Computer Science ›› 2020, Vol. 47 ›› Issue (6A): 360-363.doi: 10.11896/JsJkx.191000114
• Information Security • Previous Articles Next Articles
WU Yu-hong1 and HU Xiang-dong2
CLC Number:
[1] 卢坦,林涛,梁颂.美国工控安全保障体系研究及启示.保密科学技术,2018(4):24-33. [2] 周剑,肖琳琳.工业互联网平台发展现状、趋势与对策.智慧制造,2017(12):56-58. [3] 迈克尔?布雷迪,内德?考尔德,等.企业的工业互联网平台战略.上海质量,2017(5):15-18. [4] 李海花.各国强化工业互联网战略,标准化成重要切入点.世界电信,2015(7):24-27. [5] 陈泓汲,罗璎珞.互联网+网络安全新特性与发展建议.互联网天地,2015(10):1-4. [6] 王峰.工业互联网平台分类研究.电信技术,2017(10):7-10. [7] Industrial Internet Consortium (IIC).Volume G1:Reference Architecture.8,2015. [8] Industrial Internet Consortium (IIC),Volume G5:Connec-tivity Framework,v1.8.8,2016. [9] IEC61158-4 Industrial Communication Networks-Fieldbus Speci-fications. [10] IEC61784-2 Industrial Communication Networks- Profiles-Part 2:Additional Fieldbus Profiles for Real- time Networks Based on ISO/IEC 8802-3. [11] WU Yu-hong,born in 1981,Ph.D,associate professor.Her main research interests include internet of things,industrial internet security and big data,etc. |
[1] | CAO Meng, YU Yang, LIANG Ying, SHI Hong-zhou. Key Technologies and Development Trends of Big Data Trade Based on Blockchain [J]. Computer Science, 2021, 48(11A): 184-190. |
[2] | CHEN Meng-dong, GUO Dong-sheng, XIE Xiang-hui, WU Dong. Design and Implementation of Rule Processor Based on Heterogeneous Computing Platform [J]. Computer Science, 2020, 47(4): 312-317. |
[3] | CHENG Qing-feng, LI Yu-ting, LI Xing-hua, JIANG Qi. Research on Application of Cryptography Technology for Edge Computing Environment [J]. Computer Science, 2020, 47(11): 10-18. |
[4] | ZHAO Jiao-jiao, MA Wen-ping, LUO Wei, LIU Xiao-xue. Hierarchical Hybrid Authentication Model Based on Key Sharing [J]. Computer Science, 2019, 46(2): 115-119. |
[5] | YIN Qiu-shi, CHEN Jian-hua. Improved Identity Authentication Protocol Based on Elliptic Curve Cryptographyin Multi-server Environment [J]. Computer Science, 2018, 45(6): 111-116. |
[6] | YANG Dong-ju and FENG Kai. Distributed and Unified Authentication Optimization Mechanism Based on Cache [J]. Computer Science, 2018, 45(3): 300-304. |
[7] | CHEN Shao-hua, FAN Xiao-guang, CONG Wei, HUANG Jin-ke and SUN Xian-ming. Grid-based Identity Signcryption Algorithm and Application in Ad Hoc Network [J]. Computer Science, 2017, 44(6): 168-173. |
[8] | YANG Lu and YE Xiao-jun. Key Management Issues and Challenges in Cloud [J]. Computer Science, 2017, 44(3): 3-9. |
[9] | ZHOU Chang-chun, TIAN Xiao-li, ZHANG Ning, YANG Yun-jun and LI Duo. Research on Identity Authentication Technology in Cloud Computing [J]. Computer Science, 2016, 43(Z6): 339-341. |
[10] | XU Tai-zhong, YANG Tian-chi, CHENG Juan and SHAO Qi-feng. Design Method of SRAM-PUF Based on Error Correcting Code Fuzzy Extractor [J]. Computer Science, 2016, 43(Z11): 373-376. |
[11] | WU Wei-min, CHEN Dong-xin, LAI Wen-xin and SU Qing. Research and Implementation of EFI OS Loader Security Reinforcement Technology [J]. Computer Science, 2016, 43(9): 188-191. |
[12] | WANG Gang, SUN Liang-xu, ZENG Zi-wei and YANG Dan. Secure and Efficient Hybrid Key Management Mechanism in Heterogeneous WSN [J]. Computer Science, 2016, 43(7): 153-156. |
[13] | CHENG Mao-cai and XU Kai-yong. Audit Log Secure Storage System Based on Trusted Computing Platform [J]. Computer Science, 2016, 43(6): 146-151. |
[14] | XU Jian, LI Ming-jie, ZHOU Fu-cai and XUE Rui. Identity Authentication Method Based on User’s Mouse Behavior [J]. Computer Science, 2016, 43(2): 148-154. |
[15] | WANG Hu-qing and SUN Zhi-xin. Research on ONS Security [J]. Computer Science, 2016, 43(1): 1-7. |
|