X
Search Filters
Format Format
Subjects Subjects
Subjects Subjects
X
Sort by Item Count (A-Z)
Filter by Count
信息安全 (13828) 13828
网络安全 (3858) 3858
信息系统 (2074) 2074
信息技术 (1633) 1633
安全 (1571) 1571
计算机网络 (1429) 1429
信息 (1185) 1185
网络信息安全 (951) 951
安全管理 (897) 897
计算机 (891) 891
网络 (774) 774
安全问题 (739) 739
互联网 (720) 720
中国 (650) 650
防火墙 (650) 650
信息安全技术 (608) 608
应用 (606) 606
国家安全 (556) 556
电子商务 (551) 551
数据安全 (520) 520
电子政务 (512) 512
网络信息 (512) 512
食品安全 (511) 511
信息安全管理 (496) 496
信息网络 (481) 481
信息化 (475) 475
安全防护 (449) 449
信息化建设 (442) 442
物联网 (430) 430
计算机安全 (413) 413
风险评估 (409) 409
管理 (375) 375
企业 (368) 368
安全技术 (368) 368
安全隐患 (363) 363
对策 (362) 362
等级保护 (355) 355
云计算 (354) 354
信息管理 (350) 350
信息系统安全 (349) 349
医院信息系统 (319) 319
安全信息 (314) 314
安全策略 (314) 314
个人信息 (312) 312
信息时代 (312) 312
信息泄露 (308) 308
国家信息安全 (308) 308
网络攻击 (301) 301
网络技术 (299) 299
信息安全保障 (279) 279
管理信息系统 (277) 277
信息网络安全 (269) 269
安全威胁 (267) 267
数字签名 (262) 262
信息基础设施 (261) 261
技术 (260) 260
计算机病毒 (258) 258
系统安全 (253) 253
网络环境 (253) 253
安全风险 (251) 251
大数据 (250) 250
信息资源 (243) 243
数据库 (240) 240
互联网安全 (239) 239
信息安全产业 (239) 239
安全生产 (227) 227
信息管理系统 (214) 214
入侵检测系统 (212) 212
访问控制 (212) 212
黑客攻击 (212) 212
信息服务 (211) 211
信息不对称 (210) 210
策略 (210) 210
保障 (208) 208
安全保障 (208) 208
信息共享 (207) 207
工业控制系统 (204) 204
信息产业 (201) 201
安全性 (200) 200
个人信息安全 (197) 197
计算机信息系统 (195) 195
风险管理 (195) 195
个人信息保护 (194) 194
安全体系 (194) 194
入侵检测 (190) 190
档案信息安全 (186) 186
问题 (185) 185
信息安全问题 (183) 183
internet (181) 181
信息安全工作 (180) 180
信息隐藏 (180) 180
移动互联网 (179) 179
电力系统 (177) 177
防护策略 (177) 177
防范措施 (177) 177
黑客 (177) 177
网络系统 (176) 176
密码学 (175) 175
计算机技术 (175) 175
防护 (175) 175
more...
Language Language
Publication Date Publication Date
Click on a bar to filter by decade
Slide to change publication date range


东南大学学报:英文版, ISSN 1003-7985, 2017, Issue 3, pp. 377 - 381
Journal Article
Journal Article
武汉大学学报:自然科学英文版, ISSN 1007-1202, 2012, Volume 17, Issue 6, pp. 511 - 515
Nowadays,the capability of traditional digital forensic tools fails to meet the demand of ever increasing of criminal or civil cases.One of the challenges is... 
信息安全 | 电子邮件 | 网络安全 | 计算机网络 | TP 393.08 | open-source tools | Life Sciences, general | Live DVD/USB | Mathematics, general | digital forensic | Mathematics | Physics, general | Computer Science, general | Demand | Platforms | Data buses | Forensic engineering | Digital | Source code | Devices | Marketing
Journal Article
武汉大学学报:自然科学英文版, ISSN 1007-1202, 2012, Volume 17, Issue 6, pp. 499 - 503
Researchers have proposed several security protocols to protect the electronic commerce security in these years;however,not all of them are secure enough.This... 
