Skip to main content
Log in

Preface

  • Editorial
  • Published:
Chinese Science Bulletin

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

References

  1. The White House. Launching the U.S. international strategy for cyberspace. May 16, 2011. http://www.whitehouse.gov/blog/2011/05/16/launching-us-international-strategy-cyberspace

  2. Fang BX, Jia Y, Han Y et al (2014) A survey of social network and information dissemination analysis. Chin Sci Bull 59:4163–4172

    Article  Google Scholar 

  3. Feng DG, Qin Y, Feng W et al (2014) The theory and practice in the evolution of trusted computing. Chin Sci Bull 59:4173–4189

    Article  Google Scholar 

  4. Li XQ, Li H (2014) A survey on data dissemination in VANETs. Chin Sci Bull 59:4190–4200

    Article  Google Scholar 

  5. Xu P, Chen HW, Zou DQ et al (2014) Fine-grained and heterogeneous proxy re-encryption for secure cloud storage. Chin Sci Bull 59:4201–4209

    Article  Google Scholar 

  6. Zhang QY, Zhao SJ, Qin Y et al (2014) Formal analysis of TPM2.0 key management APIs. Chin Sci Bull 59:4210–4224

  7. Li GY, Hu AQ, Huang YM (2014) A novel artificial noise aided security scheme to resist blind source separation attacks. Chin Sci Bull 59:4225–4234

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Dengguo Feng.

Additional information

SPECIAL TOPIC: Network and Information Security

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Feng, D. Preface. Chin. Sci. Bull. 59, 4161–4162 (2014). https://doi.org/10.1007/s11434-014-0591-0

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11434-014-0591-0

Keywords

Navigation