Journal of Information Security Reserach ›› 2025, Vol. 11 ›› Issue (E2): 2-.
Online:2025-12-27
Published:2025-12-27
蔚文博1郭银章2
1(国网西宁供电公司西宁810003) 2(太原科技大学群智计算与云计算实验室太原030024)
通讯作者:
蔚文博
硕士.主要研究方向为云计算.
2829521939@qq.com
作者简介:蔚文博
硕士.主要研究方向为云计算.
2829521939@qq.com
郭银章
教授.主要研究方向为云计算、群智感知.
guoyinzhang@tyust.edu.cn
基金资助:山西省中央引导地方科技发展资金项目(YDZJSX20231A044);国家级大学生创新创业训练计划项目(20240315)
[1]沈昌祥, 张焕国, 冯登国, 等. 信息安全综述[J]. 中国科学, 2007, 37(2): 129150[2]王勇, 徐小琳, 吕慧勤. 可信计算研究综述[J]. 信息网络安全,2008, 8(8): 3436[3]冯登国, 秦宇, 汪丹, 等. 可信计算技术研究[J]. 计算机研究与发展, 2011, 48(8): 13321349[4]谭良, 朱贵琼, 孟伟明, 等. 基于直接匿名证言的可信平台身份证明协议的设计[J]. 四川师范大学学报, 2012, 35(2): 281287[5]宋成, 李静, 彭维平, 等. 基于双线性对的直接匿名认证方案[J]. 北京邮电大学学报, 2014, 37(6): 72[6]Camenisch J, Chen L, Drijvers M, et al. One TPM to bind them all: Fixing TPM 2.0 for provably secure anonymous attestation[EBOL]. 2017[20250913]. https:eprint.iacr.org2017639.pdf[7]胡如会, 张起荣, 贺道德. 基于双线性映射直接匿名认证方案的改进[J]. 科学技术与工程, 2018, 18(3): 264267[8]陈立全, 张子燕, 羊子煜, 等. 适用于分布式 DHR 系统的可追溯直接匿名认证方案[J]. Journal of Cyber Security, 2023, 8(6): 114 |
| [1] | . Research Progress on Detection Technologies for Network Attack Based on Large Language Model#br# [J]. Journal of Information Security Reserach, 2026, 12(1): 16-. |
| [2] | . Smart Contract Vulnerabilities Based on Differential Evolutionary Algorithms and Solution Time Prediction Detection#br# [J]. Journal of Information Security Reserach, 2026, 12(1): 24-. |
| [3] | . PUFbased Identity Authentication for Internet of Things Against Machine Learning Attacks in Zerotrust Architecture#br# [J]. Journal of Information Security Reserach, 2026, 12(1): 33-. |
| [4] | . Object Removal Video Tampering Detection and Localization Based on Learnable Ptuning#br# [J]. Journal of Information Security Reserach, 2026, 12(1): 61-. |
| [5] |
.
The EU Artificial Intelligence Regulatory Sandbox System and Its Enlightenment#br#
#br#
[J]. Journal of Information Security Reserach, 2026, 12(1): 82-.
|
| [6] | . [J]. Journal of Information Security Reserach, 2025, 11(E2): 8-. |
| [7] | . [J]. Journal of Information Security Reserach, 2025, 11(E2): 12-. |
| [8] | . [J]. Journal of Information Security Reserach, 2025, 11(E2): 15-. |
| [9] | . [J]. Journal of Information Security Reserach, 2025, 11(E2): 19-. |
| [10] | . [J]. Journal of Information Security Reserach, 2025, 11(E2): 25-. |
| [11] | . [J]. Journal of Information Security Reserach, 2025, 11(E2): 31-. |
| [12] | . [J]. Journal of Information Security Reserach, 2025, 11(E2): 35-. |
| [13] | . [J]. Journal of Information Security Reserach, 2025, 11(E2): 44-. |
| [14] | . [J]. Journal of Information Security Reserach, 2025, 11(E2): 48-. |
| [15] | . [J]. Journal of Information Security Reserach, 2025, 11(E2): 53-. |
| Viewed | ||||||
|
Full text |
|
|||||
|
Abstract |
|
|||||