期刊文献+

高职院校的网络技术与安全管理 被引量:1

下载PDF
导出
摘要 高职院校作为我国新时期经济建设的重要人才培养基地,备受社会各界的关注,计算机对大学生的影响可以说是无处不在,在为人们的生活提供便利之外也产生了很多安全管理方面的问题,高职院校的网络技术和安全管理问题应该引起广泛的关注。为了使高职院校计算机网络安全得到保障,为大学生提供一个良好的网络学习空间,拓展大学生知识范围,本文分析了我国高等职业院校在计算机网络技术和安全管理中的主要存在问题,对于如何改善这些存在的问题提出了一些措施。
作者 谢永文
出处 《电子技术与软件工程》 2018年第5期225-225,共1页 ELECTRONIC TECHNOLOGY & SOFTWARE ENGINEERING
  • 相关文献

参考文献2

二级参考文献16

  • 1BONEH D, CRESCENZO G D, OSTROVSKY R, et al. Public Key Encryption with Keyword Search[C]//INTERNATIONAL ASSOCIATION FOR CRYPTOLOGIC RESEARCH. International Conference on the Theory and Applications of Cryptographic Techniques, May 2-6, 2004, Interlaken, Switzerland. Heidelberg: Springer, 2004: 506-522.
  • 2RHEE H S, PARK J H, SUSILO W, et al. Trapdoor Security in a Searchable Public-key Encryption Scheme with a Designated Tester[J]. Journal of Systems and Software, 2010, 83(5): 763-771.
  • 3ZHAO Yuanjie, CHEN Xiaofeng, MA Hua, et al. A New Trapdoor- indistinguishable Public Key Encryption with Keyword Search[J]. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 2012, 3(1/2): 72-81.
  • 4LI Jin, WANG Qian, WANG Cong, et al. Fuzzy Keyword Search over Encrypted Data in Cloud Computing[C]//IEEE. 29th Conference on Information Communications, March 14-19, 2010, San Diego. Washington: IEEE, 2010: 1-5.
  • 5BAEK J, SAFAVI-NAINI R, SUSILO W. Public Key Encryption with Keyword Search Revisited[C]//Advanced Science Research Center. Computational Science and Its Applications-ICCSA 2008, June 30-July 3, 2008, Perugia, Italy. Heidelberg: Springer, 2008: 1249-1259.
  • 6LIU Qin, WANG Guojun, WU Jie. An Efficient Privacy Preserving Keyword Search Scheme in Cloud Computing[C]//IEEE. 2009 International Conference on Computational Science and Engineering, August 29-31, 2009, Vancouver, BC. Washington: IEEE, 2009: 715-720.
  • 7RHEE H S, SUSILO W, KIM H J. Secure Searchable Public Key Encryption Scheme Against Keyword Guessing Attacks[J]. IEICE Electronics Express, 2009, 6(5): 237-243.
  • 8LIMing, YU Shucheng, CAO Ning, et al. Authorized Private Keyword Search over Encrypted Data in Cloud Computing[C]// IEEE. 31st International Conference on Distributed Computing Systems (ICDCS), June 20-24, 2011, Minneapolis, MN. Washington: IEEE, 2011: 383-392.
  • 9LIChen, LU Jiaheng, LU Yiming. Effcient Merging and Filtering Algorithms for Approximate String Searches[C]//IEEE. 24th International Conference on Data Engineering, April 7-12, 2008, Cancun. Washington: IEEE, 2008: 257-266.
  • 10MENEZES A J, OKAMOTO T, VANSTONE S A. Reducing Elliptic Curve Logarithms to Logarithms in a Finite Field[J]. Information Theory, IEEE Transactions on, 1993, 39(5): 1639-1646.

共引文献48

同被引文献6

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部