高级搜索

留言板

尊敬的读者、作者、审稿人, 关于本刊的投稿、审稿、编辑和出版的任何问题, 您可以本页添加留言。我们将尽快给您答复。谢谢您的支持!

姓名
邮箱
手机号码
标题
留言内容
验证码

网络空间安全中的人格研究综述

吴桐 郑康锋 伍淳华 王秀娟 郑赫慈

吴桐, 郑康锋, 伍淳华, 王秀娟, 郑赫慈. 网络空间安全中的人格研究综述[J]. 电子与信息学报, 2020, 42(12): 2827-2840. doi: 10.11999/JEIT190806
引用本文: 吴桐, 郑康锋, 伍淳华, 王秀娟, 郑赫慈. 网络空间安全中的人格研究综述[J]. 电子与信息学报, 2020, 42(12): 2827-2840. doi: 10.11999/JEIT190806
Tong WU, Kangfeng ZHENG, Chunhua WU, Xiujuan WANG, Heci ZHENG. A Survey on Personality in Cyberspace Security[J]. Journal of Electronics and Information Technology, 2020, 42(12): 2827-2840. doi: 10.11999/JEIT190806
Citation: Tong WU, Kangfeng ZHENG, Chunhua WU, Xiujuan WANG, Heci ZHENG. A Survey on Personality in Cyberspace Security[J]. Journal of Electronics and Information Technology, 2020, 42(12): 2827-2840. doi: 10.11999/JEIT190806

网络空间安全中的人格研究综述

doi: 10.11999/JEIT190806
基金项目: 国家重点研发计划(2017YFB0802803)
详细信息
    作者简介:

    吴桐:女,1992年生,博士生,研究方向为网络安全、社会工程学

    郑康锋:男,1975年生,教授,博士生导师,研究方向为网络安全

    伍淳华:女,1979年生,讲师,研究方向为人工智能、网络安全

    王秀娟:女,1979年生,讲师,研究方向为人工智能、网络安全

    郑赫慈:男,1995年生,硕士生,研究方向为网络安全

    通讯作者:

    郑康锋 zkf_bupt@163.com

  • 中图分类号: TN915.08; TP393.08

A Survey on Personality in Cyberspace Security

Funds: The National Key Research and Development Program of China (2017YFB0802803)
  • 摘要: 网络空间是所有信息系统的集合,是人类赖以生存的信息环境。网络空间安全已经从物理域、信息域安全扩展到以人为中心的认知域和社会域安全,对人的安全研究已经成为了网络空间安全的必然趋势。人是复杂多变的综合体,而人格作为人的稳定的心理特征,成为了人的安全相关研究的切入点。该文梳理当前网络空间安全中的人格研究,介绍了网络空间安全和人格的基本概念,提出了网络空间安全中人格的研究框架,涵盖理论研究、技术研究和技术应用3个层次;其中技术研究主要包括人格测量、人格的安全脆弱性和针对人的安全防护3部分;详细探讨了当前人格安全研究现状和存在的问题,最后讨论了未来的研究方向和发展趋势。
  • 图  1  网络空间安全中的人格研究框架

    图  2  安全意识评估模型[59]

    图  3  人格与意识、行为关联模型[63]

    图  4  以大五人格理论为核心的钓鱼易感性研究框架[69]

    图  5  社会工程学-人格框架[70]

    表  1  大五人格模型

    特质因素特征
    神经质烦恼对平静
    不安全感对安全感
    自怜对自我满意
    外向性好交际对不好交际
    爱娱乐对严肃
    感情丰富对含蓄
    开放性富于想象对务实
    寻求变化对遵守惯例
    自主对顺从
    宜人性热心对无情
    信赖对怀疑
    乐于助人对不合作
    尽责性有序对无序
    谨慎细心对粗心大意
    自律对意志薄弱
    下载: 导出CSV
  • [1] GIBSON W. Burning Chrome[M]. New York: EOS/HarperCollins Publishers, 2003: 1–5.
    [2] 张焕国, 韩文报, 来学嘉, 等. 网络空间安全综述[J]. 中国科学: 信息科学, 2015, 58(1): 1–43.

