informationSecurity相关论文
Shor in 1994 proposed a quantum polynomial-time algorithm for finding the order r of an element a in the multiplica-tive......
互联网技术在给现代生活带来极大便利的同时,也为犯罪分子提供了可乘之机.犯罪分子通过黑客、恶意软件、社会攻击、特权滥用和新技......
Deep Neural Networks (DNNs) are demonstrated to be vulnerable to adversarial examples,which are elaborately crafted to f......
...
cooperative work manner for a group of people making use of network.Nowadays,it is a study hotspot in and out country,but ......
As one of the era core competitiveness,big data has become a hotspot in the field of information technology after cloud ......
本文以作者的业务支撑系统运营管理工作的实践经验出发,总结信息安全工作实施的5项基础:管理、人员、环境、工具和资源,对这些基础......
In this paper, a novel reversible data hiding algorithm for encrypted images is proposed.In encryption phase, chaotic se......
In recent years, network covert channel has been a popular means of covert communication, which utilizes the redundancie......
The status of a companys operation depends largely on the level of its financial management.In recent years,the developm......
为了提高图像加密的安全性, 提出了一种多参数加权类分数傅里叶变换。此类多参数加权类分数傅里叶变换是C.C.Shih提出的四项加权类......
Introduction to Wireless Endogenous Security and Safety:Problems,Attributes,Structures and Functions
The information security and functional safety are fundamental issues of wireless communica-tions sytems.The endogenous ......
Electromagnetic emissions from electrical information equipment may contain useful information and lead to information l......
In this letter,we propose a new secure and efficient certificateless aggregate signature scheme which has the advant......
建立基于校园网的综合教务管理系统是对现有教务管理模式的重大改进。介绍了该系统的网络结构方案、软件调试与设置、对用户的管理......
The 21st century is the age of information when information becomes an important strategic resource. The information obt......
随着信息社会的不断发展,信息安全与通讯流畅成为一对新的矛盾。文章针对中小型局域网中的数据传输要求,探讨了网络信息安全中存在的......