相似文献/References:
[1]黄松 夏洪亚 谈利群.基于模糊综合的信息安全风险评估[J].计算机技术与发展,2010,(01):185.
HUANG Song,XIA Hong-ya,TAN Li-qun.Fuzzy Comprehensive Evaluation for Information Security[J].,2010,(04):185.
[2]郑江云 江巨浪.基于信噪比的自适应双彩色图像水印算法[J].计算机技术与发展,2010,(02):160.
ZHENG Jiang-yun,JIANG Ju-lang.An Algorithm of Adaptive Double Color Digital Image Watermarking Based on SNR[J].,2010,(04):160.
[3]任参 刘少君 黄道平.一种改进的并行签密方案[J].计算机技术与发展,2010,(04):151.
REN Shen,LIU Shao-jun,HUANG Dao-ping.An Improved Parallel Signcryption Scheme[J].,2010,(04):151.
[4]孟祥宏.信息安全攻防博弈研究[J].计算机技术与发展,2010,(04):159.
MENG Xiang-hong.Study on Offence and Defense of Information Security Based on Game Theory[J].,2010,(04):159.
[5]赵锋 曹文杰.医院信息系统访问控制策略设计分析[J].计算机技术与发展,2010,(06):144.
ZHAO Feng,CAO Wen-jie.Design and Analysis of Access Control Strategy for Hospital Information System[J].,2010,(04):144.
[6]杨蕴石 王颖 孙福玉 吕科 赵亚伟.商业银行安全保障体系设计[J].计算机技术与发展,2008,(03):177.
YANG Yun-shi,WANG Ying,SUN Fu-yu,et al.Design on Information Security System for Commercial Bank[J].,2008,(04):177.
[7]刘华春.基于PKI的网上证券交易系统的构建[J].计算机技术与发展,2009,(07):173.
LIU Hua-chun.Implementing a System of On - line Securities Trading Based on PKI Technology[J].,2009,(04):173.
[8]罗佳 杨世平.基于熵权系数法的信息安全模糊风险评估[J].计算机技术与发展,2009,(10):177.
LUO Jia,YANG Shi-ping.Fuzzy Risk Assessment for Information Security Based on Method of Entropy - Weight Coefficient[J].,2009,(04):177.
[9]李超 王红胜 陈军广 孙蕊.加强计算机终端信息安全的两种解决方案[J].计算机技术与发展,2009,(01):165.
LI Chao,WANG Hong-sheng,CHEN Jun-guang,et al.Two Solutions to Strengthen Computer's Terminal Information Security[J].,2009,(04):165.
[10]邓晓军.PKI技术及其应用的分析[J].计算机技术与发展,2008,(06):144.
DENG Xiao-jun.Analysis of PKI Technology and Its Application[J].,2008,(04):144.
[11]胡欣杰,路川. 基于访问控制的涉密信息管理安全解决方案[J].计算机技术与发展,2014,24(08):131.
HU Xin-jie,LU Chuan. A Solution for Management Security of Secret Information Based on Access Controlling[J].,2014,24(04):131.
[12]陈延利[],边巴旺堆[],郭晋丞[],等. 应急通信的安全响应体系研究[J].计算机技术与发展,2015,25(04):108.
CHEN Yan-li[],BIAN Ba-wangdui[],GUO Jin-cheng[],et al. Research on Security Response System of Communication Emergency[J].,2015,25(04):108.
[13]蒋建军. 数字校园网络立体化安全防护的研究[J].计算机技术与发展,2015,25(09):159.
JIANG Jian-jun. Research on Digital Campus Three Dimensional Network Security Protection[J].,2015,25(04):159.
[14]张悦[],郑东[],张应辉[]. 一种基于Diffie-Hellman协议的秘密共享算法[J].计算机技术与发展,2015,25(12):123.
ZHANG Yue[],ZHANG Dong[],ZHANG Ying-hui[][]. A Secret Sharing Algorithm Based on Diffie-Hellman Protocol[J].,2015,25(04):123.
[15]王翔,祁正华,黄海. 不使用双线性对的无证书签密方案[J].计算机技术与发展,2017,27(07):106.
WANG Xiang,QI Zheng-hua,HUANG Hai. A Certificateless Signcryption Scheme without Bilinear Pairing[J].,2017,27(04):106.
[16]刘鹏. 会计电算化系统信息安全集成解决方案[J].计算机技术与发展,2017,27(08):135.
LIU Peng. Integrated Solutions on Information Security for Accounting Computerization System[J].,2017,27(04):135.