References
The White House. Launching the U.S. international strategy for cyberspace. May 16, 2011. http://www.whitehouse.gov/blog/2011/05/16/launching-us-international-strategy-cyberspace
Fang BX, Jia Y, Han Y et al (2014) A survey of social network and information dissemination analysis. Chin Sci Bull 59:4163–4172
Feng DG, Qin Y, Feng W et al (2014) The theory and practice in the evolution of trusted computing. Chin Sci Bull 59:4173–4189
Li XQ, Li H (2014) A survey on data dissemination in VANETs. Chin Sci Bull 59:4190–4200
Xu P, Chen HW, Zou DQ et al (2014) Fine-grained and heterogeneous proxy re-encryption for secure cloud storage. Chin Sci Bull 59:4201–4209
Zhang QY, Zhao SJ, Qin Y et al (2014) Formal analysis of TPM2.0 key management APIs. Chin Sci Bull 59:4210–4224
Li GY, Hu AQ, Huang YM (2014) A novel artificial noise aided security scheme to resist blind source separation attacks. Chin Sci Bull 59:4225–4234
Author information
Authors and Affiliations
Corresponding author
Additional information
SPECIAL TOPIC: Network and Information Security
About this article
Cite this article
Feng, D. Preface. Chin. Sci. Bull. 59, 4161–4162 (2014). https://doi.org/10.1007/s11434-014-0591-0
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11434-014-0591-0