Encrypt and crack technology in information security

被引:0
|
作者
Wang, Da-Kang [1 ]
Du, Hai-Shan [1 ]
机构
[1] College of Mechanical Engineering and Applied Electronics Technology, Beijing University of Technology, Beijing 100022, China
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:497 / 500
相关论文
共 50 条
  • [21] INFORMATION TECHNOLOGY VS SECURITY IN RUSSIA
    MUSAEV, EA
    SECURITY AND CONTROL OF INFORMATION TECHNOLOGY IN SOCIETY, 1994, 43 : 73 - 76
  • [22] Security centric systems for information technology
    Tezuka, Satoru
    Mitsunaga, Satoshi
    Nakagami, Shoichi
    Kitajima, Hiroyuki
    Hitachi Review, 1999, 48 (04): : 187 - 191
  • [23] Digital Watermarking Technology in Information Security
    Li, YingChun
    Zhao, LiFang
    ADVANCED RESEARCH ON MATERIAL ENGINEERING, CHEMISTRY AND BIOINFORMATICS, PTS 1 AND 2 (MECB 2011), 2011, 282-283 : 55 - 58
  • [24] Information technology security using cryptography
    Sanchez-Reillo, R
    Lopez-Ongil, C
    Entrena-Arrontes, L
    Sanchez-Avila, C
    IEEE AEROSPACE AND ELECTRONIC SYSTEMS MAGAZINE, 2003, 18 (06) : 21 - 24
  • [25] Quantum technology and cryptology for information security
    Naqvi, Syed
    Riguidel, Michel
    QUANTUM INFORMATION AND COMPUTATION V, 2007, 6573
  • [26] The changing face of information technology security
    Orlowski, S
    INFORMATION SECURITY AND PRIVACY: 1ST AUSTRALASIAN CONFERENCE, ACISP 96, 1996, 1172 : 1 - 13
  • [27] Information technology and the governance of social security
    Henman, P
    Adler, M
    CRITICAL SOCIAL POLICY, 2003, 23 (02) : 139 - 164
  • [28] Information security technology and services in network
    Terebijon Gakkaishi/Journal of the Institute of Television Engineers of Japan, 1995, 49 (12):
  • [29] Managing Information Technology Security Risk
    Gilliam, DP
    SOFTWARE SECURITY - THEORIES AND SYSTEMS, 2004, 3233 : 296 - 317
  • [30] The Information Security for the Application of IoT Technology
    Jiang, Jia
    Yang, Donghai
    LISS 2014, 2015, : 1687 - 1693