Guo-zhen ... Clicked:11023 Download:4584 Cited:0 <Full Text> <PPT> 2825 Frontiers of Information Technology & Electronic Engineering 2019 Vol.20 No.2 P.238-252 DOI:10.1631/FITEE.1800516 |
| 4 | OntoCSD: an ontology-based security model for an integrated solution of cyberspace defense Author(s):Dandan WU, Jie CHEN, Ruiyun XIE, K... Clicked:3236 Download:2427 Cited:0 <Full Text> <PPT> 782 Frontiers of Information Technology & Electronic Engineering 2024 Vol.25 No.9 P.1209-1225 DOI:10.1631/FITEE.2300662 |