期刊文献+
共找到7,744篇文章
< 1 2 250 >
每页显示 20 50 100
Influence of Quantum Information Technology on International Security
1
作者 ZHAO Dongqian 《International Relations and Diplomacy》 2024年第1期26-33,共8页
Humanity is currently undergoing the fourth industrial revolution,characterized by advancements in artificial intelligence,clean energy,quantum information technology,virtual reality,and biotechnology.This technologic... Humanity is currently undergoing the fourth industrial revolution,characterized by advancements in artificial intelligence,clean energy,quantum information technology,virtual reality,and biotechnology.This technological revolution is poised to have a profound impact on the world.Quantum information technology encompasses both quantum computing and the transmission of quantum information.This article aims to integrate quantum information technology with international security concerns,exploring its implications for international security and envisioning its groundbreaking significance. 展开更多
关键词 quantum information technology quantum communication quantum computing international security
下载PDF
Cutting-Edge Challenges in Communication Technology and Computer Network Security
2
作者 Haikang Gu 《Journal of Electronic Research and Application》 2024年第5期26-31,共6页
The rapid development of communication technology and computer networks has brought a lot of convenience to production and life,but it also increases the security problem.Information security has become one of the sev... The rapid development of communication technology and computer networks has brought a lot of convenience to production and life,but it also increases the security problem.Information security has become one of the severe challenges faced by people in the digital age.Currently,the security problems facing the field of communication technology and computer networks in China mainly include the evolution of offensive technology,the risk of large-scale data transmission,the potential vulnerabilities introduced by emerging technology,and the dilemma of user identity verification.This paper analyzes the frontier challenges of communication technology and computer network security,and puts forward corresponding solutions,hoping to provide ideas for coping with the security challenges of communication technology and computer networks. 展开更多
关键词 Communication technology Computer network security
下载PDF
A Practical Study of Big Data Technology in Computer Network Information Security Processing
3
作者 Kongduo Xing 《Journal of Electronic Research and Application》 2023年第6期36-41,共6页
In recent years,China has witnessed continuous development and progress in its scientific and technological landscape,with widespread utilization of computer networks.Concurrently,issues related to computer network in... In recent years,China has witnessed continuous development and progress in its scientific and technological landscape,with widespread utilization of computer networks.Concurrently,issues related to computer network information security,such as information leakage and virus invasions,have become increasingly prominent.Consequently,there is a pressing need for the implementation of effective network security measures.This paper aims to provide a comprehensive summary and analysis of the challenges associated with computer network information security processing.It delves into the core concepts and characteristics of big data technology,exploring its potential as a solution.The study further scrutinizes the application strategy of big data technology in addressing the aforementioned security issues within computer networks.The insights presented in this paper are intended to serve as a valuable reference for individuals involved in the relevant fields,offering guidance on effective approaches to enhance computer network information security through the application of big data technology. 展开更多
关键词 Big data technology Computer network Information security
下载PDF
Global and International Security Under Spatial Grasp Paradigm
4
作者 Peter Simon Sapaty 《International Relations and Diplomacy》 2024年第2期72-85,共14页
Global and international security cannot be provided from a single point or a set of separate points whatever powerful these might be(even with quantum supercomputers!).It should rather be deeply embedded and integrat... Global and international security cannot be provided from a single point or a set of separate points whatever powerful these might be(even with quantum supercomputers!).It should rather be deeply embedded and integrated with bodies of real systems wherever in physical,virtual,or combined spaces they may exist.So global security capabilities should not only be distributed,but rather be really spatial,self-organized,and dynamic,also exhibiting overall integrity,awareness,and consciousness features.The paper describes applicability of the patented and revealed in 10 books Spatial Grasp Model and Technology(SGT)and its basic Spatial Grasp Language(SGL)which conceptually and functionally match security problems of large distributed and heterogeneous systems.It investigates very practical security solutions for finding and tracing distribution of forbidden items,world roaming criminals,recovery from natural and human-made disasters,tracing and elimination of moving dangerous objects in terrestrial and celestial spaces,as well as analysis and restoration of damaged transport networks.It advises how different security infrastructures can be organized and managed,and how to cooperate and integrate within global security systems with higher awareness and consciousness levels over them.The provided security-oriented version of SGL can be quickly implemented and integrated with existing distributed management and security systems. 展开更多
