Research on detection of Android application privacy compliance
王申奥,王亚龙,王乾旭,贺紫怡,李 晖
An authentication system based on face privacy protection using MAE
钱泽凯,童彦澎,刘绍辉,王雨桐,王诗语
A survey on wireless eavesdropping threats and countermeasures
王振东,任晨辉,安 洁,张骞允,刘建伟
“MAD” fake face detector based on multi-attentional network
马梓为,杨子琪,李晨帆,黄郅皓
Trade-offs in the regulation of cross-border flows of personal data from the perspective of proportionality principle
张潆之
Challenges and responses to cross-border data flows
杜 昕
Analysis of the predicament and practice path in the initial stage of digital transformation in higher education
黄 冉,王智勇
Implementation of the personal information protection certification system based on the Implementation Rules for Personal Information Protection Certification
刘懿阳
Discussion on security governance of open source software supply chain of telecommunication operators
余建利,姜荣霞,卢 蓉 (中国移动通信集团浙江有限公司,浙江 杭州310000)
Application and security protection of server virtualization in network information system
李 超,党增江
Research on the theme and emotional evolution of enterprise crisis public opinion——Take “chaos in Shuanghui workshop” as an example
龚 睿,王筱莉,朱 株,连卓毅
Development and application of signal fingerprint identification technology
徐韦佳,汪泽焱,李延标,娄朴根,姚 佳,徐 劼,白 静
Blockchain-based electronic license sharing and privacy-preserving scheme
湛高峰,王晓峰,程 楠
Design and simulation of the timing control system for power on board
张 彪,邢计元,王 帅
凡《信息技术与网络安全》录用的文章,如作者没有关于汇编权、翻译权、印刷权及电子版的复制权、信息网络传播权与发行权等版权的特殊声明,即视作该文章署名作者同意将该文章的汇编权、翻译权、印刷权及电子版的复制权、信息网络传播权与发行权授予本刊,本刊有权授权本刊合作数据库、合作媒体等合作伙伴使用。同时,本刊支付的稿酬已包含上述使用的费用,特此声明。