[1] |
REN Zejun.Computer Network Security and Protection Strategy[J].China New Telecommunications,2012(19): 61-62.
|
|
任泽君. 计算机网络安全及防护策略[J].中国新通信,2012(19): 61-62.
|
[2] |
PENG Guojun, SHAO Yuru, ZHENG Yi.Mobile Intelligent Terminal Security Threat Analysis and Protection Research[J]. Netinfo Security, 2012,12(1): 58-63.
|
|
彭国军, 邵玉如,郑祎. 移动智能终端安全威胁分析与防护研究[J].信息网络安全,2012,12(1): 58-63.
|
[3] |
LIU Jian,SU Purui, YANG Min, et al.Software and Cyber Security-A Surway[J]. Journal of Software,2018,29(1):42-68.
|
|
刘剑,苏璞睿,杨珉,等.软件与网络安全研究综述[J].软件学报,2018,29(1):42-68.
|
[4] |
DUAN Xindong, MA Jianfeng.Provable Secure Trusted Protocol for Network Storage[J].Journal on Communications, 2011,32(5): 169-174.
|
|
段新东, 马建峰.可证明安全的可信网络存储协议[J].通信学报,2011,32(5): 169-174.
|
[5] |
ZHANG Ruoding, ZHANG Yan.Intelligent Mobile Terminal Privacy Data Leakage Problems and Protection Measures[J].Security Work, 2013(9): 54-55.
|
|
张若定,张妍.智能移动终端隐私数据泄露问题与防护手段[J].保密工作,2013(9): 54-55.
|
[6] |
GUO Weiwei.Application of Intelligent Mobile Terminal in Multimedia Conference System[J].Electronic Technology & Software Engineering, 2014(10):74-75.
|
|
郭薇薇. 智能移动终端在多媒体会议系统中的应用[J].电子技术与软件工程, 2014(10):74-75.
|
[7] |
GONG Jiezhong, CHEN Gongliang,LI Jianhua.Research on Technology of Trust Management for Intelligent Mobile Terminal[J]. Journal of China Academy of Electronics and Information Technology,2011,6(6) :567-570.
|
|
龚洁中,陈恭亮,李建华.智能移动终端的信任管理技术研究[J]. 中国电子科学研究院学报, 2011,6(6) :567-570.
|
[8] |
ZHAO Bo, ZHANG Huanguo, LI Jing, et al.The System Architecture and Security Structure of Trusted PDA[J].Chinese Journal of Computers, 2010,33(1): 82-92.
|
|
赵波,张焕国,李晶,等.可信PDA计算平台系统结构与安全机制[J].计算机学报, 2010,33(1): 82-92.
|
[9] |
YE Weiwei, OU Qingyu, BAI Xiaowu.Research on Authentication Scheme of Cryptographic Service System Based on Service Architecture[J]. Netinfo Security, 2016 ,16(5) : 37-43.
|
|
叶伟伟,欧庆余, 柏小武.基于服务架构的密码服务系统认证方案研究[J].信息网络安全,2016,16(5):37-43.
|
[10] |
YAN Fei, REN Jiangchun, DAI Kui, et al.Design and Implementation of Secure Authenticated Protocol Based on TNC[J].Computer Engineering, 2007,33(12):160-162.
|
|
颜菲, 任江春,戴葵,等.基于TNC的安全认证协议的设计与实现[J].计算机工程,2007,33(12):160-162.
|
[11] |
ZHANG Yaqi, HE Yongzhong, YU Aimin.A SSH Protocol Based on the Trusted Attestation of a Third Party Platform[J].Netinfo Security,2016,16(12):34-45.
|
|
张亚奇,何永忠,于爱民.一种基于第三方平台可信证明的SSH协议[J].信息网络安全,2016,16(12):34-45.
|
[12] |
JIANG Chunlin, JIA Weijia, GU Ke.Practical Anonymous Authentication Protocol for Mobile Networks[J].Journal of Chinese Computer Systems, 2012,33(7):1417-1421.
|
|
姜春林,贾维嘉,谷科. 实用的移动网络匿名认证协议[J].小型微型计算机系统,2012,33(7):1417-1421.
|