    ZHANG Huanguo, HAN Wenbao, LAI Xuejia, et al. Survey on cyberspace security[J]. Science China Information Sciences, 2015, 58(1): 1–43.
    [3] OTTIS R and LORENTS P. Cyberspace: Definition and implications[C]. The 5th International Conference on Information Warfare and Security, Dayton, 2010: 267.
    [4] MITNICK K D and SIMON W L. The Art of Deception: Controlling the Human Element of Security[M]. Indianapolis: John Wiley & Sons, 2002: 1–10.
    [5] STEWART JR J H. Social engineering deception susceptibility: Modification of personality traits susceptible to social engineering manipulation to acquire information through attack and exploitation[D]. [Ph. D. dissertation], Colorado Technical University, 2015.
    [6] BULLER D B, BURGOON J K, BUSLIG A, et al. Testing interpersonal deception theory: The Language of interpersonal deception[J]. Communication Theory, 1996, 6(3): 268–289. doi:  10.1111/j.1468-2885.1996.tb00129.x
    [7] DEPAULO B M, LINDSAY J J, MALONE B E, et al. Cues to deception[J]. Psychological Bulletin, 2003, 129(1): 74–118. doi:  10.1037/0033-2909.129.1.74
    [8] IRANI D, BALDUZZI M, BALZAROTTI D, et al. Reverse Social engineering attacks in online social networks[C]. The 8th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, Amsterdam, The Netherlands, 2011: 55–74.
    [9] BURGER J M. Personality[M]. California: Thomson Learning, 2007: 5–7.
    [10] 彭聃龄. 普通心理学[M]. 北京: 北京师范大学出版社, 2012: 203–210.

    PENG Danling. Common Psychology[M]. Beijing: Beijing Normal University Press, 2012: 203–210.
    [11] ALMLUND M, DUCKWORTH A L, HECKMAN J, et al. Personality psychology and economics[J]. Handbook of the Economics of Education, 2011, 4: 1–181.
    [12] HOGAN R, JOHNSON J, and BRIGGS S R. Handbook of Personality Psychology[M]. San Diego: Academic Press, 1997: 750–751.
    [13] GERRIG R J and ZIMBARDO P G. Psychology and Life[M]. New York: Pearson, 2012.
    [14] GOLDBERG L R, JOHNSON J A, Eber H W, et al. The international personality item pool and the future of public-domain personality measures[J]. Journal of Research in Personality, 2006, 40(1): 84–96. doi:  10.1016/j.jrp.2005.08.007
    [15] 郑敬华, 郭世泽, 高梁, 等. 基于多任务学习的大五人格预测[J]. 中国科学院大学学报, 2018, 35(4): 550–560. doi:  10.7523/j.issn.2095-6134.2018.04.019

    ZHENG Jinghua, GUO Shize, GAO Liang, et al. Microblog users’ Big-Five personality prediction based on multi-task learning[J]. Journal of University of Chinese Academy of Sciences, 2018, 35(4): 550–560. doi:  10.7523/j.issn.2095-6134.2018.04.019
    [16] KOSINSKI M, BACHRACH Y, KOHLI P, et al. Manifestations of user personality in website choice and behaviour on online social networks[J]. Machine Learning, 2014, 95(3): 357–380. doi:  10.1007/s10994-013-5415-y
    [17] HU Jian, ZENG Huajun, LI Hua, et al. Demographic prediction based on user’s browsing behavior[C]. The 16th International Conference on World Wide Web, Banff, Canada, 2007: 151–160. doi: 10.1145/1242572.1242594.
    [18] RENTFROW P J and GOSLING S D. The do re mi’s of everyday life: The structure and personality correlates of music preferences[J]. Journal of Personality and Social Psychology, 2003, 84(6): 1236–1256. doi:  10.1037/0022-3514.84.6.1236
    [19] 郑日昌, 蔡永红, 周益群. 心理测量学[M]. 北京: 人民教育出版社, 1999: 155–170.

    ZHENG Richang, CAI Yonghong, and ZHOU Yiqun. Psychological Testing[M]. Beijing: People Education Press, 1999: 155–170.
    [20] GREGORY R J. Psychological Testing: History, Principles, and Applications[M]. Beijing: Peking University Press, 2013: 25.
    [21] KUHN M H and MCPARTLAND T S. An empirical investigation of self-attitudes[J]. American Sociological Review, 1954, 19(1): 68–76. doi:  10.2307/2088175
    [22] 朱廷劭, 李昂, 宁悦, 等. 网络社会中个体人格特征及其行为关系[J]. 兰州大学学报: 社会科学版, 2011, 39(5): 44–51.

