期刊文献+

现代密码技术的应用局限 被引量:10

下载PDF
导出
摘要 安全信息系统是当前国际社会关注热点。首先强调现代密码技术在信息安全中的核心地位。从构作安全信息系统的三个基本公设入手,研究和探讨现代密码技术在信息安全应用中存在的局限性和面临的挑战。
作者 吕述望 王挺
出处 《计算机应用研究》 CSCD 2000年第7期10-11,31,共3页 Application Research of Computers
  • 相关文献

参考文献13

  • 11,Shannon,C.E. Communication Theory of Secrecy System, Bell System Technical Journal, Vol.28, pp.656~715,1949
  • 22,W. Diffie and M.E. Hellman, New Directions in Cryptography, IEEE Transactions in Information Theory, volume IT-22, pp.644~654, November 1976
  • 33,NBS, Data Encryption Standard, FIPS PUB46, National Bureau of Standards, Washington, D.C., Jan.1977
  • 44,Agnew,G.B. Random Sources for Cryptographic Systems, Advances in Cryptology-EUROCRYPT'87 Proceedings, pp.77~81, Springer-Verlag, 1988
  • 55,Miche MOULY, Marie-Bernadette PAUTET, The GSM System for Mobile Communication, 1992
  • 66,National Institute of Standards and Technology, Announcing Request For Candidate Algorithm Nominations for The Advanced Encryption Standard (AES)
  • 77,Dr. Bill Hancock, CISSP, Elliptical Curve Cryptography and Standards for Efficient Cryptography Group, Computers & Security, pp.4~15, 18(1999)
  • 88,ANSI X9.62, Public Key Cryptography for the Financial Services Industry - the Elliptic Curve Digital Signature Algorithm (ECDSA), draft, 1997
  • 99,ANSI X9.63, Public Key Cryptography for the Financial Services Industry - Elliptic Curve Key Agreement and Transport Protocols, draft, 1997
  • 1010,IEEE P1363, Standard Specifications for Public-Key Cryptography, draft, 1997

同被引文献28

  • 1宣蕾,吴泉源.如何防范口令攻击[J].电脑与信息技术,1999(5):16-19. 被引量:2
  • 2苏文新,郑东.一种基于一次性口令和指纹识别的身份认证方案[J].计算机工程,2004,30(B12):297-299. 被引量:2
  • 3沈昌祥,张焕国,冯登国,曹珍富,黄继武.信息安全综述[J].中国科学(E辑),2007,37(2):129-150. 被引量:358
  • 4Paul DuBois.MySQL网络数据库指南[M].北京:机械工业出版社,2000..
  • 5Meriko Kaeo.网络安全性设计[M].北京:人民邮电出版社,2000..
  • 6[1]Allen B. Hamilton:Information Assurance Technical Framework Release 3.0 [R]. National security agency information assurance solution technical directors, 2000.
  • 7[5]Srinivasan V, Varghese G. Fast and Scalable Layer Four Switching[A]. Proceedings of ACM SIGCOMM98[C],1998.191-202.
  • 8[6]McQuillan J. Layer 4 Switching[J]. Data Communications, 1997,(10).
  • 9[7]LaPadula LJ, Bell DE. Secure Computer Systems: A Mathematical Model[EB/OL]. http://citeseer.ist.psu.edu/529524.html,2004-03.
  • 10[8]LaPadula LJ, Bell DE. Secure Computer Systems: Mathematical Foundations[EB/OL]. http://citeseer.ist.psu.edu/548063.html,2004-03.

引证文献10

二级引证文献49

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部