关键词 global security international security critical infrastructures Spatial Grasp technology Spatial Grasp Language distributed language interpretation self-recovering security scenarios global security awareness and consciousness
下载PDF
Ensuring Security and Privacy in the Internet of Things: Challenges and Solutions
5
作者 Nur Mohammad Rabeya Khatoon +3 位作者 Sadia Islam Nilima Jahanara Akter Md Kamruzzaman Hasan Mahmud Sozib 《Journal of Computer and Communications》 2024年第8期257-277,共21页
The Internet of Things (IoT) represents a revolutionary paradigm, enabling a vast array of devices to be ubiquitously interconnected via the Internet, thereby facilitating remote control and management of these device... The Internet of Things (IoT) represents a revolutionary paradigm, enabling a vast array of devices to be ubiquitously interconnected via the Internet, thereby facilitating remote control and management of these devices. This pervasive integration into daily life brings significant convenience but also raises substantial concerns regarding the security of personal data collected and stored online. As the number of connected devices grows, the urgency to address privacy and security issues becomes paramount. IoT systems are particularly susceptible to threats that could compromise consumer privacy and security, affecting their practical deployment. Recent research efforts have focused on enhancing the security of IoT devices, including the exploration of blockchain technologies to mitigate these concerns. This paper aims to elucidate the security and privacy challenges inherent in IoT systems by examining vulnerabilities at each layer of the IoT protocol stack. It identifies key security requirements and reviews existing solutions designed to protect IoT systems from a layered perspective, thereby providing a comprehensive overview of the current landscape of IoT security and highlighting the critical need for robust security measures as the adoption of IoT continues to expand. 展开更多
关键词 IOT security PRIVACY Blockchain technologies Layered Perspective
下载PDF
Analysis of Grain Storage Security Countermeasures under the New Normal Condition with "Grain Storage Technology" as the Core 被引量:6
6
作者 Xingang ZHAO Shengzhong DONG +3 位作者 Hongwei MA Zhaohuan WEN Xiufeng SHAN Peng MAO 《Agricultural Science & Technology》 CAS 2017年第10期1971-1974,共4页
Grain storage security is big issue related to national economy and the people's livelihood, as well as one of the most important strategic requirements in China. Under the background of grain supply-side structural ... Grain storage security is big issue related to national economy and the people's livelihood, as well as one of the most important strategic requirements in China. Under the background of grain supply-side structural reform, this paper analyzed the grain storage security countermeasures under the new normal conditions with "grain storage technology", one of the national grain security strategies of China during the 13th Five-year Plan, as the guiding ideology, from the perspectives of scientific technologies, policy supports, government supports and talent construction, so as to provide supports for the storage enterprises with vulnerable technological links. In addition, the food security issues discussed in this paper could be a helping hand in improving people's living quality, enhancing grain storage ecological quality, promoting grain green storage quality security, and be of important and profound strategic significance to enhance the macro-control capability of the government, maintain social stability and people's health. 展开更多
关键词 Grain storage technology Grain storage security Countermeasure analysis
下载PDF
Hybrid rice technology for food security in the world 被引量:10
7
作者 YUAN Long-ping(China National Hybrid Rice R & D Center,Changsha,Hunan,410125,China) 《作物研究》 2004年第4期185-186,共2页
关键词 Hybrid rice technology for food security in the world LINE
下载PDF
Reform of the Course System of Network Security Theory and Technology for Foreign Students in China
8
作者 Hu Xiong Jinhao Chen +1 位作者 Yang Zhao Zhiguang Qin 《计算机教育》 2020年第12期49-52,共4页
Theory and technology of network security is the core course of information security major,however,it still faces many challenges in the education of foreign graduate students studying in China.This paper analyzes the... Theory and technology of network security is the core course of information security major,however,it still faces many challenges in the education of foreign graduate students studying in China.This paper analyzes the status quo and existing problems in the course of theory and technology of network security for foreign graduate students studying in China,the most fundamental of which is that the existing teaching materials are difficult to meet the needs of foreign graduate students.In view of the problem,this paper discusses how to improve the existing teaching materials to adapt to the teaching needs for foreign students and puts forward some new ideas and reform measures. 展开更多