    ZHU Tingshao, LI Ang, NING Yue, et al. Individual personality and its behavior in the cyber society[J]. Journal of Lanzhou University:Social Sciences, 2011, 39(5): 44–51.
    [23] WEINER I B. The Corsini Encyclopedia of Psychology[M]. 4th ed. Hoboken: John Wiley & Sons, 2010.
    [24] MORGAN C D and MURRAY H A. A method for investigating fantasies: The thematic apperception test[J]. Archives of Neurology & Psychiatry, 1935, 34(2): 289–306. doi:  10.1001/archneurpsyc.1935.02250200049005
    [25] MURRAY H A and DAN M A. Explorations in personality[J]. Journal of Projective Techniques & Personality Assessment, 1938(2): 283–285.
    [26] MURRAY H A. Explorations in personality: A clinical and experimental study of fifty men of college age[J]. American Journal of Sociology, 1938, 4(4): 576–583.
    [27] MCCRAE R R and WEISS A. Observer Ratings of Personality[M]. ROBINS R W, FRALEY R C, and KRUEGER R F. Handbook of Research Methods in Personality Psychology. New York: The Guilford Press, 2007: 259–272.
    [28] VINCIARELLI A and MOHAMMADI G. A survey of personality computing[J]. IEEE Transactions on Affective Computing, 2014, 5(3): 273–291. doi:  10.1109/TAFFC.2014.2330816
    [29] ARGAMON S, DHAWLE S, KOPPEL M, et al. Lexical predictors of personality type[C]. 2005 Joint Annual Meeting of the Interface and the Classification Society of North America, 2005.
    [30] MAIRESSE F, WALKER M A, MEHL M R, et al. Using linguistic cues for the automatic recognition of personality in conversation and text[J]. Journal of Artificial Intelligence Research, 2007, 30(1): 457–500. doi:  10.1613/jair.2349
    [31] TAUSCZIK Y R and PENNEBAKER J W. The psychological meaning of words: LIWC and computerized text analysis methods[J]. Journal of Language and Social Psychology, 2010, 29(1): 24–54. doi:  10.1177/0261927x09351676
    [32] OBERLANDER J and NOWSON S. Whose thumb is it anyway?: Classifying author personality from weblog text[C]. The COLING/ACL on Main Conference Poster Sessions, Sydney, Australia, 2006: 627–634.
    [33] NOWSON S and OBERLANDER J. Identifying more bloggers: Towards large scale personality classification of personal weblogs[C]. The International Conference on Weblogs and Social Media, Boulder, USA, 2007: 115–127.
    [34] MINAMIKAWA A and YOKOYAMA H. Blog tells what kind of personality you have: Egogram estimation from Japanese weblog[C]. 2011 ACM Conference on Computer Supported Cooperative Work, Hangzhou, China, 2011: 217–220. doi: 10.1145/1958824.1958856.
    [35] MINAMIKAWA A and YOKOYAMA H. Personality estimation based on Weblog text classification[C]. The 24th International Conference on Industrial Engineering and other Applications of Applied Intelligent Systems Conference on Modern Approaches in Applied Intelligence, Syracuse, USA, 2011: 89–97.
    [36] GILL A J, NOWSON S, and OBERLANDER J. What are they blogging about? Personality, topic and motivation in Blogs[C]. The 3rd International AAAI Conference on Weblogs and Social Media, San Jose, USA, 2009: 18–25.
    [37] HAMBURGER Y A and BEN-ARTZI E. The relationship between extraversion and neuroticism and the different uses of the Internet[J]. Computers in Human Behavior, 2000, 16(4): 441–449. doi:  10.1016/S0747-5632(00)00017-0
    [38] PARK G, SCHWARTZ H A, EICHSTAEDT J C, et al. Automatic personality assessment through social media language[J]. Journal of Personality and Social Psychology, 2015, 108(6): 934–952. doi:  10.1037/pspp0000020
    [39] WEI Xiangyu, XU Guangquan, WANG Hao, et al. Sensing users’ emotional intelligence in social networks[J]. IEEE Transactions on Computational Social Systems, 2020, 7(1): 103–112. doi:  10.1109/TCSS.2019.2944687
    [40] LUYCKX K and DAELEMANS W. Using syntactic features to predict author personality from text[C]. Digital Humanities 2008, Oulu, Finland, 2008: 146–149.
    [41] MAO Yu, ZHANG Dongmei, WU Chunhua, et al. Feature analysis and optimisation for computational personality recognition[C]. The IEEE 4th International Conference on Computer and Communications (ICCC), Chengdu, China, 2018: 2410–2414, doi: 10.1109/CompComm.2018.8780801.
