Review of cryptographic application security evaluation techniques for new critical infrastructures
The construction of new critical infrastructure, represented by high-speed full-time signal coverage, intelligent and fine-grained urban management, and deep space and deep sea scientific innovation experimental fields, has entered a new stage with the deep integration and development of new technol...
Main Author: | Gaolei LI, Jianhua LI, Zhihong ZHOU, Hao ZHANG |
---|---|
Format: | Article |
Language: | English |
Published: |
POSTS&TELECOM PRESS Co., LTD
2023-12-01
|
Series: | 网络与信息安全学报 |
Subjects: | |
Online Access: | https://www.infocomm-journal.com/cjnis/CN/10.11959/j.issn.2096-109x.2023079 |
Similar Items
-
CYBER SECURITY OF A CRITICAL INFRASTRUCTURE
by: Slavimir Vesić, et al.
Published: (2023-06-01) -
Cryptographic Data Security for Reliable Wireless Sensor Network
by: Shabana Urooj, et al.
Published: (2023-06-01) -
Threats, Attacks, and Cryptography Frameworks of Cybersecurity in Critical Infrastructures
by: Kyriaki Tsantikidou, et al.
Published: (2024-02-01) -
Water Critical Infrastructure Security and Its Dependencies
by: David Michael Birkett
Published: (2017-05-01) -
Attack Categorisation for IoT Applications in Critical Infrastructures, a Survey
by: Edward Staddon, et al.
Published: (2021-08-01)