期刊文献+

Preface

Preface
在线阅读 下载PDF
导出
摘要 在第二十一个世纪,网络和信息安全为到打战争的一种新生活方式和一条新途径正在成为电子空间的批评基础。从国家策略的观点,关于 Snowden 和国家安全机构棱柱的丑闻证明了所有联网因特网行为在在在信息技术(信息技术) 主导的那些国家边的全球世界上的监视下面的信息,通讯信息,和个人。在 2011, USA 为电子空间释放了国际策略[1 ] ,它在全球电子安全表达一个新趋势,与从防卫改变到冒犯的 US 电子安全策略。相应于这个趋势,在 USA 的军队网络战争营发射了巨大的砍的最近的年里,反对我们的公民的攻击和利用联网基础结构。他们试图严重损坏另外的国家造破坏电子武器边的批评基础结构并且…… In the twenty-first century, network and information secu- rity is becoming the critical foundation of cyberspace for a new way of life and a new approach to fighting wars. From the perspective of a national strategy, the scandal about Snowden and the National Security Agency's PRISM has shown that all network information, communication information, and individuals' Internet behavior are under surveillance in the global world by those countries domi- nant in information technology (IT). In 2011, the USA released the "International Strategy for Cyberspace" [1], which embodies a new trend in global cyber security, with the US cyber security strategy changing from defense to offense. Corresponding to this trend, in recent years the army network warfare battalion of the USA has launched massive hacking attacks and exploitations against our national network infrastructure.
作者 Dengguo Feng
出处 《Chinese Science Bulletin》 SCIE EI CAS 2014年第32期4161-4162,共2页
  • 相关文献

参考文献6

二级参考文献78

  • 1邢修三.非平衡统计信息理论[J].物理学报,2004,53(9):2852-2863. 被引量:20
  • 2Kaufman LM (2009) Data security in the world of cloud computing.IEEE Secur Priv 7:61-64.
  • 3Almorsy M, Grundy J, Müller I (2010) An analysis of the cloudcomputing security problem. In: The Proceedings of the 2010Asia Pacific cloud workshop co-located with APSEC2010, IEEE,pp 1-6.
  • 4Blaze M, Bleumer G, Strauss M (1998) Divertible protocols andatomic proxy cryptography. In: Nyberg K (ed) EUROCRYPT 1998, LNCS, Springer, Heidelberg, 1403, pp 127-144.
  • 5Ibraimi L, Tang Q, Hartel P et al (2008) A type-and-identitybasedproxy re-encryption scheme and its application in healthcare.In: Secure Data Management 2008, LNCS, Springer, Heidelberg,5159, pp 185-198.
  • 6Boneh D, Franklin M (2001) Identity-based encryption from theweil pairing. In: Joe K (ed) CRYPTO 2001, LNCS, Springer,Heidelberg, 2139, pp 213-229.
  • 7Boldyreva A, Marc F, Palacio A et al (2007) A closer look atPKI: security and efficiency. In: Okamoto T, Wang X (eds) PKC 2007, LNCS, Springer, Heidelberg, 4450, pp 458-475.
  • 8Fujisaki E, Pointcheval D, Stern J (2004) RSA-OAEP is secureunder the RSA assumption. J Cryptol 17:81-104.
  • 9Zhou L, Marsh MA, Schneider FB et al (2005) Distributedblinding for ElGamal re-encryption. In: ICDCS 2005, IEEE,pp 824-824.
  • 10Wang XY, Hui LCK, Chow KP et al (2000) The differentialcryptanalysis of an AES finalist-serpent. Technical Report, HKUCSIS Technical Report TR-2000-04.

共引文献28

  • 1Preface[J].Journal of Computer Science & Technology,2006,21(5).
  • 2Wendy Hall,Juanzi Li,Li Ding,Jie Tang.Preface:Recent Developments in Semantic Web[J].Tsinghua Science and Technology,2010,15(6).
  • 3PREFACE[J].Journal of China University of Geosciences,2009,20(2).
  • 4HUANG Dexian, Vice Director of Technical Committee on Process Control, Chinese Association of Automation Vice Director of Technical Committee on Information Technology, Chemical Industry and Engineering Society of China Tsinghua University, China.Preface[J].Chinese Journal of Chemical Engineering,2012,20(6). 被引量:11
  • 5Preface[J].Chinese Journal of Chemical Engineering,2014,22(7).
  • 6Wenwu Zhu (1), Yonggang Wen (2), Zhi Wang (3).Preface[J].Journal of Computer Science & Technology,2015,30(6):1161-1162.
  • 7Li, Xiao-Dong,Luo, Wen-Jian,Yao, Xin.Preface[J].Journal of Computer Science & Technology,2008,23(1):1-1. 被引量:228
  • 8Wenwu Zhu(1) .Preface[J].Journal of Computer Science & Technology,2016,31(6):1069-1071.
  • 9K.Prasad Rao,G.Madhusudhan Reddy,Huijie Liu,V.Balasubramanian,G.Magudeeswaran.Preface[J].Defence Technology(防务技术),2015,11(3):187-187.
  • 10Xiao-Dong Zhang,Robert M.Critchfield Professor,Department of Computer Science and Engineering The Ohio State University,U.S.A..Preface[J].Journal of Computer Science & Technology,2011,26(3):343-343. 被引量:4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部