爱了吗 发表于 2025-3-30 11:23:02

http://reply.papertrans.cn/47/4655/465480/465480_51.png

药物 发表于 2025-3-30 12:35:49

http://reply.papertrans.cn/47/4655/465480/465480_52.png

参考书目 发表于 2025-3-30 17:04:02

yptovariables. It is the foundation for enforcing computer security policies and controls and preempting system misuse. ...This book provides a comprehensive design for a portable, flexible high-security cryptographic architecture, with particular emphasis on incorporating rigorous security models a

STALL 发表于 2025-3-30 23:58:15

Miroslava Muchová,Ján Paralič,Michael Nemčíks the use of encryption keys and similar cryptovariables. It is the foundation for enforcing computer security policies and controls and preempting system misuse. ...This book provides a comprehensive design for a portable, flexible high-security cryptographic architecture, with particular emphasis

认识 发表于 2025-3-31 02:33:11

http://reply.papertrans.cn/47/4655/465480/465480_55.png
页: 1 2 3 4 5 [6]
查看完整版本: Titlebook: Information Systems Architecture and Technology: Proceedings of 38th International Conference on Inf; Part I Leszek Borzemski,Jerzy Świątek