[1] CONTEH N Y, SCHMICK P J. Cybersecurity: risks, vulnerabilities and countermeasures to prevent social engineering attacks[J]. International Journal of Advanced Computer Research, 2016, 6(23): 31-38. [2] 曹原,赵永利,郁小松,等. 基于量子密钥分发的可信光网络体系架构[J]. 信息通信技术,2016(6):48-54. CAO Yuan, ZHAO Yongli, YU Xiaosong, et al . Credible optical network architecture based on quantum key distribution[J]. Information and Communications Technologies, 2016(6): 48-54. [3] SKORIN-KAPOV N, FURDEK M, ZSIGMOND S, et al . Physical- layer security in evolving optical networks[J]. IEEE Communications Magazine, 2016, 54(8): 110-117. [4] RAWAT D B, REDDY S R. Software defined networking architecture, security and energy efficiency: a survey[J]. IEEE Communications Surveys & Tutorials, 2017, 19(1): 325-346. [5] WANG X, SHI W, XIANG Y, et al . Efficient network security policy enforcement with policy space analysis[J]. IEEE/ACM Transactions on Networking, 2016, 24(5): 2926-2938. [6] ELKOUSS D, MARTINEZ-MATEO J, CIURANA A, et al . Secure optical networks based on quantum key distribution and weakly trusted repeaters[J]. Journal of Optical Communications & Networking, 2013, 5(4): 316-328. [7] LO H K, CHAU H F. Unconditional security of quantum key distribution over arbitrarily long distances [J]. Science, 1999, 283(5410): 2050-2056. [8] BENNETT C H, BRASSARD G. Quantum cryptography: public key distribution and coin tossing [C]// Proceedings of International Conference on Computers Systems and Signal Processing. IEEE, 1984: 175-179. [9] RANI H M S, MITTAL D H, DIRECTOR S. A compound algorithm using neural and AES for encryption and compare it with RSA and existing AES[J]. Journal of Network Communications and Emerging Technologies, 2015, 3(1): 35-38. [10] RUJ S, NAYAK A, STOJMENOVIC I. DACC: Distributed access control in clouds[C]// IEEE, International Conference on Trust, Security and Privacy in Computing and Communications. IEEE Computer Society, 2011: 91-98. |