1.png
高速非易失存储

With the development of the Internet, network and information security has been closely linked with the public's work and life. The challenges for the network and information security include: network hacker attacks, network virus threats, personal or enterprise information leakage threats and the threat generated by the network and software system vulnerabilities. In response to these threats, main research contents include: quantum cryptography, research on quantum information cryptography and cryptanalysis problems; security gateway and access control, research on the identity of security strategy and based on rules of the security strategy and the integrated access control; network security transmission protocol, research on safety transport mechanisms, and protocols; malicious code and software, research on malicious code principle, mechanism and corresponding hazards, malicious code prevention, prevention and control measures; network protocol and software vulnerability analysis, detection and location of network protocols and software vulnerabilities.

Research areas quantum cryptography, research on quantum information cryptography and cryptanalysis problems;

security gateway and access control, research on the identity of security strategy and based on rules of the security strategy and the integrated access control;

network security transmission protocol, research on safety transport mechanisms, and protocols;

malicious code and software, research on malicious code principle, mechanism and corresponding hazards, malicious code prevention, prevention and control measures;

network protocol and software vulnerability analysis, detection and location of network protocols and software vulnerabilities.