Computer Science ›› 2024, Vol. 51 ›› Issue (6A): 230400088-6.doi: 10.11896/jsjkx.230400088
• Information Security • Previous Articles Next Articles
YUE Meng1, ZHU Shibo1, HONG Xueting2, DUAN Bingyan1
CLC Number:
[1]QUAN Y Q.Research on Architecture Design and Safety Ana-lysis of Avionics Architecture Databus Network for Commercial Aircraft[C]//Proceedings of 2018 3rd International Workshop on Materials Engineering and Computer Sciences(IWMECS 2018).2018:39-45. [2]AMARNATH J,SURYA M,BHARGAV P,et al.Cloud com-puting in Aircraft Data Network[C]//2011 Integrated Communications,Navigation,and Surveillance Conference Proceedings.Herndon:IEEE Press,2011:E7-1-E7-8. [3]LI W H,HAN C,ZHAO Y K,et al.Research on Architecture Designof Distributed Integrated Modular Avionics System[C]//Proceedings of the 9th China Aviation Society Youth Science and Technology Forum.Beijing:China Aviation Publishing & Media CO.,2020:971-977. [4]LIU Y,JIN X,WEI X H.Design of System Management Fun-ction Based on Distributed Avionics System[J].Electronics Optics & Control,2022,29(9):74-77,95. [5]FAN C,HAN Z,ZHAO L.Research on cloud storage Technology of Avionics System[J].Electronics Optics & Control,2022,29(3):69-74,80. [6]ZHOU R,HE M X,CHEN Z M.Certificateless Public Auditing Scheme with Data Privacy Preserving for Cloud Storage[C]//2021 IEEE 6th International Conference on Cloud Computing and Big Data Analytics.Chengdu,China:IEEE,2021:675-682. [7]LUO L P,SUN W.Exploration of Airborne Software Management Scheme for Airlines[J].Aviation Maintenance & Engineering,2016(9):110-111. [8]Loadable Software Standards:Arinc Report 665-3[S].ARINC Airlines Electronic Engineering Committee,2005:6-26. [9]信息安全技术 SM2 椭圆曲线公钥密码算法(第2部分):数字签名算法:GB/T 32918.2-2016[S]. [10]XIAO D,YANG L Y,SUN B,et al.Provable Data Possession System for Realistic Cloud Storage Environments[J].Journal of Software,2016,27(9):2400-2413. [11]AN B Y,GONG Z,XIAO D,et al.Data possession audit with animplicit trusted third-party for cloud storage[J].Journal of Harbin Engineering University,2012,33(8):1039-1045. [12]IBM.IBM 4764 PCI-X Cryptographic Coprocessor[EB/OL].[2011-05-15].http://www-03.Ibm.com/security/cryptocards/pcixcc/overperformance.Shtml. [13]YANG L Y,SUN B,XIAO D,et al.Data Possession Auditing in with Near-Zero User-Side Overhead[C]//China Institute of Communications,Liaoning Provincial Communications Administration.Proceedings of the 10th Academic Annual Conference of the China Communications Society.National Defense Industry Press,2014:341-347. |
[1] | GUI Haitao, WANG Zhongqing. Personalized Dialogue Response Generation Combined with Conversation State Information [J]. Computer Science, 2024, 51(6A): 230800055-7. |
[2] | LU Dongsheng, LONG Hua. Method for Homologous Spectrum Monitoring Data Identification Based on Spectrum SIFT [J]. Computer Science, 2024, 51(6A): 230300177-7. |
[3] | KANG Zhong, WANG Maoning, MA Xiaowen, DUAN Meijiao. New Design of Redactable Consortium Blockchain Scheme Based on Multi-user Chameleon Hash [J]. Computer Science, 2024, 51(6A): 230600004-6. |
[4] | LIANG Meiyan, FAN Yingying, WANG Lin. Fine-grained Colon Pathology Images Classification Based on Heterogeneous Ensemble Learningwith Multi-distance Measures [J]. Computer Science, 2024, 51(6A): 230400043-7. |
[5] | LAI Xin, LI Sining, LIANG Changsheng, ZHANG Hengyan. Ontology-driven Study on Information Structuring of Aeronautical Information Tables [J]. Computer Science, 2024, 51(6A): 230800150-7. |
[6] | CHEN Sishuo, WANG Xiaodong, LIU Xiyang. Survey of Breast Cancer Pathological Image Analysis Methods Based on Graph Neural Networks [J]. Computer Science, 2024, 51(6): 172-185. |
[7] | LAN Yongqi, HE Xingxing, LI Yingfang, LI Tianrui. New Graph Reduction Representation and Graph Neural Network Model for Premise Selection [J]. Computer Science, 2024, 51(5): 193-199. |
[8] | LIU Jun, RUAN Tong, ZHANG Huanhuan. Prompt Learning-based Generative Approach Towards Medical Dialogue Understanding [J]. Computer Science, 2024, 51(5): 258-266. |
[9] | LI Panpan, WU Hao, LIU Jiajia, DUAN Li, LU Yunlong. Overview of Security Technologies and Strategies for Intelligent Railway 5G [J]. Computer Science, 2024, 51(5): 1-11. |
[10] | SHANG Yuling, LI Peng, ZHU Feng, WANG Ruchuan. Overview of IoT Traffic Attack Detection Technology Based on Fuzzy Logic [J]. Computer Science, 2024, 51(3): 3-13. |
[11] | YAN Jiahe, LI Honghui, MA Ying, LIU Zhen, ZHANG Dalin, JIANG Zhouxian, DUAN Yuhang. Multi-source Heterogeneous Data Fusion Technologies and Government Big Data GovernanceSystem [J]. Computer Science, 2024, 51(2): 1-14. |
[12] | GUO Shangzhi, LIAO Xiaofeng, XIAN Kaiyi. Logical Regression Click Prediction Algorithm Based on Combination Structure [J]. Computer Science, 2024, 51(2): 73-78. |
[13] | ZANG Hui, HE Xingxing, WANG Chenglong, LI Yingfang, LI Tianrui. Construction and Compounding of a Class of Regular Standard Contradictions in Propositional Logic [J]. Computer Science, 2024, 51(1): 295-300. |
[14] | WANG Yi, HU Xuexian, WEI Jianghong. Two-factor Authentication Scheme for Blind Cloud Storage System Based on Password and SmartCard [J]. Computer Science, 2024, 51(1): 363-370. |
[15] | ZHOU Xuequan, DU Nisuo, OUYANG Zhi. Chaos COOT Bird Algorithm Based on Cauchy Mutation and Differential Evolution [J]. Computer Science, 2023, 50(8): 209-220. |
|