首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   17篇
  免费   0篇
  国内免费   2篇
教育   13篇
科学研究   5篇
信息传播   1篇
  2020年   1篇
  2019年   1篇
  2013年   2篇
  2011年   1篇
  2009年   1篇
  2008年   1篇
  2007年   2篇
  2006年   1篇
  2005年   1篇
  2004年   5篇
  2003年   1篇
  2002年   2篇
排序方式: 共有19条查询结果,搜索用时 0 毫秒
11.
The present paper describes the design, implementation and evaluation of a cryptography module for final-year software engineering students. The emphasis is on implementation architectures and practical cryptanalysis rather than a standard mathematical approach. The competitive continuous assessment process reflects this approach and rewards experimentation. Students who excel at mathematics will invariably do well in cryptography. A key aim of the module is to try to extend this relationship to include good software engineers who may find mathematics more difficult. The approach is evaluated quantitatively by statistical analysis. The results of the statistical analysis show a significantly higher correlation between a student's performance in software engineering and cryptography than in mathematics and cryptography. These results indicate that this teaching approach is a better fit for software engineers than a standard approach.  相似文献   
12.
阐述了量子密码的基本原理和机制,并根据量子密码的绝对安全,即一次一密的特征,将其应用于电子商务的具体应用中,如量子数字签名、数字认证等.最后指出随着超级计算能力的量子计算机的出现,现行基于解自然对数及因子分解困难度的加密系统、数字签章及密码协议都将变得不安全,而量子密码能很好地解决这些问题.  相似文献   
13.
量子密码体系研究   总被引:1,自引:0,他引:1  
李佳 《科技广场》2013,(6):221-226
本文主要介绍了量子密码体系中密码算法、密钥管理、密码技术、安全协议、密钥分配等主要内容。得出了量子密码比传统密码更安全的有效结论,最后总结了量子密码广阔的发展前景。  相似文献   
14.
吕彩霞 《科技广场》2011,(9):104-107
现代计算机网络面临着信息泄露、黑客攻击、病毒感染等多种威胁,使用密码学可以保障信息的机密性和完整性,防止信息被篡改、伪造。本文概括介绍了密码学在现代网络信息安全体系建设中的地位,同时对如何合理地利用密码学技术来保障网络信息安全进行了分析。  相似文献   
15.
An experimental, all-day Workshop on Freedom and Privacy by Design took place on 4 April 2000, as part of the 10th annual Conference on Computers, Freedom, and Privacy. It invited more than 30 well-known systems architects, implementors, and experts in privacy and usability to investigate, in depth, three different proposals for creating political artifacts: technology intended to bring about particular types of political change--in this case, the reinforcement of certain civil liberties. This article summarizes the rationale and structure of the workshop, the three proposals investigated, and what the workshop and audience members had to say about the issues. It concludes with some information on the workshop's impact to date and what lessons were learned by running such an experiment.  相似文献   
16.
A new attack is proposed to show that a specified group of verifiers can cooperate to forge the signature for any message by secret key substitution due to the leaked secret key or by the group public key adjustment because of the renewed members. This paper presents the improvement scheme which overcomes the security weakness of Laih and Yen's scheme.  相似文献   
17.
An experimental, all-day Workshop on Freedom and Privacy by Design took place on 4 April 2000, as part of the 10th annual Conference on Computers, Freedom, and Privacy. It invited more than 30 well-known systems architects, implementors, and experts in privacy and usability to investigate, in depth, three different proposals for creating political artifacts: technology intended to bring about particular types of political change--in this case, the reinforcement of certain civil liberties. This article summarizes the rationale and structure of the workshop, the three proposals investigated, and what the workshop and audience members had to say about the issues. It concludes with some information on the workshop's impact to date and what lessons were learned by running such an experiment.  相似文献   
18.
本文介绍了数字水印技术的概念和基本原理,并按照不同的分类方法详细介绍了数字水印的类别。文章最后总结了数字水印的性能以及在信息安全领域的具体应用,并对数字水印的发展与应用前景做了展望。  相似文献   
19.
密码学课程的设计与实践   总被引:1,自引:0,他引:1  
密码学作为信息安全的重要技术,能有效保障信息的机密性、完整性和鉴别。本根据笔面向计算机专业硕士生开设密码学选修课的实践,探讨了密码学课程的教学组织和信息安全教育。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号