检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:SHEN ChangXiang ZHANG HuangGuo FENG DengGuo CAO ZhenFu HUANG JiWu
机构地区:[1]Computing Technology Institute of China Navy, Beijing 100841, China [2]School of Computer,Wuhan University, Wuhan 430072, China [3]Institute of Software, Chinese Academy of Sciences, Beijing 100080, China [4]Department of Computer Science and Technology, Shanghai Jiaotong University, Shanghai 200030,China [5]Information Technology Institute, Zhongshan University, Guangzhou 510275, China
出 处:《Science in China(Series F)》2007年第3期273-298,共26页中国科学(F辑英文版)
基 金:the National Natural Science Foundation of China(Grant Nos.60373087,60673071and 60572155);the National High-Tech Development 863 Progranm of China(Grant No.2006AA01Z442)
摘 要:The 21st century is the age of information when information becomes an important strategic resource. The information obtaining, processing and security guarantee capability are playing critical roles in comprehensive national power, and information security is related to the national security and social stability. Therefore, we should take measures to ensure the information security of our country. In recent years, momentous accomplishments have been obtained with the rapid development of information security technology. There are extensive theories about information security and technology. However, due to the limitation of length, this article mainly focuses on the research and development of cryptology, trusted computing, security of network, and information hiding, etc.
关 键 词:information security CRYPTOLOGY trusted computing network security information hiding
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:216.73.216.249