- · 《系统科学学报》期刊栏[01/26]
- · 《系统科学学报》投稿方[01/26]
- · 系统科学学报版面费是多[01/26]
涌现视角下的网络空间安全挑战(17)
作者:网站采编关键词:
摘要:[82] Chiasson S, Forget A, Stobert E, et al. Multiple password interference in text passwords and click-based graphical passwords[C] //Proc of the 16th ACM Conf on Computer and Communications Security
[82] Chiasson S, Forget A, Stobert E, et al. Multiple password interference in text passwords and click-based graphical passwords[C] //Proc of the 16th ACM Conf on Computer and Communications Security. New York: ACM, 2009: 500-511
[83] Meng Weizhi, Li Wenjuan, Jiang Lijun, et al. On multiple password interference of touch screen patterns and text passwords[C] //Proc of the 36th CHI Conf on Human Factors in Computing Systems. New York: ACM, 2016: 4818-4822
[84] Snader R, Borisov N. A tune-up for Tor: Improving security and performance in the Tor network[C] //Proc of the 15th Network and Distributed System Security (NDSS) Symp. Reston, VA: Internet Society, 2008: 127-136
[85] Chen Zhouguo, Pu Shi, Zhu Shixiong. Traceback technology for anonymous network[J]. Journal of Computer Research and Development, 2012, 49(S2): 111-117 (in Chinese)
(陈周国, 蒲石, 祝世雄. 匿名网络追踪溯源综述[J]. 计算机研究与发展, 2012, 49(S2): 111-117)
[86] Dingledine R, Mathewson N, Syverson P. Tor: The second-generation onion router[C/OL] //Proc of the 13th USENIX Security Symp. Berkeley, CA: USENIX Association, 2004 [2019-06-10].
[87] Popa R A, Blumberg A J, Balakrishnan H, et al. Privacy and accountability for location-based aggregate statistics[C] //Proc of the 18th ACM Conf on Computer and Communications Security. New York: ACM, 2011: 653-666
[88] Cramer R, Ivan B D, Nielsen J B. Secure Multiparty Computation and Secret Sharing[M]. Cambridge, UK: Cambridge University Press, 2015
[89] Zhong Hong, Huang Liusheng, Luo Yonglong. A multi-candidate electronic voting scheme based on secure sum protocol[J]. Journal of Computer Research and Development, 2006, 43(8): 1405-1410 (in Chinese)
(仲红, 黄刘生, 罗永龙. 基于安全多方求和的多候选人电子选举方案[J]. 计算机研究与发展, 2006, 43(8): 1405-1410)
[90] Ben-Efraim A, Lindell Y, Omri E. Optimizing semi-honest secure multiparty computation for the Internet[C] //Proc of the 23rd ACM SIGSAC Conf on Computer & Communications Security. New York: ACM, 2016: 578-590
[91] Goldreich O. Secure multi-party computation[R/OL]. Rehovot: Weizmann Institute of Science, 1998[2019-06-10].
[92] Du Wenliang, Atallah M J. Secure multi-party computation problems and their applications: A review and open problems[C] //Proc of the 9th Workshop on New Security Paradigms. New York: ACM, 2001: 13-22
[93] Ben-David A, Nisan N, Pinkas B. FairplayMP: A system for secure multi-party computation[C] //Proc of the 15th ACM Conf on Computer and Communications Security. New York: ACM, 2008: 257-266
[94] Nasreen M A, Ganesh A, Sunitha C. A study on Byzantine fault tolerance methods in distributed networks[J]. Procedia Computer Science, 2016, 87: 50-54
[95] Baliga A. Understanding Blockchain Consensus Models[M]. Pune, Maharashtra, India: Persistent Systems, 2017
[96] De Wolf T, Holvoet T. Emergence versus self-organisation: Different concepts but promising when combined[C] //Proc of the 3rd Int Workshop on Engineering Self-organising Applications. Berlin: Springer, 2004: 1-15
[97] Fisher D A, Lipson H F. Emergent algorithms: A new method for enhancing survivability in unbounded systems[C/OL] //Proc of the 32nd Annual Hawaii Int Conf on Systems Sciences, 1999 [2019-06-10]:
[98] Laracy J R, Leveson N G. Apply STAMP to critical infrastructure protection[C] //Proc of the 7th IEEE Conf on Technologies for Homeland Security. Piscataway, NJ: IEEE, 2007: 215-220
[99] Leveson N G. Safety analysis in early concept development and requirements generation[C] //Proc of the Annual INCOSE Int Symp. San Diego, CA: International Council on Systems Engineering, 2018: 441-455
[100] Laracy J R. A systems-theoretic security model for large scale, complex systems applied to the US air transportation system[D]. Cambridge, MA: Massachusetts Institute of Technology, 2007
[101] Xu Shouhuai, Lu Wenlian, Xu Li. Push-and pull-based epidemic spreading in networks: Thresholds and deeper insights[J]. ACM Transactions on Autonomous and Adaptive Systems, 2012, 7(3): No.32
[102] Zheng Ren, Lu Wenlian, Xu Shouhuai. Active cyber defense dynamics exhibiting rich phenomena[C] //Proc of the 2nd Symp and Bootcamp on the Science of Security. New York: ACM, 2015: No.2
[103] Zheng Ren, Lu Wenlian, Xu Shouhuai. Preventive and reactive cyber defense dynamics is globally stable[J]. IEEE Transactions on Network Science and Engineering, 2018, 5(2): 156-170
[104] Xu Shouhuai, Lu Wenlian, Zhan Zhenxin. A stochastic model of multivirus dynamics[J]. IEEE Transactions on Dependable and Secure Computing, 2011, 9(1): 30-45
[105] Miklas A G, Gollu K K, Chan K K W, et al. Exploiting social interactions in mobile systems[C] //Proc of the 9th Int Conf on Ubiquitous Computing. Berlin: Springer, 2007: 409-428
[106] Zakinthinos A, Lee E S. Composing secure systems that have emergent properties[C] //Proc of the 11th IEEE Computer Security Foundations Workshop. Piscataway, NJ: IEEE, 1998: 117-122
文章来源:《系统科学学报》 网址: http://www.xtkxxb.cn/qikandaodu/2021/0730/597.html