Computer Science ›› 2019, Vol. 46 ›› Issue (6A): 362-364.
• Information Security • Previous Articles Next Articles
LU Zheng-qiao
CLC Number:
[1]郭海霞,裘雪红.嵌入式系统安全的研究与设计[J].电子科技,2005,8:49-54. [2]路安平,杨济民,李峰.几种轻量级加密算法的比较研究[J].现代电子科技,2014,37(12):37-41. [3]刘宴兵,田四梅,唐浩坤,等.基于混沌的+RC4+流加密算法[J].计算机工程,2011,37(2):136-138. [4]刘坤.无线局域网的安全性研究[D].上海:复旦大学,2008. [5]LORENZ E N.Deterministic nonperiodic flow[J].Journal of atmosphere science,1963,20:130-141. [6]FREY D Q.chaotic digital encoding:an approach to secure communication[J].IEEE Trans Circuit and Systems,1993,40(40):660-666. [7]DEDIEU H,KENNEDY M P,HASLER M.chaos shift keying:modulation and demodulation of a chaotic carrier using self-synchronizing chua’s circuit[J].IEEE Trans Circuit and Systems,1993,40(40):634-642. [8]胡岗,萧井华,郑志刚.混沌控制[M].上海:上海科技教育出版社,2000:167-193. [9]孟庆树,王丽娜,傅建明.密码编码学与网络安全[M].北京:电子工业出版社,2006. [10]LIU M S,ZHANG Y,LI J H.Research on Improving Security of DES by Chaotic Mapping[C]∥Proc.sof the 8th International Conference on Machine Learnling and Cybernetics.Baoding,China,2009. [11]QIAN G B,JIANG Q F,QIU S S.A New Image Encryption Scheme Based on DES Algorithm and Chua’s Circuit[C]∥Proc. of International Workshop on Imaging Systems and Techniques.Shenzhen,China,2009. [12]廖晓蜂,肖迪,陈勇,等.混沌密码学原理及其应用[M].北京:科学出版社,2009. |
[1] | LYU You, WU Wen-yuan. Privacy-preserving Linear Regression Scheme and Its Application [J]. Computer Science, 2022, 49(9): 318-325. |
[2] | WANG Lei, LI Xiao-yu. LBS Mobile Privacy Protection Scheme Based on Random Onion Routing [J]. Computer Science, 2022, 49(9): 347-354. |
[3] | ZHOU Lian-bing, ZHOU Xiang-zhen, CUI Xue-rong. Compressed Image Encryption Scheme Based on Dual Two Dimensional Chaotic Map [J]. Computer Science, 2022, 49(8): 344-349. |
[4] | LI Li, HE Xin, HAN Zhi-jie. Review of Privacy-preserving Mechanisms in Crowdsensing [J]. Computer Science, 2022, 49(5): 303-310. |
[5] | QIN Xiao-yue, HUANG Ru-wei, YANG Bo. NTRU Type Fully Homomorphic Encryption Scheme over Prime Power Cyclotomic Rings [J]. Computer Science, 2022, 49(5): 341-346. |
[6] | SONG Tao, LI Xiu-hua, LI Hui, WEN Jun-hao, XIONG Qing-yu, CHEN Jie. Overview of Research on Security Encryption Authentication Technology of IoV in Big Data Era [J]. Computer Science, 2022, 49(4): 340-353. |
[7] | REN Hua, NIU Shao-zhang, WANG Mao-sen, YUE Zhen, REN Ru-yong. Homomorphic and Commutative Fragile Zero-watermarking Based on SVD [J]. Computer Science, 2022, 49(3): 70-76. |
[8] | GAO Shi-yao, CHEN Yan-li, XU Yu-lan. Expressive Attribute-based Searchable Encryption Scheme in Cloud Computing [J]. Computer Science, 2022, 49(3): 313-321. |
[9] | LYU You, WU Wen-yuan. Linear System Solving Scheme Based on Homomorphic Encryption [J]. Computer Science, 2022, 49(3): 338-345. |
[10] | JIN Hua, ZHU Jing-yu, WANG Chang-da. Review on Video Privacy Protection [J]. Computer Science, 2022, 49(1): 306-313. |
[11] | LIANG Jian, HE Jun-hui. H.264/AVC Video Encryption Based on Adaptive Permutation of Macroblock Coding Information [J]. Computer Science, 2022, 49(1): 314-320. |
[12] | ZHANG Sai-nan, LI Qian-mu. Color Image Encryption Algorithm Based on Logistic-Sine-Cosine Mapping [J]. Computer Science, 2022, 49(1): 353-358. |
[13] | ZHANG Xiao-yan, LI Qin-wei, FU Fu-jie. Secret Verification Method of Blockchain Transaction Amount Based on Digital Commitment [J]. Computer Science, 2021, 48(9): 324-329. |
[14] | TANG Fei, CHEN Yun-long, FENG Zhuo. Electronic Prescription Sharing Scheme Based on Blockchain and Proxy Re-encryption [J]. Computer Science, 2021, 48(6A): 498-503. |
[15] | QU Wei, YU Fei-hong. Survey of Research on Asymmetric Embedded System Based on Multi-core Processor [J]. Computer Science, 2021, 48(6A): 538-542. |
|