相似文献/References:
[1]黄松 夏洪亚 谈利群.基于模糊综合的信息安全风险评估[J].计算机技术与发展,2010,(01):185.
HUANG Song,XIA Hong-ya,TAN Li-qun.Fuzzy Comprehensive Evaluation for Information Security[J].,2010,(12):185.
[2]王茜,朱志祥,史晨昱,等.应用于数据库安全保护的加解密引擎系统[J].计算机技术与发展,2014,24(01):143.
WANG Qian[],ZHU Zhi-xiang[],SHI Chen-yu[],et al.Encryption and Decryption Engine System Applying to Database Security and Detection[J].,2014,24(12):143.
[3]陈丹伟 黄秀丽 任勋益.云计算及安全分析[J].计算机技术与发展,2010,(02):99.
CHEN Dan-wei,HUANG Xiu-li,REN Xun-yi.Analysis of Cloud Computing and Cloud Security[J].,2010,(12):99.
[4]郑江云 江巨浪.基于信噪比的自适应双彩色图像水印算法[J].计算机技术与发展,2010,(02):160.
ZHENG Jiang-yun,JIANG Ju-lang.An Algorithm of Adaptive Double Color Digital Image Watermarking Based on SNR[J].,2010,(12):160.
[5]任参 刘少君 黄道平.一种改进的并行签密方案[J].计算机技术与发展,2010,(04):151.
REN Shen,LIU Shao-jun,HUANG Dao-ping.An Improved Parallel Signcryption Scheme[J].,2010,(12):151.
[6]孟祥宏.信息安全攻防博弈研究[J].计算机技术与发展,2010,(04):159.
MENG Xiang-hong.Study on Offence and Defense of Information Security Based on Game Theory[J].,2010,(12):159.
[7]赵锋 曹文杰.医院信息系统访问控制策略设计分析[J].计算机技术与发展,2010,(06):144.
ZHAO Feng,CAO Wen-jie.Design and Analysis of Access Control Strategy for Hospital Information System[J].,2010,(12):144.
[8]杨蕴石 王颖 孙福玉 吕科 赵亚伟.商业银行安全保障体系设计[J].计算机技术与发展,2008,(03):177.
YANG Yun-shi,WANG Ying,SUN Fu-yu,et al.Design on Information Security System for Commercial Bank[J].,2008,(12):177.
[9]刘华春.基于PKI的网上证券交易系统的构建[J].计算机技术与发展,2009,(07):173.
LIU Hua-chun.Implementing a System of On - line Securities Trading Based on PKI Technology[J].,2009,(12):173.
[10]罗佳 杨世平.基于熵权系数法的信息安全模糊风险评估[J].计算机技术与发展,2009,(10):177.
LUO Jia,YANG Shi-ping.Fuzzy Risk Assessment for Information Security Based on Method of Entropy - Weight Coefficient[J].,2009,(12):177.
[11]严霄凤,张德馨.大数据研究[J].计算机技术与发展,2013,(04):168.
YAN Xiao-feng,ZHANG De-xin.Big Data Research[J].,2013,(12):168.