搜索结果: 1-7 共查到“数据安全与计算机安全 information”相关记录7条 . 查询时间(0.093 秒)
ICITS 2016:9th International Conference on Information Theoretic Security
Key message rates
2016/7/19
This is the ninth in a series of conferences that aims to bring together the leading researchers in the areas of information theory, quantum information theory, and cryptography. ICITS covers all aspe...
The termination insensitive secure information flow problem can be reduced to solving a safety problem via a simple program transformation.Barthe, D’Argenio, and Rezk coined the term “self-composition...
Experimentation with Personal Identifiable Information
Personal Identifiable Information Public Policy Issues Privacy Sensitivity
2013/1/28
In this paper, actual personal identifiable information (PII) texts are analyzed to capture different types of PII sensitivities. The sensitivity of PII is one of the most important factors in determi...
2010国际信息安全及其应用研讨会(International Workshop on Information Security and Applications 2010)
国际计算机与信息科学协会 康科迪亚大学 河北省自然科学基金会 燕山大学 2010 国际信息安全及其应用 研讨会
2010/4/14
第二届国际信息安全及其应用研讨会(IWISA 2010)将于2010年10月22日至25日,在燕山大学(中国秦皇岛)举办。 此次会议由秦皇岛大学(中国)、青岛理工大学(中国)、康科迪亚大学(加拿大)、国际计算机与信息科学协会(ACIS)(美国)、特伦特大学(加拿大)、河北省自然科学基金会(中国)、河北省数学会(中国),河北省工业与应用数学协会(中国)联合举办。此次学术会议旨在加强相关主题的国际学术...
2010 International Conference on Multimedia Information Networking and Security(MINES 2010)
2010 Conference Multimedia Information Networking Security MINES
2010/2/24
We cordially invite you to attend the 2010 International Conference on Multimedia Information Networking and Security (MINES 2010) to be held on November 4–6, 2010 in Nanjing, China. MINES2010 will be...
Information Warfare: using the viable system model as a framework to attack organisations
Information Warfare viable system model framework attack organisations
2009/12/8
Information is the glue in any organization. It is needed for policy, decision-making, control, and co-ordination. If an organisation's information systems are disrupted or destroyed, then damage to t...
Ensuring Authentication of Digital Information using Cryptographic Accumulators
Stream Authentication Polynomial Reconstruction Erasure Channel Adversarial Channel Cryptographic Accumulator
2012/12/3
In this paper, we study the broadcast authentication problem for both erasure and adversarial networks. Two important concerns for authentication protocols are the authentication delay and the packet ...