The Application of Unifled Authentication in Digitized Campus
As the state has invested heavily in education, the Ministry of Education has pointed out”Building Digital Campus project resolution”, in recent years the development of the university network also...
View ArticleResearch on Rootkit Detection Based on the Analysis of Physical Memory and...
Information technology has greatly promoted the progress of human society, but it also has brought the issue of computer crime. Hacking, Internet fraud, Internet pornography cases affected the healthy...
View ArticleStudy on Information Security for Resource Management System of Multisource...
As the rapid development of the technology of multi-source remote sensing, the application of remote sensing data has been used widely. This paper will research on network security of multi-source...
View ArticleDigital Information Resources System Security Risk Assessment
With the rapid development of information technology and the degree of social information,information systems and networks have become an essential part of social production.Moreover, the application...
View ArticleDigital Information Resources System Security Risk Assessment
With the rapid development of information technology and the degree of social information,information systems and networks have become an essential part of social production.Moreover, the application...
View ArticleResearch of the Rational Secret Sharing Technology
Secret sharing is an important tool for the data privacy and the communicationsecurity, and it plays an important role in protecting important information andsecret data from being lost, destroyed or...
View ArticleAnalysis and Design of the Information Security Management Metrics Scheme for...
With the rapid development of information technology, improvement in the level of enterprise information, the vulnerability of information systems is more and more prominent, security issues is...
View ArticleThe Design and Implementation of Trusted Server
With the growing popularity of computer and internet, sensitive information and classified information is also faced with growing security threat. Computer viruses, Trojans, spyware and other forms of...
View ArticleDesign and Practice of the Security Alarm System of the Campus Network
As a key infrastructure in the university, Campus network takes on the responsibility for the scientific research, teaching, foreign exchange and management. The security situation in the information...
View ArticleThe Research on Format-Preserving Encryption of Database
With the rapid development of the computer field, the security of database is increasingly important, especially for sensitive data protection requirements. There is a wide range of Database system...
View Article
More Pages to Explore .....