[1] |
SHEN Changxiang, GONG Bei. The Innovation of Trusted Computing Based on the Domestic Cryptograph[J]. Journal of Cryptologic Reseatch, 2015,2(5):381-389.
|
|
沈昌祥, 公备. 基于国产密码体系的可信计算体系框架[J]. 密码学报, 2015,2(5):381-389.
|
[2] |
MENG Xiaofeng, CI Xiang. Big Data Management: Concepts, Techniques and Challenges[J]. Journal of Computer Research and Development, 2013,50(1):146-169.
|
|
孟小峰, 慈祥. 大数据管理:概念、技术与挑战[J]. 计算机研究与发展, 2013,50(1):146-169.
|
[3] |
LI Guojie, CHENG Xueqi. Research Status and Scientific Thinking of Big Data[J]. Bulletin of the Chinese Academy of Sciences, 2012,27(6):647-657.
|
|
李国杰, 程学旗. 大数据研究:未来科技及经济社会发展的重大战略领域—大数据的研究现状与科学思考[J]. 中国科学院院刊, 2012,27(6):647-657.
|
[4] |
SHEN Changxiang, ZHANG Huanguo, FENG Dengguo, et al. Overview of Information Security[J]. SCIENCE IN CHINA(SERIES E), 2007,37(2):129-150.
|
|
沈昌祥, 张焕国, 冯登国, 等. 信息安全综述[J]. 中国科学E 辑, 2007,37(2):129-150.
|
[5] |
FENG Dengguo. Preface to Information Security[J]. Chinese Journal of Computers, 2006,29(9):1-2.
|
|
冯登国. 《信息安全》专辑前言[J]. 计算机学报, 2006,29(9):1-2.
|
[6] |
LIN Chuang, PENG Xuehai. Research on Trustworthy Networks[J]. Chinese Journal of Computers, 2005,28(5):751-758.
|
|
林闯, 彭雪海. 可信网络研究[J]. 计算机学报, 2005,28(5):751-758.
|
[7] |
FENG Dengguo, ZHANG Min, ZHANG Yan, et al. Study on Cloud Computing Security[J]. Journal of Software, 2011,22(1):71-83.
|
|
冯登国, 张敏, 张妍, 等. 云计算安全研究[J]. 软件学报, 2011,22(1):71-83.
|
[8] |
LIN Chuang, FENG Fujun, LI Junshan. Access Control in New Network Environment[J]. Journal of Software, 2007,18(4). 955-966.
|
|
林闯, 封富君, 李俊山. 新型网络环境下的访问控制技术[J]. 软件学报, 2007,18(4):955-966.
|
[9] |
JIANG Hanxu, QIU liang. Advances in Key Techniques of Practical Secure Multi-Party Computation[J]. Journal of Computer Research and Development, 2015,52(10):2247-2257.
|
|
蒋瀚, 徐秋亮. 实用安全多方计算协议关键技术研究进展[J]. 计算机研究与发展, 2015,52(10):2247-2257.
|
[10] |
LEI Lei, CAI Quanwei, JING Jiwu, et al. Enforcing Access Controls on Encrypted Cloud Storage with Policy Hiding[J]. Journal of Software, 2016,27(6):1432-1450.
|
|
雷蕾, 蔡权伟, 荆继武, 等. 支持策略隐藏的加密云存储访问控制机制[J]. 软件学报, 2016,27(6):1432-1450.
|
[11] |
JING Jiwu. The Experience and Thinking of Studying Cryptography Law[J]. China Information Security, 2019,5(11):69-70.
|
|
荆继武. 学习《密码法》的体会与思考[J]. 中国信息安全, 2019,5(11):69-70.
|
[12] |
ZHENG Fangyu, LIN Jingqiang, WEI Rong, et al. Research Progresses on Security Applications of Cryptography and Discussions on Validation of Software Cryptographic Modules[J]. Journal of Cryptologic Reseatch, 2020,7(3):290-310.
|
|
郑昉昱, 林璟锵, 魏荣, 等. 密码应用安全技术研究及软件密码模块检测的讨论[ J]. 密码学报, 2020,7(3):290-310.
|