Survey on cyberspace security

被引:56
|
作者
Zhang HuanGuo [1 ]
Han WenBao [2 ]
Lai XueJia [3 ]
Lin DongDai [4 ]
Ma JianFeng [5 ]
Li JianHua [6 ]
机构
[1] Wuhan Univ, Comp Sch, Wuhan 430072, Peoples R China
[2] State Key Lab Math Engn & Adv Comp, Wuxi 214122, Peoples R China
[3] Shanghai Jiao Tong Univ, Dept Comp, Shanghai 200240, Peoples R China
[4] Chinese Acad Sci, Inst Informat Engn, Beijing 100093, Peoples R China
[5] Xidian Univ, Sch Cyber Engn, Xian 710071, Peoples R China
[6] Shanghai Jiao Tong Univ, Sch Informat Secur Engn, Shanghai 200240, Peoples R China
基金
中国国家自然科学基金;
关键词
cyberspace security; information security; cryptography; network security; information system security; information content security; FULLY HOMOMORPHIC ENCRYPTION; STREAM CIPHERS; ATTACKS; RETRIEVAL; CLASSIFICATION; CRYPTOSYSTEMS; ANONYMITY; CLOUD; MODEL;
D O I
10.1007/s11432-015-5433-4
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Along with the rapid development and wide application of information technology, human society has entered the information era. In this era, people live and work in cyberspace. Cyberspace is the collection of all information systems; it is the information environment for human survival. Therefore, it is necessary to ensure the security of cyberspace. This paper gives a comprehensive introduction to research and development in this field, with a description of existing problems and some currently active research topics in the areas of cyberspace itself, cyberspace security, cryptography, network security, information system security and information content security.
引用
收藏
页码:1 / 43
页数:43
相关论文
共 50 条
  • [1] Survey on cyberspace security
    HuanGuo Zhang
    WenBao Han
    XueJia Lai
    DongDai Lin
    JianFeng Ma
    JianHua Li
    Science China Information Sciences, 2015, 58 : 1 - 43
  • [2] Survey on cyberspace security
    ZHANG HuanGuo
    HAN WenBao
    LAI XueJia
    LIN DongDai
    MA JianFeng
    LI JianHua
    Science China(Information Sciences), 2015, 58 (11) : 5 - 47
  • [3] A Survey on Personality in Cyberspace Security
    Wu Tong
    Zheng Kangfeng
    Wu Chunhua
    Wang Xiujuan
    Zheng Heci
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2020, 42 (12) : 2827 - 2840
  • [4] Application of meta-learning in cyberspace security: a survey
    Yang, Aimin
    Lu, Chaomeng
    Li, Jie
    Huang, Xiangdong
    Ji, Tianhao
    Li, Xichang
    Sheng, Yichao
    DIGITAL COMMUNICATIONS AND NETWORKS, 2023, 9 (01) : 67 - 78
  • [5] Application of meta-learning in cyberspace security:a survey
    Aimin Yang
    Chaomeng Lu
    Jie Li
    Xiangdong Huang
    Tianhao Ji
    Xichang Li
    Yichao Sheng
    Digital Communications and Networks, 2023, 9 (01) : 67 - 78
  • [6] CYBERSPACE SECURITY
    Zhang, Huanguo
    Mu, Yi
    China Communications, 2016, 13 (11) : 68 - 69
  • [7] CYBERSPACE SECURITY
    Huanguo Zhang
    Yi Mu
    中国通信, 2016, 13 (11) : 68 - 69
  • [9] Cyberspace security
    Anon
    Chronicle of Higher Education, 2002, 48 (34)
  • [10] Cyberspace and security
    Lango, Hans-Inge
    Sandvik, Kristin Bergtora
    INTERNASJONAL POLITIKK, 2013, 71 (02) : 221 - 228