    [42] WOLFRADT U and DOLL J. Motives of adolescents to use the Internet as a function of personality traits, personal and social factors[J]. Journal of Educational Computing Research, 2001, 24(1): 13–27. doi:  10.2190/ANPM-LN97-AUT2-D2EJ
    [43] ROSS C, ORR E S, SISIC M, et al. Personality and motivations associated with Facebook use[J]. Computers in Human Behavior, 2009, 25(2): 578–586. doi:  10.1016/j.chb.2008.12.024
    [44] AMICHAI-HAMBURGER Y and VINITZKY G. Social network use and personality[J]. Computers in Human Behavior, 2010, 26(6): 1289–1295. doi:  10.1016/j.chb.2010.03.018
    [45] LI Lin, LI Ang, HAO Bibo, et al. Predicting active users’ personality based on micro-Blogging behaviors[J]. PLoS One, 2014, 9(1): e84997. doi:  10.1371/journal.pone.0084997
    [46] SWICKERT R J, ROSENTRETER C J, HITTNER J B, et al. Extraversion, social support processes, and stress[J]. Personality and Individual Differences, 2002, 32(5): 877–891. doi:  10.1016/s0191-8869(01)00093-9
    [47] FRIGGERI A, LAMBIOTTE R, KOSINSKI M, et al. Psychological aspects of social communities[C]. 2012 International Conference on Privacy, Security, Risk and Trust and 2012 International Conference on Social Computing, Amsterdam, Netherlands, 2012: 195–202. doi:  10.1109/SocialCom-PASSAT.2012.104.
    [48] LAMBIOTTE R and KOSINSKI M. Tracking the digital footprints of personality[J]. Proceedings of the IEEE, 2014, 102(12): 1934–1939. doi:  10.1109/JPROC.2014.2359054
    [49] University of Cambridge. MyPersonality project[EB/OL]. http://mypersonality.org/wiki/doku.php, 2010.
    [50] RIFE S C, CATE K L, KOSINSKI M, et al. Participant recruitment and data collection through Facebook: The role of personality factors[J]. International Journal of Social Research Methodology, 2016, 19(1): 69–83. doi:  10.1080/13645579.2014.957069
    [51] KOSINSKI M, STILLWELL D, and GRAEPEL T. Private traits and attributes are predictable from digital records of human behavior[J]. Proceedings of the National Academy of Sciences of the United States of America, 2013, 110(15): 5802–5805. doi:  10.1073/pnas.1218772110
    [52] OLGUÍN D O, GLOOR P A, and PENTLAND A. Capturing individual and group behavior with wearable sensors[C]. 2009 AAAI Spring Symposium on Human Behavior Modeling, Stanford, USA, 2009: 68–74.
    [53] CHITTARANJAN G, BLOM J, and GATICA-PEREZ D. Who’s who with big-five: Analyzing and classifying personality traits with smartphones[C]. The 15th Annual International Symposium on Wearable Computers, San Francisco, USA, 2011: 29–36. doi: 10.1109/ISWC.2011.29.
    [54] CHITTARANJAN G, BLOOM J, and GATICA-PEREZ D. Mining large-scale smartphone data for personality studies[J]. Personal and Ubiquitous Computing, 2013, 17(3): 433–450. doi:  10.1007/s00779-011-0490-1
    [55] STAIANO J, LEPRI B, AHARONY N, et al. Friends don’t lie: Inferring personality traits from social network structure[C]. 2012 ACM Conference on Ubiquitous Computing, Pennsylvania, USA, 2012: 321–330. doi: 10.1145/2370216.2370266.
    [56] BIEL J I, TEIJEIRO-MOSQUERA L, and GATICA-PEREZ D. FaceTube: Predicting personality from facial expressions of emotion in online conversational video[C]. The 14th ACM international conference on Multimodal Interaction, Santa Monica, USA, 2012: 53–56. doi: 10.1145/2388676.2388689.
    [57] SKOWRON M, TKALČIČ M, FERWERDA B, et al. Fusing social media cues: Personality prediction from twitter and instagram[C]. The 25th International Conference Companion on World Wide Web, Montréal Québec, Canada, 2016: 107–108. doi: 10.1145/2872518.2889368.
    [58] FERWERDA B, SCHEDL M, and TKALCIC M. Using instagram picture features to predict users’ personality[C]. The 22nd International Conference on Multimedia Modeling, Miami, USA, 2016: 850–861. doi: 10.1007/978-3-319-27671-7_71.
    [59] WARKENTIN M, MCBRIDE M, CARTER L, et al. The role of individual characteristics on insider abuse intentions[C]. The 18th Americas Conference on Information Systems, Seattle, USA, 2012: 4833–4842.
