
| index | Title |
| 1 | CCA2 secure biometric identity based encryption with constant-size ciphertext Author(s):Yang Yang, Yu-pu Hu, Le-you Zhang,... Clicked:10523 Download:4612 Cited:1 <Full Text> Journal of Zhejiang University Science C 2011 Vol.12 No.10 P.819-827 DOI:10.1631/jzus.C1000429 |
| 2 | Moving target defense: state of the art and characteristics Author(s):Gui-lin CAI, Bao-sheng WANG, Wei H... Clicked:9699 Download:7188 Cited:1 <Full Text> <PPT> 2731 Frontiers of Information Technology & Electronic Engineering 2016 Vol.17 No.11 P.1122-1153 DOI:10.1631/FITEE.1601321 |
| 3 | Design and implementation of a novel enterprise network defense system by maneuvering multi-dimensional net... Author(s):Yang Chen, Hong-chao HU, Guo-zhen ... Clicked:11028 Download:4597 Cited:0 <Full Text> <PPT> 2826 Frontiers of Information Technology & Electronic Engineering 2019 Vol.20 No.2 P.238-252 DOI:10.1631/FITEE.1800516 |
| 4 | OntoCSD: an ontology-based security model for an integrated solution of cyberspace defense Author(s):Dandan WU, Jie CHEN, Ruiyun XIE, K... Clicked:3247 Download:2445 Cited:0 <Full Text> <PPT> 787 Frontiers of Information Technology & Electronic Engineering 2024 Vol.25 No.9 P.1209-1225 DOI:10.1631/FITEE.2300662 |