期刊文献+
共找到16篇文章
< 1 >
每页显示 20 50 100
电子商务网络信息安全问题 被引量:8
1
作者 崔波 张怀涛 秦柯 《图书馆理论与实践》 CSSCI 北大核心 2003年第2期54-57,共4页
构筑安全电子商务信息环境是网络时代发展到一定阶段的“瓶颈”性课题。本文侧重讨论了其中的信息安全技术、数字认证、信息安全协议。
关键词 电子商务 网络信息安全 信息安全技术 数字认证 信息安全协议 网络安全管理
下载PDF
欧盟与美国达成“信息安全港”协议 被引量:4
2
作者 王辉 《全球科技经济瞭望》 2000年第11期4-5,共2页
关键词 隐私权 执法机制 法律体系 美国 欧盟 信息安全协议 信息产业
下载PDF
电子商务中的信息安全技术比较与分析 被引量:2
3
作者 郭小芳 刘爱军 《商洛学院学报》 2008年第2期74-77,共4页
目的分析各种安全技术的优缺点.方法信息安全技术中的防火墙、加密、认证等技术做了初步的比较,讨论了信息安全对策等核心问题.结果由于电子商务对计算机网络安全与商务安全的双重要求,在计算机互联网上实现电子商务交易时必须保证它的... 目的分析各种安全技术的优缺点.方法信息安全技术中的防火墙、加密、认证等技术做了初步的比较,讨论了信息安全对策等核心问题.结果由于电子商务对计算机网络安全与商务安全的双重要求,在计算机互联网上实现电子商务交易时必须保证它的保密性、完整性、可鉴别性、不可伪造性和不可抵赖性.结论信息安全技术的相互补充是电子商务开放、快捷、安全的保障. 展开更多
关键词 电子商务 防火墙技术 加密技术 信息安全协议
下载PDF
论信息安全与电子商务 被引量:1
4
作者 张涛 《科技信息》 2010年第13X期73-73,共1页
信息是一种以特殊的物质形态存在的实体,它不同于消息,消息只是信息的外壳,而信息则是消息的内核。
关键词 电子商务 网络隐私安全 信息安全协议 P2P技术
下载PDF
谈网络环境下的档案信息安全问题
5
作者 崔伟华 《黑龙江史志》 2012年第7期25-25,共1页
正随着信息技术的飞速发展,信息传输的途径已经越来越依赖于电信网络方式。面对我国互联网的调整发展和政府上网工程的日益深入,网络环境下的档案信息安全问题已经浮出水面。档案信息安全的管理包括安全规划、风险管理、应急计划、安全... 正随着信息技术的飞速发展,信息传输的途径已经越来越依赖于电信网络方式。面对我国互联网的调整发展和政府上网工程的日益深入,网络环境下的档案信息安全问题已经浮出水面。档案信息安全的管理包括安全规划、风险管理、应急计划、安全教育培训、安全系统的评估。 展开更多
关键词 信息安全问题 网络环境下 信息安全协议 档案信息 政府上网工程 风险管理 信息技术 信息传输 安全教育培训 应急计划
下载PDF
网络营销中客户信息的隐私与保护
6
作者 曹秀娟 刘训敏 《商情》 2012年第25期101-101,共1页
随着理财观念的转变和技术的发展,人们购买基金产品越来越依赖网络,因此网络交易安全已成为基金销售发展的核心和关键问题。在利益的驱使下,有的客户在不知情或不情愿的情况下,被企业采取一些技术手段取得和利用其信息,侵犯了客户... 随着理财观念的转变和技术的发展,人们购买基金产品越来越依赖网络,因此网络交易安全已成为基金销售发展的核心和关键问题。在利益的驱使下,有的客户在不知情或不情愿的情况下,被企业采取一些技术手段取得和利用其信息,侵犯了客户的隐私权。对网络隐私权的有效保护,成为基金网络顺利销售的重要条件。网络信息安全技术、信息安全协议、P2P技术成为网络隐私安全保护的有效手段。 展开更多
关键词 网络营销 隐私与保护 网络信息安全协议 P2P技术
下载PDF
多核密码处理器的数据分配控制器研究与设计 被引量:2
7
作者 戴乐育 徐金甫 李伟 《小型微型计算机系统》 CSCD 北大核心 2015年第9期2140-2143,共4页
为了解决在提供复杂多样的高速信息安全服务时日益凸显的数据分配问题,对多核密码处理的数据分配特征进行了分析,设计了多核密码处理器数据分配控制器,实现了多核密码处理器的快速灵活分配.特别针对数据分配控制器任务解析及数据传输的... 为了解决在提供复杂多样的高速信息安全服务时日益凸显的数据分配问题,对多核密码处理的数据分配特征进行了分析,设计了多核密码处理器数据分配控制器,实现了多核密码处理器的快速灵活分配.特别针对数据分配控制器任务解析及数据传输的问题,设计了任务引导单元和快速传输通道.在CMOS 65nm工艺下综合,数据分配控制器的最高时钟频率可达到638M Hz.实验结果证明,本文设计的数据分配控制器具有更高的数据分配效率和灵活性. 展开更多
关键词 信息安全 多核密码处理器 信息安全协议 数据分配控制器 任务引导单元
下载PDF
STRONGER PROVABLE SECURE MODEL FOR KEY EXCHANGE
8
作者 任勇军 王建东 +1 位作者 徐大专 庄毅 《Transactions of Nanjing University of Aeronautics and Astronautics》 EI 2009年第4期313-319,共7页
The key exchange is a fundamental building block in the cryptography. Several provable security models for the key exchange protocol are proposed. To determine the exact properties required by the protocols, a single ... The key exchange is a fundamental building block in the cryptography. Several provable security models for the key exchange protocol are proposed. To determine the exact properties required by the protocols, a single unified security model is essential, The eCK , eCK and CK models are examined and the result is proved that the eCK' model is the strongest provable security model for the key exchange. The relative security strength among these models is analyzed. To support the implication or non-implication relations among these models, the formal proofs and the counter-examples are given. 展开更多
