Encrypt and crack technology in information security

被引:0
|
作者
Wang, Da-Kang [1 ]
Du, Hai-Shan [1 ]
机构
[1] College of Mechanical Engineering and Applied Electronics Technology, Beijing University of Technology, Beijing 100022, China
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:497 / 500
相关论文
共 50 条
  • [1] On the security of encrypt-and-MAC paradigm
    Hu Zhenyu
    Lin Dongdai
    Wu Wenling
    Feng Dengguo
    CHINESE JOURNAL OF ELECTRONICS, 2007, 16 (01): : 45 - 50
  • [2] On the security of encrypt-and-MAC paradigm
    Chin J Electron, 2007, 1 (45-50):
  • [3] Information technology security
    Elliott, AT
    NUCLEAR MEDICINE COMMUNICATIONS, 2003, 24 (12) : 1205 - 1205
  • [4] A Method to Encrypt Information with DNA Computing
    Zhang, Zheng
    Shi, Xiaolong
    Liu, Jie
    2008 THIRD INTERNATIONAL CONFERENCE ON BIO-INSPIRED COMPUTING: THEORIES AND APPLICATIONS, 2008, : 155 - +
  • [5] Information security: Technology and the law
    Marvin, CR
    Levinson, CK
    TOWARD AN ELECTRONIC PATIENT RECORD '98 CONFERENCE AND EXPOSITION, PROCEEDINGS - VOLS 1-3, 1998, : A123 - A126
  • [6] On the (In)Security of IPsec in MAC-then-Encrypt Configurations
    Degabriele, Jean Paul
    Paterson, Kenneth G.
    PROCEEDINGS OF THE 17TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'10), 2010, : 493 - 504
  • [7] Confidentiality and security in information technology
    Lefton, AB
    GENERATIONS-JOURNAL OF THE AMERICAN SOCIETY ON AGING, 1997, 21 (03): : 50 - 52
  • [8] PERSPECTIVES IN INFORMATION TECHNOLOGY SECURITY
    HIGHLAND, HJ
    IFIP TRANSACTIONS A-COMPUTER SCIENCE AND TECHNOLOGY, 1992, 13 : 440 - 446
  • [9] Standardization in Information Technology Security
    Fal’ O.M.
    Cybernetics and Systems Analysis, 2017, 53 (1) : 78 - 82
  • [10] Perspectives in information technology security
    Highland, H.J.
    Proceedings of the IFIP World Computer Congress, 1992, 2