排序方式: 共有19条查询结果,搜索用时 0 毫秒
11.
T. Dowling 《European Journal of Engineering Education》2006,31(5):593-606
The present paper describes the design, implementation and evaluation of a cryptography module for final-year software engineering students. The emphasis is on implementation architectures and practical cryptanalysis rather than a standard mathematical approach. The competitive continuous assessment process reflects this approach and rewards experimentation. Students who excel at mathematics will invariably do well in cryptography. A key aim of the module is to try to extend this relationship to include good software engineers who may find mathematics more difficult. The approach is evaluated quantitatively by statistical analysis. The results of the statistical analysis show a significantly higher correlation between a student's performance in software engineering and cryptography than in mathematics and cryptography. These results indicate that this teaching approach is a better fit for software engineers than a standard approach. 相似文献
12.
阐述了量子密码的基本原理和机制,并根据量子密码的绝对安全,即一次一密的特征,将其应用于电子商务的具体应用中,如量子数字签名、数字认证等.最后指出随着超级计算能力的量子计算机的出现,现行基于解自然对数及因子分解困难度的加密系统、数字签章及密码协议都将变得不安全,而量子密码能很好地解决这些问题. 相似文献
13.
14.
现代计算机网络面临着信息泄露、黑客攻击、病毒感染等多种威胁,使用密码学可以保障信息的机密性和完整性,防止信息被篡改、伪造。本文概括介绍了密码学在现代网络信息安全体系建设中的地位,同时对如何合理地利用密码学技术来保障网络信息安全进行了分析。 相似文献
15.
Leonard N. Foner 《The Information Society》2013,29(3):153-163
An experimental, all-day Workshop on Freedom and Privacy by Design took place on 4 April 2000, as part of the 10th annual Conference on Computers, Freedom, and Privacy. It invited more than 30 well-known systems architects, implementors, and experts in privacy and usability to investigate, in depth, three different proposals for creating political artifacts: technology intended to bring about particular types of political change--in this case, the reinforcement of certain civil liberties. This article summarizes the rationale and structure of the workshop, the three proposals investigated, and what the workshop and audience members had to say about the issues. It concludes with some information on the workshop's impact to date and what lessons were learned by running such an experiment. 相似文献
16.
A new attack is proposed to show that a specified group of verifiers can cooperate to forge the signature for any message by secret key substitution due to the leaked secret key or by the group public key adjustment because of the renewed members. This paper presents the improvement scheme which overcomes the security weakness of Laih and Yen's scheme. 相似文献
17.
Leonard N. Foner 《The Information Society》2002,18(3):153-163
An experimental, all-day Workshop on Freedom and Privacy by Design took place on 4 April 2000, as part of the 10th annual Conference on Computers, Freedom, and Privacy. It invited more than 30 well-known systems architects, implementors, and experts in privacy and usability to investigate, in depth, three different proposals for creating political artifacts: technology intended to bring about particular types of political change--in this case, the reinforcement of certain civil liberties. This article summarizes the rationale and structure of the workshop, the three proposals investigated, and what the workshop and audience members had to say about the issues. It concludes with some information on the workshop's impact to date and what lessons were learned by running such an experiment. 相似文献
18.
孙琳琳 《和田师范专科学校学报》2007,27(2):174-175
本文介绍了数字水印技术的概念和基本原理,并按照不同的分类方法详细介绍了数字水印的类别。文章最后总结了数字水印的性能以及在信息安全领域的具体应用,并对数字水印的发展与应用前景做了展望。 相似文献
19.
密码学课程的设计与实践 总被引:1,自引:0,他引:1
密码学作为信息安全的重要技术,能有效保障信息的机密性、完整性和鉴别。本根据笔面向计算机专业硕士生开设密码学选修课的实践,探讨了密码学课程的教学组织和信息安全教育。 相似文献