    [60] KORZAAN M L and BOSWELL K T. The influence of personality traits and information privacy concerns on behavioral intentions[J]. Journal of Computer Information Systems, 2008, 48(4): 15–24.
    [61] UFFEN J and BREITNER M H. Management of technical security measures: An empirical examination of personality traits and behavioral intentions[C]. The 46th Hawaii International Conference on System Sciences, Wailea, USA, 2013: 4551–4560. doi: 10.1109/HICSS.2013.388.
    [62] BRECHT F, FABIAN B, KUNZ S, et al. Communication anonymizers: Personality, internet privacy literacy and their influence on technology acceptance[C]. The 20th European Conference on Information Systems, Barcelona, Spain, 2012: 214.
    [63] SHROPSHIRE J, WARKENTIN M, and SHARMA S. Personality, attitudes, and intentions: Predicting initial adoption of information security behavior[J]. Computers & Security, 2015, 49: 177–191. doi:  10.1016/j.cose.2015.01.002
    [64] MODIC D and LEA S E G. How neurotic are scam victims, really? The Big Five and internet scams[EB/OL]. https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2448130, 2014.
    [65] PATTINSON M, JERRAM C, PARSONS K, et al. Why do some people manage phishing e-mails better than others?[J]. Information Management & Computer Security, 2012, 20(1): 18–28. doi:  10.1108/09685221211219173
    [66] DARWISH A, EL ZARKA A, and ALOUL F. Towards understanding phishing victims’ profile[C]. 2012 International Conference on Computer Systems and Industrial Informatics, Sharjah, United Arab Emirates, 2012: 1–5. doi: 10.1109/ICCSII.2012.6454454.
    [67] ENOS F, BENUS S, CAUTIN R L, et al. Personality factors in human deception detection: Comparing human to machine performance[C]. The 9th International Conference on Spoken Language Processing, Pittsburgh, USA, 2006: 813–816.
    [68] HALEVI T, LEWIS J, and MEMON N. Phishing, personality traits and facebook[J]. 2013, arXiv: 1301.7643.
    [69] PARRISH JR J L, BAILEY J L, and COURTNEY J F. A personality based model for determining susceptibility to phishing attacks[R]. University of Arkansas at Little Rock Technique Report, Arkansas, USA, 2009: 285–296.
    [70] CHO J H, CAM H, and OLTRAMARI A. Effect of personality traits on trust and risk to phishing vulnerability: Modeling and analysis[C]. 2016 IEEE International Multi-disciplinary Conference on Cognitive Methods in Situation Awareness and Decision Support (CogSIMA), San Diego, USA, 2016: 7–13. doi: 10.1109/COGSIMA.2016.7497779.
    [71] JENSEN-CAMPBELL L A, KNACK J M, and GOMEZ H L. The psychology of nice people[J]. Social and Personality Psychology Compass, 2010, 4(11): 1042–1056. doi:  10.1111/j.1751-9004.2010.00307.x
    [72] JOHN O P, NAUMANN L P, and Soto C J. Paradigm Shift to the Integrative Big Five Trait Taxonomy: History, Measurement and Conceptual Issues[M]. JOHN O P, ROBINS R W, and PERVIN L A. Handbook of Personality: Theory and Research. 3rd ed. New York, NY: Guilford, 2008.
    [73] CROSSLER R E, JOHNSTON A C, LOWRY P B, et al. Future directions for behavioral information security research[J]. Computers & Security, 2013, 32: 90–101. doi:  10.1016/j.cose.2012.09.010
    [74] PFLEEGER S L, PREDD J B, HUNKER J, et al. Insiders behaving badly: Addressing bad actors and their actions[J]. IEEE Transactions on Information Forensics and Security, 2010, 5(1): 169–179. doi:  10.1109/TIFS.2009.2039591
    [75] DOWNS J S, HOLBROOK M, and CRANOR L F. Behavioral response to phishing risk[C]. The Anti-Phishing Working Groups 2nd annual eCrime Researchers Summit, Pittsburgh, USA, 2007: 37–44. doi: 10.1145/1299015.1299019.
    [76] HALEVI T, LEWIS J, and MEMON N. A pilot study of cyber security and privacy related behavior and personality traits[C]. The 22nd International Conference on World Wide Web, Rio de Janeiro, Brazil, 2013: 737–744. doi: 10.1145/2487788.2488034.
    [77] 冯登国, 张敏, 叶宇桐. 基于差分隐私模型的位置轨迹发布技术研究[J]. 电子与信息学报, 2020, 42(1): 74–88. doi:  10.11999/JEIT190632

