参考文献/References:
[1] 赵振国.基于攻防博弈模型的网络安全测评和最优主动防范[J].电子测试,2015(2):62-64.
[2] BANDYOPADHYAY T,JACOB V,RAGHUNATHAN S.Information security in networked supply chains: Impact of network vulnerability and supply chain integration on incentives to invest[J].Information Technology and Management,2010,11(1):7-23.
[3] 刘巧平,周斌,王文涛.基于椭圆曲线的信息加密及网络身份认真算法的研究[J].自动化与仪器仪表,2016(8):105-111.
[4] WU Yong,HU Defa.Encryption model of network information based on AES algorithm with dimension reduction chaos optization[J].Metallurgical and Mining Industry,2015,7(4):11-17.
[5] 刘冰,潘大兵.新三维混沌映射及其在数字图像信息加密中的应用[J].华侨大学学报(自然科学版),2015,36(6):655-658.
[6] JADHAV S,MOHITE V.A data hiding techniques based on length of English text using DES and attacks[J].International Journal of Research in Computer Science,2012,2(4):1121-1128.
[7] GANESH A R,MANIKANDAN P N,SETHU S P,et al.An improved AES-ECC hybrid encryption scheme for secure communication in cooperative diversity based wireless sensor networks[J].International Conference on Recent Trends in Information Technology,2011:1209-1214.
[8] 蔺小梅,李国刚,张泽普.采用OHNN和M-LFSR的字序列密码加密方案[J].华侨大学学报(自然科学版),2014,35(5):519-522.
[9] KANNAMMAL A,RANI S S.DICOM image authentication and encryption based on RSA and AES algorithms[J].Communications in Computer and Information Science,2012,330:349-360.
[10] 许柯,刘绪崇,符振艾,等.网络信息加密RSA算法的运算速度和保密性优化[J].科技通报,2015,31(7):144-147.
相似文献/References:
[1]吴金龙.利用VC++编程实现防火墙数据包过滤[J].华侨大学学报(自然科学版),2003,24(1):92.[doi:10.3969/j.issn.1000-5013.2003.01.017]
Wu Jinlong.Implementation of Firewall Packet Filtration by Applying VC++ Programming[J].Journal of Huaqiao University(Natural Science),2003,24(1):92.[doi:10.3969/j.issn.1000-5013.2003.01.017]
[2]李远敏.层次化分类淘汰法的网络最优弥补模型[J].华侨大学学报(自然科学版),2016,37(4):515.[doi:10.11830/ISSN.1000-5013.201604025]
LI Yuanmin.Optimal Network Hardening Model Based on Hierarchical Classification Elimination[J].Journal of Huaqiao University(Natural Science),2016,37(1):515.[doi:10.11830/ISSN.1000-5013.201604025]