关键词 network security CRYPTOGRAPHY information security key exchange protocol
下载PDF
试论PKI体系下计算机取证的可行性
9
作者 洪卫军 于瑞华 《安全技术防范》 2003年第6期37-39,共3页
本文就PKI的原理、结构、运作方式、以及在此体系中涉及计算机犯罪方面的可能的情况和相应的计算机取证的可行性进行了介绍和讨论。
关键词 计算机犯罪 取证 可行性 PKI体系 公开密钥算法 电子证书 信息安全协议
下载PDF
Research and improvement on packet capture mechanism in linux for high-speed network 被引量:2
10
作者 杨武 方滨兴 +1 位作者 云晓春 张宏莉 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2005年第5期494-498,共5页
With the increasing enlargement of network scale and the rapid development of network techniques, large numbers of the network applications begin to appear. Packet capture plays an important role as one basic techniqu... With the increasing enlargement of network scale and the rapid development of network techniques, large numbers of the network applications begin to appear. Packet capture plays an important role as one basic technique used in each field of the network applications. In a high-speed network, the heavy traffic of network transmission challenges the packet capture techniques. This paper does an in-depth analysis on the traditional packet capture mechanisms in Linux, and then measures the performance bottleneck in the process of packet capture. The methods for improving the packet capture performance are presented and an optimized packet capture scheme is also designed and implemented. The test demonstrates that the new packet capture mechanism (Libpacket) can greatly improve the packet capture performance of the network application systems in a high-speed network. 展开更多
关键词 high-speed network packet capture TCP/IP protocol stack performance bottleneck LKM
下载PDF
The New Enhanced Simple Authenticated Key Agreement Algorithm 被引量:1
11
作者 蒋睿 李建华 潘理 《Journal of Donghua University(English Edition)》 EI CAS 2006年第1期136-139,共4页
Simple authenticated key agrcement algorithm is one of the Diffie-Hellman key agreement variations. It prevents man-inthe-middle attack with only two more packets required to agree on the secret session key, but it ha... Simple authenticated key agrcement algorithm is one of the Diffie-Hellman key agreement variations. It prevents man-inthe-middle attack with only two more packets required to agree on the secret session key, but it has some weaknesses. In this paper, a new enhanced simple authenticated key agreement algorithm is proposed to overcome these weaknesses on the basis of analyzing the weaknesses of the related protocols. The new enhanced simple authenticated key agreement algorithm can get over replay attack and password guessing attack, provide perfect forward secrecy, and hold the merits of the simple authenticated key agreement algorithm. 展开更多
关键词 agreement protocol AUTHENTICATION cryptography.
