涌现视角下的网络空间安全挑战(17)

来源:系统科学学报 【在线投稿】 栏目:期刊导读 时间:2021-07-30
作者:网站采编
关键词:
摘要:[82] Chiasson S, Forget A, Stobert E, et al. Multiple password interference in text passwords and click-based graphical passwords[C] //Proc of the 16th ACM Conf on Computer and Communications Security

[82] Chiasson S, Forget A, Stobert E, et al. Multiple password interference in text passwords and click-based graphical passwords[C] //Proc of the 16th ACM Conf on Computer and Communications Security. New York: ACM, 2009: 500-511

[83] Meng Weizhi, Li Wenjuan, Jiang Lijun, et al. On multiple password interference of touch screen patterns and text passwords[C] //Proc of the 36th CHI Conf on Human Factors in Computing Systems. New York: ACM, 2016: 4818-4822

[84] Snader R, Borisov N. A tune-up for Tor: Improving security and performance in the Tor network[C] //Proc of the 15th Network and Distributed System Security (NDSS) Symp. Reston, VA: Internet Society, 2008: 127-136

[85] Chen Zhouguo, Pu Shi, Zhu Shixiong. Traceback technology for anonymous network[J]. Journal of Computer Research and Development, 2012, 49(S2): 111-117 (in Chinese)

(陈周国, 蒲石, 祝世雄. 匿名网络追踪溯源综述[J]. 计算机研究与发展, 2012, 49(S2): 111-117)

[86] Dingledine R, Mathewson N, Syverson P. Tor: The second-generation onion router[C/OL] //Proc of the 13th USENIX Security Symp. Berkeley, CA: USENIX Association, 2004 [2019-06-10].

[87] Popa R A, Blumberg A J, Balakrishnan H, et al. Privacy and accountability for location-based aggregate statistics[C] //Proc of the 18th ACM Conf on Computer and Communications Security. New York: ACM, 2011: 653-666

[88] Cramer R, Ivan B D, Nielsen J B. Secure Multiparty Computation and Secret Sharing[M]. Cambridge, UK: Cambridge University Press, 2015

[89] Zhong Hong, Huang Liusheng, Luo Yonglong. A multi-candidate electronic voting scheme based on secure sum protocol[J]. Journal of Computer Research and Development, 2006, 43(8): 1405-1410 (in Chinese)

(仲红, 黄刘生, 罗永龙. 基于安全多方求和的多候选人电子选举方案[J]. 计算机研究与发展, 2006, 43(8): 1405-1410)

[90] Ben-Efraim A, Lindell Y, Omri E. Optimizing semi-honest secure multiparty computation for the Internet[C] //Proc of the 23rd ACM SIGSAC Conf on Computer & Communications Security. New York: ACM, 2016: 578-590

[91] Goldreich O. Secure multi-party computation[R/OL]. Rehovot: Weizmann Institute of Science, 1998[2019-06-10].

[92] Du Wenliang, Atallah M J. Secure multi-party computation problems and their applications: A review and open problems[C] //Proc of the 9th Workshop on New Security Paradigms. New York: ACM, 2001: 13-22

[93] Ben-David A, Nisan N, Pinkas B. FairplayMP: A system for secure multi-party computation[C] //Proc of the 15th ACM Conf on Computer and Communications Security. New York: ACM, 2008: 257-266

[94] Nasreen M A, Ganesh A, Sunitha C. A study on Byzantine fault tolerance methods in distributed networks[J]. Procedia Computer Science, 2016, 87: 50-54

[95] Baliga A. Understanding Blockchain Consensus Models[M]. Pune, Maharashtra, India: Persistent Systems, 2017

[96] De Wolf T, Holvoet T. Emergence versus self-organisation: Different concepts but promising when combined[C] //Proc of the 3rd Int Workshop on Engineering Self-organising Applications. Berlin: Springer, 2004: 1-15

[97] Fisher D A, Lipson H F. Emergent algorithms: A new method for enhancing survivability in unbounded systems[C/OL] //Proc of the 32nd Annual Hawaii Int Conf on Systems Sciences, 1999 [2019-06-10]:

[98] Laracy J R, Leveson N G. Apply STAMP to critical infrastructure protection[C] //Proc of the 7th IEEE Conf on Technologies for Homeland Security. Piscataway, NJ: IEEE, 2007: 215-220

[99] Leveson N G. Safety analysis in early concept development and requirements generation[C] //Proc of the Annual INCOSE Int Symp. San Diego, CA: International Council on Systems Engineering, 2018: 441-455

[100] Laracy J R. A systems-theoretic security model for large scale, complex systems applied to the US air transportation system[D]. Cambridge, MA: Massachusetts Institute of Technology, 2007

[101] Xu Shouhuai, Lu Wenlian, Xu Li. Push-and pull-based epidemic spreading in networks: Thresholds and deeper insights[J]. ACM Transactions on Autonomous and Adaptive Systems, 2012, 7(3): No.32

[102] Zheng Ren, Lu Wenlian, Xu Shouhuai. Active cyber defense dynamics exhibiting rich phenomena[C] //Proc of the 2nd Symp and Bootcamp on the Science of Security. New York: ACM, 2015: No.2

[103] Zheng Ren, Lu Wenlian, Xu Shouhuai. Preventive and reactive cyber defense dynamics is globally stable[J]. IEEE Transactions on Network Science and Engineering, 2018, 5(2): 156-170

[104] Xu Shouhuai, Lu Wenlian, Zhan Zhenxin. A stochastic model of multivirus dynamics[J]. IEEE Transactions on Dependable and Secure Computing, 2011, 9(1): 30-45

[105] Miklas A G, Gollu K K, Chan K K W, et al. Exploiting social interactions in mobile systems[C] //Proc of the 9th Int Conf on Ubiquitous Computing. Berlin: Springer, 2007: 409-428

[106] Zakinthinos A, Lee E S. Composing secure systems that have emergent properties[C] //Proc of the 11th IEEE Computer Security Foundations Workshop. Piscataway, NJ: IEEE, 1998: 117-122

文章来源:《系统科学学报》 网址: http://www.xtkxxb.cn/qikandaodu/2021/0730/597.html



上一篇:工程测量开放式虚拟仿真实验系统建设方法研究
下一篇:系统科学视角下提升党员导生培养质量研究以大

系统科学学报投稿 | 系统科学学报编辑部| 系统科学学报版面费 | 系统科学学报论文发表 | 系统科学学报最新目录
Copyright © 2019 《系统科学学报》杂志社 版权所有
投稿电话: 投稿邮箱: