Showing 321 - 340 results of 529 for search '"information security"', query time: 0.05s Refine Results
  1. 321
  2. 322
  3. 323

    Research on safety methods of airborne embedded software by Ya-hui LI, Ya-di ZHANG, Peng GUO

    Published 2015-11-01
    “…By analyzed the process of development and running of airborne software with the standards of airworthiness and information security,the factors and threats related with airborne software safety were presented,and the security protected mechanisms based on embedded TMP and MILS software architecture were provided,which all support the research on safety of embedded software on aircrafts.…”
    Get full text
    Article
  4. 324
  5. 325

    Analysis on the application and development of quantum communication by Junsen LAI, Bingbing WU, Rui TANG, Wenyu ZHAO, Haiyi ZHANG

    Published 2016-03-01
    “…Quantum communication,which can provide unconditional security,is a physical layer solutions for information security.The status and challenge of its technology development and application are the focus of the industry.The field trials of quantum communication and main problem were analyzed.Driving force and bottleneck of its commercialization were clarified and worldwide standardization research were reviewed.System performance test and evaluation were discussed and future development recommendations were also provided.…”
    Get full text
    Article
  6. 326

    MODERN CYBERNETIC TERRORISM AND HIS SOCIAL CONSEQUENCES by N. Grigoriev, E. Rodyukov

    Published 2016-05-01
    “…Given that policy now covers all spheres of public life and, therefore, increasing the problem of information security of society in General and each person in particular. …”
    Get full text
    Article
  7. 327
  8. 328

    INFORMATION SUPPORT FOR THE TRANSPORT AND LOGISTICS COMPANY by T. Bogdanova, K. Kuznetsov

    Published 2016-04-01
    “…The analysis of the major databases characterizing the state of the external and internal environments of transport and logistics companies, which allowed to formulate the problems and trends of development of information security. Examples of public information databases and their impact on the performance of the transport and logistics companies. …”
    Get full text
    Article
  9. 329

    Analysis on the progress of quantum secure communication test evaluation and standardization by Junsen LAI, Bingbing WU, Rui TANG, Mengyu Ding, Wenyu ZHAO, Haiyi ZHANG

    Published 2018-09-01
    “…Quantum key distribution (QKD) based quantum secure communication (QSC) is one of the promising solutions for improving information security.With the development of experimental network construction and demonstrational application,the demand of QSC test evaluation and standardization is becoming more urgent.Based on the introduction of technology and architecture of QSC system,the latest progress of QSC test evaluation and standardization was reviewed,typical questions in test evaluation and standardization were analyzed,and development trends and prospects were also discussed.…”
    Get full text
    Article
  10. 330

    Analysis on the status and development of quantum secure communication standardization by Junsen LAI, Bingbing WU, Rui TANG, Wenyu ZHAO, Haiyi ZHANG

    Published 2018-01-01
    “…Quantum secure communication based on quantum key distribution,which can provide theoretically unconditional security,is one of the effective solutions to ensure information security in the future.Recently,the application and industrialization of quantum secure communication in China has developed gradually,the demand for standardization has become increasingly apparent.The worldwide project plan,research status and development trend of quantum secure communication standardization were investigated,the problems and prospects of China’s standardization research were analyzed,and further suggestions to accelerate the standardization development were also proposed.…”
    Get full text
    Article
  11. 331

    Research on the Defense of Advanced Persistent Threats in Enterprise Network by Dongxin Liu, Guorong Liu, Shuai Wang, Jun Shen, Huamin Jin

    Published 2013-12-01
    “…Recently,advanced persistent threats have become a hot spot of information security industry as so many reports were taken about that some famous companies had been suffered from it. …”
    Get full text
    Article
  12. 332

    Research and design of authenticated encryption algorithm based on AES round function by Guoqiang GAO, Zichen LI

    Published 2020-04-01
    “…The authenticated encryption algorithm guarantees the confidentiality and integrity of the information at the same time,and has extensive research and application prospects in the field of information security.With the mixed integer linear programming (MILP) method,the iterative structure with high efficiency and more active S boxes is searched.Based on this new round iterative function and the generalized Feistel structure,an authenticated encryption algorithm with the ability to resist collision attack,differential attack,linear attack and other attacks was designed and implemented,and the efficiency was twice that of AES-GCM.…”
    Get full text
    Article
  13. 333

    Study on chaos phase space synchronous rotation and distinguish switching security communication by Guang-ming SUN, Jin-jie HUANG

    Published 2016-10-01
    “…A new chaotic dynamic system was proposed and the dynamic of this system was analyzed.Through the research of balance point,Lyapunov index,Lyapunov dimension and Poincare section,the chaotic behavior of the system was approved.Z axis of chaos system phase space was researched.Z axis rotation model in the phase space was built through introducing rotation matrix,and chaos system space synchronous rotation was researched.Based on the research results above,a chaotic distinguish switching security communication system was presented for the communication of information security.…”
    Get full text
    Article
  14. 334
  15. 335
  16. 336
  17. 337
  18. 338

    Unified operation monitoring and security warning platform based on big data in energy group by Jing WANG, Kunlun GAO, Chaoyi BIAN, Xiao LIANG

    Published 2018-05-01
    “…With the increasing of information assets of energy group,in order to effectively cope with information security risks,using the big data and the intersecting confirmation mechanics of multi-source data,a monitoring and security warning platform was designed for information devices and application systems in energy group.By the global analysis of big multi-source data,the real-time awareness of risk and situation could be achieved,which was valuable for the progress of operation and management level of information system and timely warning of the spread of information risk to the power system.…”
    Get full text
    Article
  19. 339

    A brand new strategy of quantum relay strategy based on entanglement swapping by Min XU, Min NIE, Guang YANG, Changxing PEI

    Published 2016-03-01
    “…Quantum protocols based on entanglement are known as information security,reliability,flexibility and a broad prospect in use.Meanwhile,the fidelity of photons is also required.A new quantum relay strategy was proposed.By setting multi-relays between distant correspondents and under the assistance of classical communications,the strategy can execute entanglement swapping and entanglement purification to provide the correspondents with remote entanglement connection of stable fidelity.Performance analysis shows that by reasonable control of relay series,improvement of entanglement swapping and entanglement purification,the time delay and throughput can be significantly improved,necessary entanglement resources can be provided for the global quantum communication.…”
    Get full text
    Article
  20. 340

    Novel and lightweight digital signature scheme by WANG Hou-zhen1, ZHANG Huan-guo1

    Published 2010-01-01
    “…Digital signatures have many applications in information security,including authentication,data integrity and non-repudiation.However,the number theoretic-based schemes such as RSA and ECC are relatively slow in performance.These schemes do not seem to be suitable for small computing devices with limited computing capacity,such as smart cards,wireless sensor networks,and active RFID tags.Based on the hash authentication technology,a novel lightweight digital signature scheme was proposed for achieving secure and efficient signature function.Security analysis and experimental results show that it can be used as a possible alternative to the current public key cryptosystems.…”
    Get full text
    Article