搜索结果: 1-8 共查到“军队指挥学 Information Security”相关记录8条 . 查询时间(0.074 秒)
复旦大学计算机科学与技术学院信息安全课件 The Intro to Information Security
复旦大学计算机科学与技术学院 信息安全 课件 The Intro to Information Security
2018/7/20
复旦大学计算机科学与技术学院信息安全课件 The Intro to Information Security。
第十三届信息安全与密码学国际会议(The 13th International Conference on Information Security and Cryptology)
第十三届 信息安全与密码学 国际会议
2017/10/24
The 13th China International Conference on Information Security and Cryptology (INSCRYPT 2017) will be held in Xi'an from November 3rd to November 5th, 2017, organized by the State Key Laboratry of In...
Information Security Applications of Bit-Mixers
Information security cryptography cryptographic hardware
2017/2/20
A Bit-Mixer is a function of fixed size input and output, which computes uncorrelated output from correlated input values, and its behavior is altered by parameters, called keys. Several bit-mixer con...
the 22nd Annual International Conference on the Theory and Applications of Cryptology and Information Security
Cryptology Information Security
2016/7/19
Asiacrypt 2016, the 22nd Annual International Conference on the Theory and Applications of Cryptology and Information Security, will be organized by Vietnam Institute for Advanced Study in Mathematics...
Comment on Quantum Cryptography---Which is More Important, Signal Security, Information Security or Communication Reliability
Signal security information security communication reliability
2016/1/26
Signal security aims to prevent the adversary from copying communication
signals—so it is with quantum cryptography. Information security focuses on
preventing the adversary from knowing plaintext o...
In this survey, we discuss an emerging concept of decoybased
information security, or security without computational assumptions.
In particular, we show how this concept can be implemented
to provi...
An Approach to ensure Information Security through 252-Bit Integrated Encryption System (IES)
encryption security protocol
2009/6/5
In this paper, a block-cipher, Integrated Encryption System (IES), to be implemented in
bit-level is presented that requires a 252-bit secret key. In IES, there exist at most sixteen
rounds to be im...
The 14th Annual International Conference on the Theory and Application of Cryptology & Information Security(图)
Cryptology Information Security 14th Theory and Application
2008/5/14
December 7 - 11, 2008 Melbourne, Australia
The International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT, is the main annual event organised by Asi...