[1] |
高德毅, 宗爱东 . 从思政课程到课程思政:从战略高度构建高校思想政治教育课程体系[J]. 中国高等教育, 2017(1): 43-46.
|
|
GAO D Y , ZONG A D . From ideological and political course to course ideological and political course:constructing the course system of ideological and political education in colleges and universities from a strategic perspective[J]. Higher Education in China, 2017 (1): 43-46.
|
[2] |
高燕 . 课程思政建设的关键问题与解决路径[J]. 中国高等教育, 2017(Z3): 13-16.
|
|
GAO Y . Key issues and solutions of course ideological and political construction[J]. Higher Education in China, 2017 (Z3): 13-16.
|
[3] |
吴华, 王向斌, 潘建伟 . 量子通信现状与展望[J]. 中国科学:信息科学, 2014,44(3): 296-311.
|
|
WU H , WANG X B , PAN J W . Status and prospect of quantum communication[J]. Chinese Science:Information Science, 2014,44(3): 296-311.
|
[4] |
王晋岚 . 世界首条量子保密通信干线开通[J]. 科学源流, 2017(6): 52-52.
|
|
WANG J L . Successful opening of the world's first quantum secure communication trunk[J]. Origin & Development, 2017(6): 52-52.
|
[5] |
李建华 . 新型电子政务及其安全保障技术[J]. 上海交通大学学报, 2018,521(1): 1370-1381.
|
|
LI J H . New e-government and its security technology[J]. Journal of Shanghai Jiaotong University, 2018,521(1): 1370-1381.
|
[6] |
李古月, 胡爱群, 石乐 . 无线信道的密钥生成方法[J]. 密码学报, 2014,1(3): 211-224.
|
|
LI G Y , HU A Q , SHI L . Key generation method for wireless channel[J]. Journal of Cryptography, 2014,1(3): 211-224.
|
[7] |
WANG D , HU A Q , CHEN Y ,et al. An ESPRIT-based approach for rf fingerprint estimation in multi-antenna OFDM systems[J]. IEEE Wireless Communications Letters, 2017,6(6): 702-705.
|
[8] |
XING Y X , HU A Q , ZHANG J Q ,et al. On radio frequency fingerprint identi?cation for DSSS systems in low SNR scenarios[J]. IEEE Communications Letters, 2018,22(11): 2326-2329.
|
[9] |
LI G Y , HU A Q , ZHANG J Q ,et al. High-agreement uncorrelated secret key generation based on principal component analysis preprocessing[J]. IEEE Transactions on Communications, 2018,66(7): 3022-3034.
|
[10] |
KHAN M A , SALAH K . IoT security:review,blockchain solutions,and open challenges[J]. Future Generation Computer Systems, 2017.
|
[11] |
钱卫宁, 邵奇峰, 朱燕超 ,等. 区块链与可信数据管理:问题与方法[J]. 软件学报, 2018,29(1): 150-159.
|
|
QIAN W N , SHAO Q F , ZHU Y C ,et al. Research problems and methods in blockchain and trusted data management[J]. Journal of Software, 2018,29(1): 150-159.
|
[12] |
任春卉, 王志皓, 赵保 . 《可信计算体系结构》标准产业化应用[J]. 信息安全与通信保密, 2019(1): 43-49.
|
|
REN C H , WANG Z H , ZHAO B . Standard industrialization application of trusted computing architecture[J]. Information Security and Communication Secrecy, 2019(1): 43-49.
|
[13] |
张焕国, 罗捷, 金刚 ,等. 可信计算研究进展[J]. 武汉大学学报(理学版), 2006(52): 513-518.
|
|
ZHANG H G , LUO J , JIN G ,et al. Research progress in trusted computing[J]. Journal of Wuhan University (Science Edition), 2006(52): 513-518.
|
[14] |
徐震 . 我国可信计算现状与发展思考[J]. 中国信息安全, 2010(9): 69-70.
|
|
XU Z . Thinking about status and development of trust computing in China[J]. China Information security, 2010(9): 69-70.
|
[15] |
王甬平 . 建立自主可控、安全可信的国家网络安全体系:访信息系统工程专家、中国工程院院士沈昌祥[J]. 宁波通讯, 2015(1): 68-69.
|
|
WANG Y P . Establishing autonomous and controllable,secure trusted national network security system:visiting information systems security engineering professional,chinese academy of engineering,Sheng changxiang[J]. Ningbo Newsreport, 2015(1): 68-69.
|
[16] |
Differential privacy[EB/OL]. .
|
[17] |
高志强 . 满足本地差分隐私的位置数据采集方案[J]. 清华大学学报(自然科学版), 2019,59(1): 23-27.
|
|
GAO Z Q . Location data acquisition scheme for local differential privacy[J]. Journal of Tsinghua University (Natural Science Edition), 2019,59(1): 23-27.
|
[18] |
张晓莹, 彭辉, 陈红 . 无线传感器网络隐私保护数据聚集技术[J]. 通信学报, 2018,39(10): 130-142.
|
|
ZHANG X Y , PENG H , CHEN H . Data aggregation technology for privacy protection in wireless sensor networks[J]. Journal of Communications, 2018,39(10): 130-142.
|
[19] |
曹来成 . 基于属性加密的用户隐私保护云存储方案[J]. 清华大学学报(自然科学版), 2018,58(2): 150-156.
|
|
CAO L C . Cloud storage scheme for user privacy protection based on attribute encryption[J]. Journal of Tsinghua University (Natural Science Edition), 2018,58(2): 150-156.
|
[20] |
TIKKINEN-PIRI C , ROHUNEN A , MARKKULA J . EU general data protection regulation:changes and implications for personal data collecting companies[J]. Computer Law & Security Review, 2017:S0267364917301966.
|
[21] |
董贞良 . GB/T 35273—2017《信息安全技术,个人信息安全规范》解读[J]. 中国质量与标准导报, 2018,248(6): 25-27.
|
|
DONG Z L . GB/T 35273—2017《understanding of personal information security specification for information security technology》[J]. China Quality and Standards Review, 2018,248(6): 25-27.
|