• Special Issue: Communication and Security of Network •
Next Articles
New Trend of Cyberspace Security Technology
JING Jiwu1,*(),LONG Chun2(),LI Chang1()
1. Department of Computer Sciences and Technology, University of Chinese Academy of Sciences, Beijing 100049, China 2. Computer Network Information Center, Chinese Academy of Sciences, Beijing 100190, China
John Kindervag. Build Security Into Your Network’s DNA: The Zero Trust Network Architecture[R]. Forrester: For Security & Risk Professionals, 2010.
[6]
Yang T, Zhu L, Peng RX, et al. Fine-grained Big Data Security Method Based on Zero Trust Model[C]. Singapore: 24th IEEE International Conference on Parallel and Distributed Systems, 2018.
[7]
Bennett CH, DiVincenzo DP, Smolin JA, et al. Mixed-state entanglement and quantum error correction[J]. AMER PHYSICAL SOC, 1996, 54(5):3824-3851.
[8]
MacKenzie P, Shrimpton T, Jakobsson M. Threshold password-authenticated key exchange[C]. The 22nd Annual International Cryptology Conference, 2002.
[9]
Lamport L, Shostak R, Pease M. The Byzantine Generals Problem[J]. ACM Transactions on Programming Languages and Systems, 1982, 4(3):382-401.
doi: 10.1145/357172.357176
[10]
Chow S, Eisen P A, Johnson H, et al. White-Box Crypto-graphy and an AES Implementation[C]. Canada, The 9th Annual International Workshop, 2002.