信息安全 | 信息技术 | 多媒体 | 信息系统 | 计算机安全 | model checking | Life Sciences, general | TP 373 | Mathematics, general | Casper | formal analysis | Mathematics | Physics, general | Computer Science, general | FDR2 | electronic commerce | Electronics | Mathematical models | Security | Electronic commerce | Defects
Journal Article
武汉大学学报:自然科学英文版, ISSN 1007-1202, 2012, Volume 17, Issue 6, pp. 531 - 538
For the issue of the discretionary access control(DAC) model safety analysis,a logic method is proposed.This method takes the GD model as the classic DAC model... 
信息安全 | 电子邮件 | 网络安全 | 计算机网络 | safety analysis | Life Sciences, general | discretionary access control (DAC) | TP 309 | Mathematics, general | Mathematics | Physics, general | logic | state transfer | Computer Science, general | Access control | Policies | Algorithms | Mathematical models | Terminals | Safety | Logic | Prolog (programming language)
Journal Article
武汉大学学报:自然科学英文版, ISSN 1007-1202, 2012, Volume 17, Issue 6, pp. 494 - 498
It is difficult for security experts to generate polymorphic signatures by using traditional string mining and matching techniques.A semantic-aware method is... 
信息安全 | 信息技术 | 信息系统 | 计算机安全 | Life Sciences, general | Mathematics, general | semantic aware | TP 305 | Mathematics | polymorphism | Physics, general | attack signature | Computer Science, general | string pattern | Mining | Matching | Semantics | Clusters | Security | Signatures | Strings | Engines
Journal Article
东南大学学报:英文版, ISSN 1003-7985, 2011, Volume 27, Issue 2, pp. 144 - 147
Journal Article
武汉大学学报:自然科学英文版, ISSN 1007-1202, 2012, Volume 17, Issue 5, pp. 435 - 440
Journal Article
武汉大学学报:自然科学英文版, ISSN 1007-1202, 2006, Volume 11, Issue 1, pp. 181 - 184
The existing homomorphie eneryption scheme is based on ring of the integer, and the possible operators are restricted to addition and multiplication only. In... 
信息安全 | 加密方案 | 同态密码术 | 相似模 | security | Life Sciences, general | homomorphic encryption scheme | Mathematics, general | Mathematics | similar modul | Physics, general | TN 918 | Computer Science, general | private homomorphism | Homomorphic encryption scheme | Security | Private homomorphism | Similar Modul
Journal Article
Bulletin of the Chinese Academy of Sciences, ISSN 1003-3572, 2012, Volume 26, Issue 2, pp. 127 - 127
TP309%G322.21; The Institute of Information Engineering (liE), a new institute under CAS approved for establishment in 2011, has made a good start in its... 
Journal Article
电子科学学刊:英文版, ISSN 0217-9822, 2009, Volume 26, Issue 2, pp. 285 - 288
The objective of steganography is to hide message securely in cover objects for secret communication.How to design a secure steganographic algorithm is still... 
信息隐藏 | 粒子群优化算法 | 共生特性 | 信息安全 | JPEG | 知识产权 | 设计安全 | 二进制 | Secure steganography | Engineering | TP35 | Binary Particle Swarm Optimization (BPSO) | Integer Programming (IP) | Electrical Engineering | Mathematical optimization | Algorithms
Journal Article
武汉大学学报:自然科学英文版, ISSN 1007-1202, 2006, Volume 11, Issue 5, pp. 1097 - 1103
This paper describes a routing algorithm for risk scanning agents using ant colony algorithm in P2P(peerto peer) network. Every peer in the P2P network is... 