关键词 theory and technology of network security REFORM education of foreign graduate students
下载PDF
Application Strategy of Data Encryption Technology in Computer Network Security
9
作者 Yuantian Zhang Wei Yang Zhongxi Zhang 《Journal of Electronic Research and Application》 2018年第5期7-10,共4页
In the context of the information age,on the basis of the convenience of computer networks,security issues have gradually emerged.The data encryption technology is reasonably applied in the process of computer network... In the context of the information age,on the basis of the convenience of computer networks,security issues have gradually emerged.The data encryption technology is reasonably applied in the process of computer network security practice,which promotes the safe and reliable operation of the computer network to a certain extent.Based on this,our article regards data encryption technology as the main research object,focusing on its specific application in computer network security. 展开更多
关键词 COMPUTER NETWORK security DATA ENCRYPTION technology application STRATEGY
下载PDF
A Research on the Application of Virtual Network Technology in Computer Network Security
10
作者 Kun Qi 《Journal of Electronic Research and Application》 2022年第4期1-6,共6页
In the computer field,network security is a crucial integrant.It is necessary to pay attention on the application of virtual network technology,so as to raise the standard of computer network security to a new level[2... In the computer field,network security is a crucial integrant.It is necessary to pay attention on the application of virtual network technology,so as to raise the standard of computer network security to a new level[2].In view of this,this paper will analyze the application of virtual network technology in computer network security and propose some strategies for future reference. 展开更多
关键词 Virtual network technology Computer network security Application research
下载PDF
Modified Elliptic Curve Cryptography Multi-Signature Scheme to Enhance Security in Cryptocurrency 被引量:1
11
作者 G.Uganya Radhika Baskar 《Computer Systems Science & Engineering》 SCIE EI 2023年第4期641-658,共18页
Internet of Things(IoT)is an emerging technology that moves the world in the direction of smart things.But,IoT security is the complex problem due to its centralized architecture,and limited capacity.So,blockchain tec... Internet of Things(IoT)is an emerging technology that moves the world in the direction of smart things.But,IoT security is the complex problem due to its centralized architecture,and limited capacity.So,blockchain technology has great attention due to its features of decentralized architecture,transparency,immutable records and cryptography hash functions when combining with IoT.Cryptography hash algorithms are very important in blockchain technology for secure transmission.It converts the variable size inputs to a fixed size hash output which is unchangeable.Existing cryptography hash algorithms with digital signature have issues of single node accessibility and accessed up to 128 bytes of key size only.As well as,if the attacker tries to hack the key,it cancels the transaction.This paper presents the Modified Elliptic Curve Cryptography Multi Signature Scheme(MECC-MSS)for multiple node accessibility by finding nearest path for secure transaction.In this work,the input key size can be extended up to 512 bytes to enhance the security.The performance of the proposed algorithm is analyzed with other cryptography hash algorithms like Secure Hashing Algorithms(SHAs)such as SHA224,SHA256,SHA384,SHA512,SHA3-224,SHA3-256,SHA3-384,SHA3-512 and Message Digest5 by one-way analysis of variance test in terms of accuracy and time complexity.Results show that the MECC-MSS achieves 90.85%of accuracy and time complexity of 1.4 nano seconds with significance less than 0.05.From the statistical analysis,it is observed that the proposed algorithm is significantly better than other cryptography hash algorithms and also having less time complexity. 展开更多
关键词 Internet of things blockchain technology secure hash algorithm ACCURACY time complexity
下载PDF
Evolving National Security: A Roadmap from Present to Future in Renewable and Nonrenewable Energy Policies (A Technical Review) 被引量:1
12
作者 Bahman Zohuri 《Journal of Energy and Power Engineering》 2023年第3期102-108,共7页
This comprehensive exploration delves into the intricate dynamics of national security policies in the realm of renewable and nonrenewable energy sources.From the present landscape characterized by the diversification... This comprehensive exploration delves into the intricate dynamics of national security policies in the realm of renewable and nonrenewable energy sources.From the present landscape characterized by the diversification of energy portfolios to the long-term vision encompassing nuclear fusion,this article navigates through the nuanced interplay of technology,resilience,and environmental responsibility.The synthesis of established nuclear fission technologies and evolving renewable sources forms the cornerstone of a strategic approach,addressing challenges and opportunities to ensure a secure,sustainable energy future. 展开更多
关键词 National security policy renewable energy nonrenewable energy nuclear fission nuclear fusion energy resilience sustainability technological innovation environmental responsibility global collaboration.