    FENG Dengguo, ZHANG Min, and YE Yutong. Research on differentially private trajectory data publishing[J]. Journal of Electronics &Information Technology, 2020, 42(1): 74–88. doi:  10.11999/JEIT190632
  • [1] 杜小妮, 段娥娥, 王天心.  基于混沌的双模块Feistel结构高安全性高速分组密码算法安全性分析, 电子与信息学报. doi: 10.11999/JEIT200057
    [2] 徐瑨, 吴慧慈, 陶小峰.  5G网络空间安全对抗博弈, 电子与信息学报. doi: 10.11999/JEIT200058
    [3] 郁滨, 刘子清.  ZigBee网络容忍恶意攻击的安全定位算法, 电子与信息学报. doi: 10.11999/JEIT170962
    [4] 刘江, 张红旗, 杨英杰, 王义功.  基于主机安全状态迁移模型的动态网络防御有效性评估, 电子与信息学报. doi: 10.11999/JEIT160513
    [5] 毛可飞, 陈杰, 刘建伟.  层次身份基认证密钥协商方案的安全性分析和改进, 电子与信息学报. doi: 10.11999/JEIT151443
    [6] 罗敏, 孙腾, 张静茵, 李莉.  两个无证书聚合签名方案的安全性分析, 电子与信息学报. doi: 10.11999/JEIT151350
    [7] 戚湧, 郭诗炜, 李千目.  一种泛在网络的安全认证协议, 电子与信息学报. doi: 10.11999/JEIT151043
    [8] 张卫国, 孙嫚, 陈振华, 陈娓.  空间位置关系的安全多方计算及其应用, 电子与信息学报. doi: 10.11999/JEIT160102
    [9] 张玉磊, 李臣意, 王彩芬, 张永洁.  无证书聚合签名方案的安全性分析和改进, 电子与信息学报. doi: 10.11999/JEIT141635
    [10] 樊冰, 曾瑛, 唐良瑞.  基于信息熵的电力通信网脆弱性评价方法, 电子与信息学报. doi: 10.3724/SP.J.1146.2013.01481
    [11] 唐建强, 刘颖, 周华春, 张宏科.  一种身份与位置分离环境下基于网络的安全移动性管理协议, 电子与信息学报. doi: 10.3724/SP.J.1146.2012.00782
    [12] 陈涛, 余华, 韦岗.  认知无线电网络的物理层安全研究及其鲁棒性设计, 电子与信息学报. doi: 10.3724/SP.J.1146.2011.01002
    [13] 刘丹, 裴昌幸, 权东晓.  测量基对BB84协议安全性影响, 电子与信息学报. doi: 10.3724/SP.J.1146.2010.00136
    [14] 闫丽丽, 彭代渊.  Ad hoc网络中ARAN路由协议的安全性分析, 电子与信息学报. doi: 10.3724/SP.J.1146.2009.01265
    [15] 周业军, 李晖, 马建峰.  一种安全的纠错网络编码, 电子与信息学报. doi: 10.3724/SP.J.1146.2008.01237
    [16] 黄鹏, 刘晔, 周南润, 曾贵华.  基于PON网络的安全量子VPN方案, 电子与信息学报. doi: 10.3724/SP.J.1146.2008.00423
    [17] 罗长远, 李伟, 李海林, 蹇波.  分布式CA下空间网络认证密钥安全度量方法, 电子与信息学报. doi: 10.3724/SP.J.1146.2008.01343
    [18] 陈艳玲, 陈鲁生, 符方伟.  两种群签名方案的安全性分析, 电子与信息学报.
    [19] 王念平, 金晨辉, 李云强.  一类非平衡Feistel网络的差分可证明安全性分析, 电子与信息学报.
    [20] 张福泰, 师军, 王育民.  向量空间接入结构上信息论安全的可验证秘密分享, 电子与信息学报.
  • 加载中
  • 图(5) / 表(1)
    计量
    • 文章访问数:  86
    • HTML全文浏览量:  37
    • PDF下载量:  51
    • 被引次数: 0
    出版历程
    • 收稿日期:  2019-10-18
    • 修回日期:  2020-09-12
    • 网络出版日期:  2020-09-22
    • 刊出日期:  2020-12-08

    目录

      /

      返回文章
      返回

      官方微信,欢迎关注