下载PDF
Network resource allocation attack detection with long range dependence
12
作者 王欣 方滨兴 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2007年第1期74-78,共5页
The approach of traffic abnormality detection of network resource allocation attack did not have reliable signatures to depict abnormality and identify them. However, it is crucial for us to detect attacks accurately.... The approach of traffic abnormality detection of network resource allocation attack did not have reliable signatures to depict abnormality and identify them. However, it is crucial for us to detect attacks accurately. The technique that we adopted is inspired by long range dependence ideas. We use the number of packet arrivals of a flow in fixed-length time intervals as the signal and attempt to extend traffic invariant “self-similarity”. We validate the effectiveness of the approach with simulation and trace analysis. 展开更多
关键词 network resource allocation attack long range dependence Hurst parameter
下载PDF
A Scheme to Share Information via Employing Discrete Algorithm to Quantum States
13
作者 康国栋 方卯发 《Communications in Theoretical Physics》 SCIE CAS CSCD 2011年第2期239-243,共5页
We propose a protocol for information sharing between two legitimate parties (Bob and Alice) via public-key cryptography. In particular, we specialize the protocol by employing discrete algorithm under mod that maps... We propose a protocol for information sharing between two legitimate parties (Bob and Alice) via public-key cryptography. In particular, we specialize the protocol by employing discrete algorithm under mod that maps integers to quantum states via photon rotations. Based on this algorithm, we find that the protocol is secure under various classes of attacks. Specially, owe to the algorithm, the security of the classical privacy contained in the quantum public-key and the corresponding ciphertext is guaranteed. And the protocol is robust against the impersonation attack and the active wiretapping attack by designing particular checking processing, thus the protocol is valid. 展开更多
关键词 discrete algorithm under mod public-key cryptography SECURITY
下载PDF
Three-step three-party quantum secure direct communication 被引量:11
14
作者 Shan-Shan Chen Lan Zhou +1 位作者 Wei Zhong Yu-Bo Sheng 《Science China(Physics,Mechanics & Astronomy)》 SCIE EI CAS CSCD 2018年第9期26-30,共5页
We propose a three-party quantum secure direct communication(QSDC) protocol with hyperentanglement in both spatial-mode and polarization degrees of freedom. The secret message can be encoded independently with desired... We propose a three-party quantum secure direct communication(QSDC) protocol with hyperentanglement in both spatial-mode and polarization degrees of freedom. The secret message can be encoded independently with desired unitary operations in two degrees of freedom. In this protocol, a party can synchronously obtain the other two parties' messages. Compared with previous three-party QSDC protocols, our protocol has several advantages. First, the single photons in our protocol are only required to transmit for three times. This advantage makes this protocol simple and useful. Second, Alice and Bob can send different secret messages to Charlie, respectively. Finally, with hyperentanglement, this protocol has a higher information capacity than other protocols. 展开更多
关键词 quantum communication quantum secure direct communication hyperentanglement
原文传递
Three-step semiquantum secure direct communication protocol 被引量:12
15
作者 ZOU XiangFu QIU DaoWen 《Science China(Physics,Mechanics & Astronomy)》 SCIE EI CAS 2014年第9期1696-1702,共7页
Quantum secure direct communication is the direct communication of secret messages without need for establishing a shared secret key first.In the existing schemes,quantum secure direct communication is possible only w... Quantum secure direct communication is the direct communication of secret messages without need for establishing a shared secret key first.In the existing schemes,quantum secure direct communication is possible only when both parties are quantum.In this paper,we construct a three-step semiquantum secure direct communication(SQSDC)protocol based on single photon sources in which the sender Alice is classical.In a semiquantum protocol,a person is termed classical if he(she)can measure,prepare and send quantum states only with the fixed orthogonal quantum basis{|0,|1}.The security of the proposed SQSDC protocol is guaranteed by the complete robustness of semiquantum key distribution protocols and the unconditional security of classical one-time pad encryption.Therefore,the proposed SQSDC protocol is also completely robust.Complete robustness indicates that nonzero information acquired by an eavesdropper Eve on the secret message implies the nonzero probability that the legitimate participants can find errors on the bits tested by this protocol.In the proposed protocol,we suggest a method to check Eves disturbing in the doves returning phase such that Alice does not need to announce publicly any position or their coded bits value after the photons transmission is completed.Moreover,the proposed SQSDC protocol can be implemented with the existing techniques.Compared with many quantum secure direct communication protocols,the proposed SQSDC protocol has two merits:firstly the sender only needs classical capabilities;secondly to check Eves disturbing after the transmission of quantum states,no additional classical information is needed. 展开更多
关键词 quantum secure direct communication semiquantum complete robustness security
原文传递
A Novel Quantum Covert Channel Protocol Based on Any Quantum Secure Direct Communication Scheme
16
作者 徐淑奖 陈秀波 +1 位作者 钮心忻 杨义先 《Communications in Theoretical Physics》 SCIE CAS CSCD 2013年第5期547-553,共7页
By analyzing the basic properties of unitary transformations used in a quantum secure direct communication (QSDC) protocol, we show the main idea why a covert channel can be established within any QSDC channel which e... By analyzing the basic properties of unitary transformations used in a quantum secure direct communication (QSDC) protocol, we show the main idea why a covert channel can be established within any QSDC channel which employs unitary transformations to encode information. On the basis of the fact that the unitary transformations used in a QSDC protocol are secret and independent, a novel quantum covert channel protocol is proposed to transfer secret messages with unconditional security. The performance, including the imperceptibility, capacity and security of the proposed protocol are analyzed in detail. 展开更多
关键词 quantum information hiding quantum covert channel quantum cryptography quantum communication
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部