下载PDF
Promoting the Empowerment of Science and Technology to Ensure Food Safety Production:A Case Study of Huizhou City
13
作者 Liqing WANG Cijizhuoma Zhenchang LIU 《Asian Agricultural Research》 2023年第1期8-9,12,共3页
The current situation of grain production in Huizhou City was analyzed firstly,and then the existing problems and challenges of grain safety production were pointed out,such as increases in the pressure to ensure grai... The current situation of grain production in Huizhou City was analyzed firstly,and then the existing problems and challenges of grain safety production were pointed out,such as increases in the pressure to ensure grain safety production and the difficulty of stable development of grain production.Finally,several countermeasures and suggestions for the stable development of grain production were put forward. 展开更多
关键词 Food security Huizhou City Science and technology Grain production capacity
下载PDF
Key Technologies of Wireless Heterogeneous Network Security 被引量:2
14
作者 Wu Meng,Ji Lina,Wang Kun(Nanjing University of Posts and Telecommunications,Nanjing 210003,China) 《ZTE Communications》 2008年第3期34-39,共6页
Convergence and collaboration of heterogeneous networks in the next generation public mobile networks will be a subject of universal significance. Convergence of heterogeneous networks, as an effective approach to imp... Convergence and collaboration of heterogeneous networks in the next generation public mobile networks will be a subject of universal significance. Convergence of heterogeneous networks, as an effective approach to improve the coverage and capacity of public mobile network, to enable communication services, to provide Internet access and to enable mobile computing from everywhere, has drawn widespread attention for its good prospects in application. Construction of security system for wireless heterogeneous networks and development of new security models, key security techniques and approaches are critical and mandatory in heterogeneous networks development. Key technology of wireless heterogeneous networks security covers security routing protocol, access authentication, intrusion detection system, cooperative communication between nodes, etc. 展开更多
关键词 Key technologies of Wireless Heterogeneous Network security NODE WLAN
下载PDF
Scientific and Technological Innovation Is an Important Approach to Ensuring China’s Oil Security
15
作者 Liu Qianru Wang Jianyong 《Petroleum Science》 SCIE CAS CSCD 2006年第4期74-77,共4页
With the rapid and continual growth of national economy, the gap between oil demand and supply keeps widening in China, therefore China will increasingly depend on imported oil. However, the world's oil and gas resou... With the rapid and continual growth of national economy, the gap between oil demand and supply keeps widening in China, therefore China will increasingly depend on imported oil. However, the world's oil and gas resources are unevenly distributed; global world's oil prices remain high; and over 70 percent of China's imported oil has to be shipped through the Malacca Strait. There are various ways to ensure China's oil security today, and the practical and feasible strategic option is to increase the discovery and production of domestic oil, raise energy efficiency and develop petroleum substitutes. Scientific and technological innovation is crucial both in new oil reserves discovery and production, energy conservation, and in the development of petroleum substitutes, establishment of a strategic oil reserve system and for environment protection. This indicates that China should take effective measures in investment strategy, fiscal policies, financing instruments, intellectual property protection, fostering talents and professionals, so as to establish its own scientific and technological innovation system in the petroleum industry and be better able to ensure oil security. 展开更多
关键词 China's economy oil security scientific and technological innovation energy conservation energy intensity
下载PDF
Study on Security Technologies for Wireles Network Integration
16
作者 Feng Min (Department of Communication Engineering, Nanjing University of Posts and Telecommunications, Nanjing 210003, China) 《ZTE Communications》 2006年第2期43-47,共5页
