期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
Design and Implementation of Security Solution for Computer Network
1
作者 Lihui SONG Haicun ZHAO 《International Journal of Technology Management》 2015年第5期75-78,共4页
This article analyzes the problem of computer network security, and design scheme of the network security system. The scheme uses advanced network security technologies, includes a complete set of physical isolation, ... This article analyzes the problem of computer network security, and design scheme of the network security system. The scheme uses advanced network security technologies, includes a complete set of physical isolation, desktop system security, virus protection, identity authentication, access control, information encryption, message integrity check, non-repudiation, security audit, intrusion detection, vulnerability scanning, electromagnetic leakage emission protection, security management and other security technology and management measures, the purpose is to establish a complete, multi-level three-dimensional, network security defense system. 展开更多
关键词 Network security FIREWALL Intrusion detection Security audit
下载PDF
钱君匋先生往来鸿雁录选
2
作者 徐正濂 《书法》 2007年第11期82-84,共3页
钱君甸先生往来鸿雁录(黄宾虹)录文怒庵先生文席:日昨大驾惠临,诸多简晢,猥蒙贤伉俪垂青,伴宴湖楼,兼荷厚贶,感恧无已。顷颂教言,欣悉安抵申江,复饶清兴,评骘旧画,卓识高超。吴门四家,前三百年论者已谓文、沈易得,唐、仇难求,敝箧所有,... 钱君甸先生往来鸿雁录(黄宾虹)录文怒庵先生文席:日昨大驾惠临,诸多简晢,猥蒙贤伉俪垂青,伴宴湖楼,兼荷厚贶,感恧无已。顷颂教言,欣悉安抵申江,复饶清兴,评骘旧画,卓识高超。吴门四家,前三百年论者已谓文、沈易得,唐、仇难求,敝箧所有,俱未敢信为真。虽无中郎,而见虎贲,以为尚有典型,存之备考——宋元画往往后人补款,留传所存。 展开更多
关键词 鸿雁 先生 往来 欣悉 安抵
原文传递
THRESHOLD PROXY RE-SIGNATURE 被引量:7
3
作者 Piyi YANG Zhenfu CAO Xiaolei DONG 《Journal of Systems Science & Complexity》 SCIE EI CSCD 2011年第4期816-824,共9页
The focus of this paper is to design an efficient and secure solution addressing the semi trusted issue in proxy re-signature schemes, i.e., the proxy knows the re-signature key from user A to user B, so he is able to... The focus of this paper is to design an efficient and secure solution addressing the semi trusted issue in proxy re-signature schemes, i.e., the proxy knows the re-signature key from user A to user B, so he is able to translate any signatures made by user A to user B, which damages the essential requirement ("non-repudiation" property) of proxy re-signature schemes. In this paper, the authors first define the security model for threshold proxy re-signature scheme, and then propose two threshold proxy re-signature schemes based on Ateniese-Hohenberger's and Shao-Cao-Wang-Liang's approach. 展开更多
关键词 Proxy re-signature ROBUST THRESHOLD unforgeable.
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部