工学 >>> 计算机科学技术 >>> 计算机科学技术基础学科 人工智能 计算机系统结构 计算机软件 计算机工程 计算机应用 计算机科学技术其他学科
搜索结果: 16-27 共查到计算机科学技术 SECURE相关记录27条 . 查询时间(0.25 秒)
This paper analyses security mechanism and authentication, key agreement protocol of 3G system amply, puts forward a amelioration scheme. This scheme assures security communications without credible V...
The increase in the usage of different access technologies has led to aneed for new mechanisms to manage interworking and roaming betweendifferent network technologies. To provide secure and seamless ...
Whena Supervisory Control and Data Acquisition (SCADA) system monitors andmanages other complex infrastructures through the use of distributedtechnologies, it becomes a critical infrastructure by itse...
Data Warehouses manage historical information for the decision making process, and this information could be discovered by unauthorized users if security constraints are not established. It is therefo...
Secure routing in Mobile Ad hoc networks’ and ‘Internet connectivity to Mobile Ad hoc networks’ have been dealt separately in the past research. This paper proposes a light weight solution for sec...
AbstractTransformation of the widely used Pedersen's Verifiable Secret Sharing (Pedersen-VSS) to Pedersen-VSS-General secure against general adversary is first presented. Then a misunderstanding about...
AbstractThis paper studies the Verifiable Signature Sharing (V(S) introduced by Franklin and Reiter, which enables the recipient of a signature to share it among n proxies so that a subset of them can...
四川在线2007年2月8日报道 日前,企业网关安全行业的领先企业Secure Computing Corporation (纳斯达克:SCUR)的Sidewinder防火墙和Ironmail邮件网关捧得2006年度《计算机世界》“产品奖”和“解决方案奖”两项类别大奖。
Internationally, the need for federated Identity & Access Management continues to grow, as it allows users to get Single Sign-On access to external resources (a.k.a. Service Providers) using their hom...
At present, it is very difficult to develop a methodology that fulfills all criteria and comprises all security constraints in the successful design of data warehouses. If that methodology were develo...
Toprevent data from being accessed by unauthorized users, it is necessary for Credit Card Transaction Processing(CCTP) systems to use multilevel secure database management systems to control concurren...
This paper describes a new methodology for increasing the security of analog data transmission based on a mixture of the original analog signal with one of the state variables of Rössler chaoti...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...