The network integration provides users with a new network with long connection time and a high data rate when needed, but it also brings the defects of all the networks that integrate together into the integrated netw... The network integration provides users with a new network with long connection time and a high data rate when needed, but it also brings the defects of all the networks that integrate together into the integrated network. This will cause all kinds of existing and some new security problems in the operation of the integrated network. A complete protection based on recovery is proposed in the paper. It uses the public-key algorithm to authorize and private-key algorithm to encrypt the communicating data. This solution can provide the system with reliable security, and avoid Denial of Service (DoS) of the user. This solution has been proposed lately, and we should further identify the correct action of all the layers and figure out how to react when a legal node is framed by multiple malicious nodes. 展开更多
关键词 security USA WLAN NODE IEEE IPSEC Study on security technologies for Wireles Network Integration
下载PDF
Security Technologies for NGN
17
作者 Teng Zhimeng Wu Bo Wei Yinxing(Central Research Institute of ZTE Corporation,Nanjing 210012,China) 《ZTE Communications》 2007年第4期27-32,共6页
With the development of NGN technologies and everything over IP,network security has become an important part of the current network.The 3 layers by 3 planes by 8 dimensions security architecture defined by ITU X.805 ... With the development of NGN technologies and everything over IP,network security has become an important part of the current network.The 3 layers by 3 planes by 8 dimensions security architecture defined by ITU X.805 for systems providing end-to-end communications is the basis of the research and application of network security technologies.NGN has several security requirements including security strategy,authentication,authorization,access control and audit,time stamp and time source.NGN divides the network into different security areas in both logical and physical ways,and there are different security strategies for different areas.Through the security mechanisms of identification,authentication and authorization,transmit security,access control,audit and supervision,etc,the security requirements of the network would be realized. 展开更多
关键词 NGN TTD security technologies for NGN
下载PDF
Globalization and National Scientific and Technological Security
18
作者 Pan Zhengxiang is Associate Professor & PhD at School of Humanities, University of Science and Technology of China. Yang Yinghui is a postgraduate at School of Humanities, University of Science and Technology of China. 《China International Studies》 2007年第4期159-174,共16页
Now, the world has entered an era of accelerated globalization, which has brought the question of national scientific
关键词 Globalization and National Scientific and technological security HIGH
下载PDF
Food security from an environmental and technological point of view
19
作者 SU Li CHEN Fan 《Journal of Agricultural Science and Technology》 2009年第1期42-50,共9页
This article focuses on technology's enormous impacts in solving food security. Over the past several decades technology has made an important contribution to Chinese food production, and it will continue to have the... This article focuses on technology's enormous impacts in solving food security. Over the past several decades technology has made an important contribution to Chinese food production, and it will continue to have the widest impact on food security in China. The relationship between technology and environment is discussed in this article. It is suggested that technology is significantly related to the theme of sustainable Agriculture, and technology can achieve food security. 展开更多
关键词 food security technology ENVIRONMENT sustainable agriculture
下载PDF
IP Security协议分析及VPN建设探讨 被引量:1
20
作者 陈世清 《湖南工程学院学报(自然科学版)》 2002年第4期54-56,59,共4页
VPN是实现在公网上安全传输和私有网络信息的一种技术 .IPSec是新一代互连网安全标准。结合IPSec协议标准 ,研究基于IPSec的VPN技术及实现 ,指出IPSec在VPN安全性方面的重要作用 ,对提高网络的安全性和可靠性 。
关键词 IP security协议 VPN IPSEC协议 网络安全 虚拟专用网 隧道技术 网络建设
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部