Computer Science ›› 2025, Vol. 52 ›› Issue (11A): 241200183-7.doi: 10.11896/jsjkx.241200183
• Information Security • Previous Articles Next Articles
CHEN Hongwei, YUE Meng
CLC Number:
| [1]新华社.今年我国民航旅客运输量有望创历史新高[EB/OL].(2024-12-04)[2024-12-24].https://www.gov.cn/lianbo/bumen/202408/content_6968117.htm. [2]Airbus.Global Market Forecast 2024-2043[EB/OL].(2024-12-03)[2024-12-24].https://www.airbus.com/sites/g/files/jlcbta136/files/2024-07/GMF%202024-2043%20Presentation_4DTS.pdf. [3]ZHU Y B,WANG Z P.LDACS development status and challenges [J].Acta Aeronautica et Astronautica Sinica,2024,45(6):029161. [4]GRAUPL T,MÄURER N,SCHNELL M.LDACS A/G Specification[R].German Aerospace Center(DLR),SESAR2020 PJ14-W2-60 D3.1.230,2023.[Accessed 01/11/2023]. [5]MÄURER N,BILZHAUSE A.A Cybersecurity Architecturefor the L-band Digital Aeronautical Communications System(LDACS)[C]//2018 IEEE/AIAA 37th Digital Avionics Systems Conference(DASC).London,UK:IEEE,2018:1-10. [6]MÄURER N,GRÄUPL T,GENTSCH C,et al.Comparing Different Diffie-Hellman Key Exchange Flavors for LDACS[C]//2020 AIAA/IEEE 39th Digital Avionics Systems Conference(DASC).San Antonio,TX,USA:IEEE,2020:1-10. [7]MÄURER N,GENTSCH C,GRÄUPL T,et al.Formal Security Verification of the Station-to-Station based Cell-attachment Procedure of LDACS[C]//2021the 18th SECRYPT.2021:603-610. [8]EWERT T,MÄURER N,GRÄUPL T.Improving UsableLDACS Data Rate via Certificate Validity Optimization[C]//2022 Integrated Communication,Navigation and Surveillance Conference(ICNS).Dulles,VA,USA:IEEE,2022:1-9. [9]MÄURER N,GRÄUPL T,SCHMITT C.Efficient Control-Channel Security for the Aeronautical Communications System LDACS[C]//2023 IEEE 24th International Symposium on a World of Wireless,Mobile and Multimedia Networks(WoWMoM).Boston,MA,USA:IEEE,2023:407-412. [10]MÄURER N,GRÄUPL T,SCHMITT C,et al.PMAKE:Physical Unclonable Function-based Mutual Authentication Key Exchange Scheme for Digital Aeronautical Communications[C]//2021 IFIP/IEEE International Symposium on Integrated Network Management(IM).Bordeaux,France:IEEE,2021:206-214. [11]KHAN S,GABA G S,GURTOV A,et al.Enhancing Cybersecurity for LDACS:a Secure and Lightweight Mutual Authentication and Key Agreement Protocol[C]//2023 IEEE/AIAA 42nd Digital Avionics Systems Conference(DASC).Barcelona,Spain:IEEE,2023:1-10. [12]SANTANA-ANDREO A,SARAZA-CANFLANCA P,CAS-TRO-LOPEZ R,et al.Reliability improvement of SRAM PUFs based on a detailed experimental study into the stochastic effects of aging[J].AEU - International Journal of Electronics and Communications,2024,176:155147. [13]KIM H.5G core network security issues and attack classification from network protocol perspective[J].Journal of Internet Services and Information Security,2020,10(2):1-15. |
| [1] | LI Jiangxu, CHEN Zemao, ZHANG Liqiang. Lightweight Authentication and Key Agreement Protocol for Cloud-assisted Smart Home Communication [J]. Computer Science, 2025, 52(7): 342-352. |
| [2] | ZHANG Jing, WANG Yuping. Dual-platform Key Agreement Protocol Based on Semidirect Product [J]. Computer Science, 2025, 52(6A): 240600036-6. |
| [3] | WANG Xuxian, HUANG Jinhua, ZHAI You, LI Chu’nan, WANG Yu, ZHANG Yupeng, ZHANG Yipeng, YANG Liqun, LI Zhoujun. Survey of Detection Techniques for Domain Generation Algorithm [J]. Computer Science, 2024, 51(8): 371-378. |
| [4] | TIAN Hao, WANG Chao. Design and Implementation of SNMPv3 Security Mechanism Based on National Security SM3 andSM4 Algorithms [J]. Computer Science, 2024, 51(6A): 230500209-7. |
| [5] | LI Weixian, ZHANG Jianhui, ZENG Junjie, JIA Hongyong, MEN Ruirui. Zero Trust Anonymous Access Scheme Based on Software-defined Perimeters [J]. Computer Science, 2024, 51(12): 293-302. |
| [6] | WANG Jing, ZHANG Miao, LIU Yang, LI Haoling, LI Haotian, WANG Bailing, WEI Yuliang. Study on Dual-security Knowledge Graph for Process Industrial Control [J]. Computer Science, 2023, 50(9): 68-74. |
| [7] | CHEN Yufei, LI Saifei, ZHANG Lijie, ZHAO Yue. Implementation and Verification of Reinforcement Learning Strategy in Automated Red Teaming Testing [J]. Computer Science, 2023, 50(11A): 230200162-6. |
| [8] | WANG Zichen, YUAN Chengsheng, WANG Yili, GUO Ping, FU Zhangjie. Lightweight Group Key Agreement for Industrial Internet of Things [J]. Computer Science, 2023, 50(11A): 230700075-10. |
| [9] | XU Miaomiao, CHEN Zhenping. Incentive Mechanism for Continuous Crowd Sensing Based Symmetric Encryption and Double Truth Discovery [J]. Computer Science, 2023, 50(1): 294-301. |
| [10] | JIAN Qi-rui, CHEN Ze-mao, WU Xiao-kang. Authentication and Key Agreement Protocol for UAV Communication [J]. Computer Science, 2022, 49(8): 306-313. |
| [11] | LIANG Zhen-zhen, XU Ming. Key Agreement Scheme Based on Ocean Acoustic Channel [J]. Computer Science, 2022, 49(6): 356-362. |
| [12] | WANG Jue, LU Bin, ZHU Yue-fei. Generation and Application of Adversarial Network Traffic:A Survey [J]. Computer Science, 2022, 49(11A): 211000039-11. |
| [13] | ZHOU Shi-cheng, LIU Jing-ju, ZHONG Xiao-feng, LU Can-ju. Intelligent Penetration Testing Path Discovery Based on Deep Reinforcement Learning [J]. Computer Science, 2021, 48(7): 40-46. |
| [14] | ZHENG Jia-tong, WU Wen-yuan. Practical Bi-deniable Encryption Scheme Based on MLWE [J]. Computer Science, 2021, 48(3): 307-312. |
| [15] | LENG Feng, ZHANG Ming-kai, YAN Zhi-wei, ZHANG Cui-ling, ZENG Yu. Application of Chinese Cryptographic Algorithm in RPKI [J]. Computer Science, 2021, 48(11A): 678-681. |
|
||