动态群组中安全数据共享方案及其应用的研究任务书

 2021-11-07 09:11

1. 毕业设计(论文)主要目标:

1.了解数据共享的形成与目前的发展态势
2.寻找现今安全数据共享的相关方案,并加以对比分析
3.在现有的方案上提出自己的一些见解与看法

2. 毕业设计(论文)主要内容:

1.首先,了解密码学的相关知识。

密码学分为编码学与破译学,密码学的诞生大大促进了互联网信息交换的发展,让数据的传输变得更安全。

随着不断地完善与进步,密码学在其他领域与众多学科都有广泛的联系。

剩余内容已隐藏,您需要先支付后才能查看该篇文章全部内容!

3. 主要参考文献

[1]Homma N , Hayashi Y I , Miura N , et al. Design Methodology and Validity Verification for a Reactive Countermeasure Against EM Attacks[J]. Journal of Cryptology, 2015:1-19.[2]Brakerski Z , Segev G . Function-Private Functional Encryption in the Private-Key Setting[J]. Journal of Cryptology, 2017.[3]Tounsi W , Rais H . A survey on technical threat intelligence in the age of sophisticated cyber attacks[J]. Computers Security, 2017:S0167404817301839.[4]Estee V D W , Eloff J H P , Jacomine G . Cyber-security: Identity Deception Detection on Social Media Platforms[J]. Computers Security, 2018:S0167404818306503-.[5]Thompson N , Mcgill T J , Wang X . “Security begins at home”: Determinants of home computer and mobile device security behavior[J]. Computers Security, 2017, 70:376-391.[6]曹珍富. 信息安全的新发展——为《计算机研究与发展》创刊六十周年而作[J]. 计算机研究与发展, 2019, 56(1): 131-137. Cao Zhenfu. New Devolopment of Information Security——For the 60th Anniversary of Journal of Computer Research and Development. Journal of Computer Research and Development, 2019, 56(1): 131-137.[7]刘奇旭,徐辰晨,刘井强,胡恩泽,靳泽. 基于网络欺骗的家用无线路由器防护方法[J]. 计算机研究与发展, 2018, 55(7): 1440-1450. Liu Qixu, Xu Chenchen, Liu Jingqiang, Hu Enze, Jin Ze. Home Wireless Router Protection Method Based on Cyber Deception. Journal of Computer Research and Development, 2018, 55(7): 1440-1450.[8]王丽娜,谈诚,余荣威,尹正光. 针对数据泄漏行为的恶意软件检测[J]. 计算机研究与发展, 2017, 54(7): 1537-1548. Wang Lina, Tan Cheng, Yu Rongwei, Yin Zhengguang. The Malware Detection Based on Data Breach Actions. Journal of Computer Research and Development, 2017, 54(7): 1537-1548.[9]李学俊,袁亚文,金春花. 一种适用于广电网的属性基广播加密方案[J]. 计算机研究与发展, 2018, 55(7): 1409-1420. Li Xuejun, Yuan Yawen, Jin Chunhua. An Attribute-Based Broadcast Encryption Scheme Suitable for the Broadcasting Network. Journal of Computer Research and Development, 2018, 55(7): 1409-1420.[10]闫玺玺,刘媛,李子臣,汤永利. 支持隐私保护的多机构属性基加密方案[J]. 计算机研究与发展, 2018, 55(4): 846-853. Yan Xixi, Liu Yuan, Li Zichen, Tang Yongli. Multi-Authority Attribute-Based Encryption Scheme with Privacy Protection. Journal of Computer Research and Development, 2018, 55(4): 846-853.

剩余内容已隐藏,您需要先支付 10元 才能查看该篇文章全部内容!立即支付

以上是毕业论文任务书,课题毕业论文、开题报告、外文翻译、程序设计、图纸设计等资料可联系客服协助查找。