蚁群算法 | 电子算法 | 信息安全 | 风险 | P2P
Journal Article
武汉大学学报:自然科学英文版, ISSN 1007-1202, 2006, Volume 11, Issue 6, pp. 1649 - 1652
A multiple secret sharing scheme can share a group of secrets in each sharing session, which is very useful especially in sharing large secrets. However, most... 
信息安全 | 密码术 | 秘密共享 | 存取结构 | Life Sciences, general | information security | Mathematics, general | cryptography | Mathematics | Physics, general | Computer Science, general | secret sharing | TN 918,4 | access structure | Access structure | Secret sharing | Cryptography | Information security
Journal Article
电子科学学刊:英文版, ISSN 0217-9822, 2009, Volume 26, Issue 5, pp. 631 - 636
Visual cryptography is a cryptographic technique which emerges in the information security domain in recent years. Each of the sharing sub-keys may be a... 
加密技术 | 图像内容 | 加密算法 | 可视化 | 数字签名 | 管理问题 | 噪声图像 | 信息安全 | Digital signature | Engineering | Visual cryptography | TP309 | Time-stamp | Electrical Engineering | Cryptography | Discrimination | Universities and colleges
Journal Article
武汉大学学报:自然科学英文版, ISSN 1007-1202, 2006, Volume 11, Issue 6, pp. 1731 - 1735
We present a provably secure authenticated tree based key agreement scheme for multicast. There is a wide variety of applications that can benefit from using... 
信息安全 | 组密钥协议 | 多点传送 | 双线性配对 | Multicast | Provable security | Group key agreement | Bilinear pairing
Journal Article
武汉大学学报:自然科学英文版, ISSN 1007-1202, 2006, Volume 11, Issue 6, pp. 1661 - 1666
Journal Article
武汉大学学报:自然科学英文版, ISSN 1007-1202, 2006, Volume 11, Issue 6, pp. 1473 - 1476
Rootkits, which unnoticeably reside in your computer, stealthily carry on remote control and software eavesdropping, are a great threat to network and computer... 
信息安全 | 内核 | 根工具 | 检测 | kernel rootkits | Life Sciences, general | rootkit detection | TP 309 | rootkit | Mathematics, general | Mathematics | Physics, general | Computer Science, general | Kernel rootkits | Rootkit detection | Rootkit
Journal Article
武汉大学学报:自然科学英文版, ISSN 1007-1202, 2006, Volume 11, Issue 6, pp. 1753 - 1756
Although it is convenient to exchange data by publishing view, but it may disclose sensitive information. The problem of how to eliminate information... 
信息安全 | 敏感信息 | 信息披露 | 优先知识 | TP 311 | Life Sciences, general | prior knowledge | Mathematics, general | Mathematics | Physics, general | view publishing | sensitive information | Computer Science, general | information disclosure | Prior knowledge | Sensitive information | View publishing | Information disclosure
Journal Article
武汉大学学报:自然科学英文版, ISSN 1007-1202, 2006, Volume 11, Issue 6, pp. 1529 - 1532
The security of the RSA system with the prime pairs of some special form is investigated. A new special-purpose algorithm for factoring RSA numbers is... 
公钥密码 | 信息安全 | RSA | 算法 | 整数因数分解 | Life Sciences, general | integer factorization | TP 309 | special-purpose algorithm | Mathematics, general | Mathematics | Physics, general | RSA number | Computer Science, general | public key cryptosystem | Public key cryptosystem | Integer factorization | Special-purpose algorithm
Journal Article
武汉大学学报:自然科学英文版, ISSN 1007-1202, 2007, Volume 12, Issue 1, pp. 177 - 180
Internet voting protocols is the base of the Internet voting systems. In this paper a new practical Internet voting protocol is introduced. The proposed... 
信息安全 | 加密技术 | 安全协议 | 计算机 | voting protocol | Life Sciences, general | information security | protocol security | Mathematics, general | TP 305 | Physics, general | Computer Science, general | Science, general | Voting protocol | Protocol security | Information security
Journal Article
No results were found for your search.

Cannot display more than 1000 results, please narrow the terms of your search.