Quantcast
Channel: IT Research Paper » Information security
Browsing latest articles
Browse All 11 View Live

The Application of Unifled Authentication in Digitized Campus

As the state has invested heavily in education, the Ministry of Education has pointed out”Building Digital Campus project resolution”, in recent years the development of the university network also...

View Article



Research on Rootkit Detection Based on the Analysis of Physical Memory and...

Information technology has greatly promoted the progress of human society, but it also has brought the issue of computer crime. Hacking, Internet fraud, Internet pornography cases affected the healthy...

View Article

Study on Information Security for Resource Management System of Multisource...

As the rapid development of the technology of multi-source remote sensing, the application of remote sensing data has been used widely. This paper will research on network security of multi-source...

View Article

Digital Information Resources System Security Risk Assessment

With the rapid development of information technology and the degree of social information,information systems and networks have become an essential part of social production.Moreover, the application...

View Article

Digital Information Resources System Security Risk Assessment

With the rapid development of information technology and the degree of social information,information systems and networks have become an essential part of social production.Moreover, the application...

View Article


Research of the Rational Secret Sharing Technology

Secret sharing is an important tool for the data privacy and the communicationsecurity, and it plays an important role in protecting important information andsecret data from being lost, destroyed or...

View Article

Analysis and Design of the Information Security Management Metrics Scheme for...

With the rapid development of information technology, improvement in the level of enterprise information, the vulnerability of information systems is more and more prominent, security issues is...

View Article

The Design and Implementation of Trusted Server

With the growing popularity of computer and internet, sensitive information and classified information is also faced with growing security threat. Computer viruses, Trojans, spyware and other forms of...

View Article


Design and Practice of the Security Alarm System of the Campus Network

As a key infrastructure in the university, Campus network takes on the responsibility for the scientific research, teaching, foreign exchange and management. The security situation in the information...

View Article


The Research on Format-Preserving Encryption of Database

With the rapid development of the computer field, the security of database is increasingly important, especially for sensitive data protection requirements. There is a wide range of Database system...

View Article
Browsing latest articles
Browse All 11 View Live




Latest Images