[1] |
王文宇 . 现代密码技术发展及在数据安全中的应用[J]. 计算机安全, 2012(2): 36-39. WANG W Y . The development of contemporary cryptography technology and application in data security[J]. Computer Security, 2012(2): 36-39.
|
[2] |
黄刘生, 田苗苗, 黄河 . 大数据隐私保护密码技术研究综述[J]. 软件学报, 2015,26(4): 945-959. HUANG L S , TIAN M M , HUANG H . Preserving privacy in big data:a survey from the cryptographic perspective[J]. Ruan Jian Xue Bao/Journal of Software, 2015,26(4): 945-959.
|
[3] |
张翼英, 张素香 . 量子通信及其在电力通信的应用[J]. 电力信息与通信技术, 2016,14(9): 7-11. ZHANG Y Y , ZHANG S X . Quantum communication and its Application in power communication[J]. Electric Power Information and Communication Technology, 2016,14(9): 7-11.
|
[4] |
陈智雨, 高德荃, 王栋 ,等. 面向能源互联网的电力量子保密通信系统性能评估[J]. 计算机研究与发展, 2017,54(4): 711-719. CHEN Z Y , GAO D Q , WANG D ,et al. Performance evaluation of power quantum secure communication system for energy internet[J]. Jonrnal of Cornputer Research and Development, 2017,54(04): 711-719.
|
[5] |
秦志光 . 密码算法的现状和发展研究[J]. 计算机应用, 2004,24(2): 1-4. QIN Z G . Cryptography algorithm-survey and trends[J]. Journal of Computer Applications, 2004,24(2): 1-4.
|
[6] |
伍华健 . 公开密钥密码体系在网络安全中的应用研究[J]. 微计算机信息, 2006,22(4-3): 14-16. WU H J . The Application of publish cryptography on network[J]. Microcomputer Information, 2006,22(4-3): 14-16.
|
[7] |
李凌燕, 梁瑞生, 唐志列 ,等. 量子保密通信系统的分析与研究[J]. 激光与光电子学进展, 2004,41(12): 20-25. LI L Y , LIANG R S , TANG Z L ,et al. Analysis and study of quantum cryptography communication system[J]. Laser & Optoelectronics Progress, 2004,41(12): 20-25.
|
[8] |
孙仕海, 梁林梅 . 量子保密通信技术前沿述评[J]. 国防科技, 2014,35(6): 7-13. SUN S H , LIANG L M . Quantum cryptography[J]. National Defense Science & Technology, 2014,35(6): 7-13.
|
[9] |
赖俊森, 吴冰冰, 李少晖 ,等. 量子保密通信研究进展与安全性分析[J]. 电信科学, 2015,31(6): 46-52. LAI J S , WU B B , LI S H ,et al. Progress and security analysis of quantum cryptography communication[J]. Telecommunications Science, 2015,31(6): 46-52.
|
[10] |
SHANNON C E . A mathematical theory of communication[J]. Bell System Technical Journal, 1984,27(3): 379-423.
|
[11] |
SHANNON C E . Prediction and entropy of printed English[J]. Bell System Technical Journal, 1951,30(1): 50-64.
|
[12] |
BELLOVIN S M . Frank miller:inventor of the one-time pad[J]. Cryptologia, 2011,35(3): 203-222.
|
[13] |
赵波, 戴忠华, 向騻 ,等. 一种云平台可信性分析模型建立方法[J]. 软件学报, 2016,27(6): 1349-1365. ZHAO B , DAI Z H , XIANG S ,et al. Model constructing method for analyzing the trusty of cloud[J]. Journal of Software, 2016,27(6): 1349-1365.
|
[14] |
王栋, 葛冰玉, 玄佳兴 ,等. 电力信息系统运行测试技术研究[J]. 电力信息与通信技术, 2017,15(6): 50-55. WANG D , GE B Y , XUAN J X ,et al. Research on operation test technology in power information system[J]. Electric Power Information and Communication Technology, 2017,15(6): 50-55.
|
[15] |
池亚平, 姜停停, 戴楚屏 ,等. 基于软件定义网络的云平台入侵防御方案设计与实现[J]. 计算机应用, 2017,37(6): 1625-1629. CHI Y P , JIANG T T , DAI C P ,et al. Design and implementation of cloud platform intrusion prevention system based on software defined network[J]. Journal of Computer Applications, 2017,37(6): 1625-1629.
|
[16] |
王笑帝, 张云勇, 刘镝 ,等. 云计算虚拟化安全技术研究[J]. 电信科学, 2015,31(6): 1-5. WANG X D , ZHANG Y Y , LIU D ,et al. Research on security of virtualization on cloud computing[J]. Telecommunications Science, 2015,31(6): 1-5.
|
[17] |
刘明辉, 张尼, 张云勇 ,等. 云环境下的敏感数据保护技术研究[J]. 电信科学, 2014,30(11): 2-8. LIU M H , ZHANG N , ZHANG Y Y ,et al. Research on sensitive data protection technology on cloud computing[J]. Telecommunications Science, 2014,30(11): 2-8.
|
[18] |
章谦骅, 章坚武 . 基于云安全技术的智慧政务云解决方案[J]. 电信科学, 2017,33(3): 107-111. ZHANG J H , ZHANG J W . Solution for smart government cloud based on cloud security technology[J]. Telecommunications Science, 2017,33(3): 107-111.
|