Deep search:Searching for "security model" in 'ABSTRACT and KEYWORDGot 4 items.
index Title
1CCA2 secure biometric identity based encryption with constant-size ciphertext
Author(s):Yang Yang, Yu-pu Hu, Le-you Zhang,...  Clicked:8932  Download:3714  Cited:1  <Full Text>
Journal of Zhejiang University Science C  2011 Vol.12 No.10 P.819-827  DOI:10.1631/jzus.C1000429
2Moving target defense: state of the art and characteristics
Author(s):Gui-lin CAI, Bao-sheng WANG, Wei H...  Clicked:7173  Download:4425  Cited:1  <Full Text>  <PPT> 1957
Frontiers of Information Technology & Electronic Engineering  2016 Vol.17 No.11 P.1122-1153  DOI:10.1631/FITEE.1601321
3Design and implementation of a novel enterprise network defense system by maneuvering multi-dimensional net...
Author(s):Yang Chen, Hong-chao HU, Guo-zhen ...  Clicked:8370  Download:2853  Cited:0  <Full Text>  <PPT> 1969
Frontiers of Information Technology & Electronic Engineering  2019 Vol.20 No.2 P.238-252  DOI:10.1631/FITEE.1800516
4OntoCSD: an ontology-based security model for an integrated solution of cyberspace defense
Author(s):Dandan WU, Jie CHEN, Ruiyun XIE, K...  Clicked:1318  Download:761  Cited:0  <Full Text>  <PPT> 151
Frontiers of Information Technology & Electronic Engineering  2024 Vol.25 No.9 P.1209-1225  DOI:10.1631/FITEE.2300662
Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou 310027, China
Tel: +86-571-87952783; E-mail: cjzhang@zju.edu.cn
Copyright © 2000 - 2025 Journal of Zhejiang University-SCIENCE