Survey of information security
Tóm tắt
Tài liệu tham khảo
Shen C X. Thinking on the Enhancement of Information Security Assurance Architecture, Literary of Information Security (in Chinese). Wuhan: Hubei Science and Technology Press, 2002
Zhang H G, Wang L N, Huang C H. Research and practice for information security discipline construction and personnel training. In: Symposium on Deans of Computer Institute of China. Beijing: Higher Education Press, 2005
Pfleeger C P, Pfleeger S L. Security in Computing. 3rd ed. NJ: Prentice Hall, 2003
Feng D G. Research state and development trend of cryptology in and abroad. J Commun (in Chinese), 2002, 23(5): 18–26
Cao Z F, Shui XQ. Development direction and latest progress for cryptology. Comput Edu (in Chinese), 2005, 19–21
Federal Information Processing Standards Publication (FIPS 197) Advanced Encryption Standard (AES), Nov. 26, 2001
Meng Q S, Zhang H G, Qin Z P, et al. Design bent function using evolving method. Acta Elect Sin (in Chinese), 2004, 32(11): 1901–1903
Luo Q B, Zhang J Z, Zhou J. Complexity Analysis of the Chaotic Key Squence, CHINACRYPT’2006 (in Chinese). Beijing: Press of Science and Technology of China, 2006
Rabin M O. Digitalized signatures and public key functions as intractable as factorization. Technical Report LCS/TR212, Cambridge MA (1979), MIT
Tao R J, Chen S H. A finite automaton public key cryptosystem and digital signatures. Chin J Comput (in Chinese), 1985, 8(6): 401–409
Cao Z F. A public key cryptosystem based on a conic over finite fields Fp. In: Advances in Cryptology-Chinacrypt’98 (in Chinese). Beijing: Science Press, 1998. 45–49
Cao Z F. Conic analog of RSA cryptosystem and some improved RSA cryptosystems. J Heilongjiang Univ (in Chinese), 1999, 16(4): 15–18
Cao Z F, Zhang Biao. MC public key cryptosystem based on Chinese remainder theorem. In: Advances in Cryptology-CHINACRYPT’2000 (in Chinese). Beijing: Science Press, 2000. 29–33
NIST. Digital Signature Standard (DSS), Federal Information Process Standards Publication, 186
Liang X H, Cao Z F, Chai Z C, et al. ID-based threshold blind signature scheme from bilinear pair. In: ChinaCrypto’2006, 2006. 244–252
Wang G. Bibliography on signatures. Available at: http://icsd.i2r.a-star.edu.sg/staff/guilin/bible.htm.
ITU-T, Rec. X.509 (revised) the Directory — Authentication Framework, 1993, International Telecommunication Union, Geneva, Switzerland
Barreto P S L M. The Pairing-Based Crypto Lounge, http://paginas.terra.com.br/informatica/paulobarreto/ pblounge.html
Nan X H. Identity Authentication Based on CPK (in Chinese). Beijing: National Defense Industry Press, 2006
Goldwasser S, Micali S. Probabilisticencryption. J Comput Syst Sci, 28(3): 270–299
Pointcheval D. Provable Security for Public Key Schemes, http://www.di.ens.fr/:_pointche/pub.php?reference=Po04
Bellare M, Rogaway P. Provably secure session key distribution: The three party case. In: 27th ACM Symposium on the Theory of Computing. New York: ACM Press, 1995. 57–66
Choo K K R. Provably-Secure Mutual Authentication and Key Establishment Protocols Lounge, http://sky.fit.qut.edu.au/:_choo/lounge.html
Bellare M, Rogaway P. Random oracles are practical: a paradigm for designing efficient protocols. In: Proc. of the 1st ACM Conference on Computer and Communication Security. New York: ACM Press, 1993. 62–73
Zeng G H. Quantum Identity Authentication Without Lost of Quantum Channel. In: CHINACRYPT’2004. Beijing: Science Press, 2004
Xiao G Z, Lu M X. DNA computing and DNA code. J Engin Math, 2006, 23(1): 1–6
Department of Defense Computer Security Center. DoD 5200.28-STD. Department of Defense Trusted Computer System Evaluation Criteria [S]. USA: DOD, December 1985
National Computer Security Center. NCSC-TG-021. Trusted Database Management System Interpretation [S]. USA: DOD, April 1991
National Computer Security Center. NCSC-TG-005. Trusted Network Interpretation of the Trusted Computer System Evaluation Criteria [S]. USA: DOD, July 1987
Trusted Computing Group. TCG Specification Architecture Overview [EB/OL]. [2005-03-01]. https://www.trustedcomputinggroup.org
The Open Trusted Computing (OpenTC) consortium. General activities of OpenTC [EB/OL]. [2006-3-1]. http://www.opentc.net/activities
Microsoft. Trusted Platform Module Services in Windows Longhorn [EB/OL]. [2005-4-25]. http://www.microsoft.com/resources/ngscb
Intel Corporation. LaGrande Technology Architectural Overview [EB/OL]. [2004-5-1]. http://www.intel.com/technology/security
Zhang H G, Wu G Q, Qin Z P, et al. A new type of secure microcomputer. In: Proc. of First Chinese Conference on Trusted Computing and Information Security. J Wuhan Univ (Nat Sci Ed) (in Chinese), 2004, 50(s1): 1–6
Zhan H G, Liu Y Z, Yu F J, et al. A new type of embedded secure module. In: Proc. of First Chinese Conference on Trusted Computing and Information Security. J Wuhan Univ (Nat Sci Ed) (in Chinese), 2004, 50(s1): 7–11
Qu Y W. Software Behavior (in Chinese). Beijing: The Electronic Industry Press, 2004
Chen H W, Wang J, Dong W. The high trusted software engineer. Acta Elect Sin, 2003, 31(12): 1933–1938
Feng D G. Network Security-Principle and Technology (in Chinese). Beijing: Science Press, 2003
Feng D G. Research State and Development Trend of Information Security Technology in and abroad (in Chinese). 2005, Qinghua University Press, 2006. 236–256
Feng D G, Wang X Y. Progress and Prospect on Information Security Research in China. J Comput Sci Tech, 2006, 21(5): 740–755
Shim S S Y, Gong L, Rubin A D, et al. Securing the high-speed internet. IEEE Comput, 2004, 37(6): 33–35
Wang Y M, Zhang T, Huang J W, et al. Information Hiding-Theory and Technology (in Chinese). Beijing: Tsinghua University Press, 2006