搜索结果: 1-15 共查到“information security”相关记录15条 . 查询时间(0.078 秒)
复旦大学计算机科学与技术学院信息安全课件 The Intro to Information Security
复旦大学计算机科学与技术学院 信息安全 课件 The Intro to Information Security
2018/7/20
复旦大学计算机科学与技术学院信息安全课件 The Intro to Information Security。
第十三届信息安全与密码学国际会议(The 13th International Conference on Information Security and Cryptology)
第十三届 信息安全与密码学 国际会议
2017/10/24
The 13th China International Conference on Information Security and Cryptology (INSCRYPT 2017) will be held in Xi'an from November 3rd to November 5th, 2017, organized by the State Key Laboratry of In...
2017“质量管理、运输、信息安全、信息技术”国际会议(2017 International Conference "Quality Management,Transport and Information Security, Information Technologies" (IT&QM&IS))
2017 质量管理 运输 信息安全 信息技术 国际会议
2017/8/30
We invite you to participate in the International conference «Quality Management, Transport and Information Security, Information Technologies» (IT&QM&IS-2016). The conference will take plac...
Information Security Applications of Bit-Mixers
Information security cryptography cryptographic hardware
2017/2/20
A Bit-Mixer is a function of fixed size input and output, which computes uncorrelated output from correlated input values, and its behavior is altered by parameters, called keys. Several bit-mixer con...
the 22nd Annual International Conference on the Theory and Applications of Cryptology and Information Security
Cryptology Information Security
2016/7/19
Asiacrypt 2016, the 22nd Annual International Conference on the Theory and Applications of Cryptology and Information Security, will be organized by Vietnam Institute for Advanced Study in Mathematics...
Comment on Quantum Cryptography---Which is More Important, Signal Security, Information Security or Communication Reliability
Signal security information security communication reliability
2016/1/26
Signal security aims to prevent the adversary from copying communication
signals—so it is with quantum cryptography. Information security focuses on
preventing the adversary from knowing plaintext o...
第九届中国信息安全博士论坛(2016China Information Security Doctor Conference,CISDC2016)将于2016年8月在吉林举办。论坛由教育部高等学校信息安全专业教学指导委员会指导,中国信息安全博士网主办,北京艾得威尔信息咨询中心承办。
In this survey, we discuss an emerging concept of decoybased
information security, or security without computational assumptions.
In particular, we show how this concept can be implemented
to provi...
A New Construction Scheme for Information Security Lab
Information Security Laboratory Construction Scheme Extension Services
2013/2/20
At present, it is urgent for us to build fully functional information security laboratory. In this paper, the function and requirements of a new information security lab are analyzed. And a constructi...
CORRELATED FAILURES, DIVERSIFICATION, AND INFORMATION SECURITY RISK MANAGEMENT
research on risk management computer network security management information systems diversification of computer software
2011/10/6
The article presents research on risk management related to computer network security in management information systems. A queuing model is presented to quantify the downtown loss faced by a network i...
2010国际信息安全及其应用研讨会(International Workshop on Information Security and Applications 2010)
国际计算机与信息科学协会 康科迪亚大学 河北省自然科学基金会 燕山大学 2010 国际信息安全及其应用 研讨会
2010/4/14
第二届国际信息安全及其应用研讨会(IWISA 2010)将于2010年10月22日至25日,在燕山大学(中国秦皇岛)举办。 此次会议由秦皇岛大学(中国)、青岛理工大学(中国)、康科迪亚大学(加拿大)、国际计算机与信息科学协会(ACIS)(美国)、特伦特大学(加拿大)、河北省自然科学基金会(中国)、河北省数学会(中国),河北省工业与应用数学协会(中国)联合举办。此次学术会议旨在加强相关主题的国际学术...
An Approach to ensure Information Security through 252-Bit Integrated Encryption System (IES)
encryption security protocol
2009/6/5
In this paper, a block-cipher, Integrated Encryption System (IES), to be implemented in
bit-level is presented that requires a 252-bit secret key. In IES, there exist at most sixteen
rounds to be im...
An Ontology-Driven Approach Applied to Information Security
Information security Security ontologies Security attacks Security defenses
2014/3/11
Software systems have become highly distributed and complex involving independent components working together towards achieving systems’ goals. Meanwhile, security attacks against such systems have in...
The 14th Annual International Conference on the Theory and Application of Cryptology & Information Security(图)
Cryptology Information Security 14th Theory and Application
2008/5/14
December 7 - 11, 2008 Melbourne, Australia
The International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT, is the main annual event organised by Asi...
Identifying Critical Components During Information Security Evaluations
information security computer communications devices security evaluations
2014/3/12
Electronic communications devices intended for government or military applications must be rigorously evaluated to ensure that they maintain data confidentiality. High-grade information security evalu...