找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Communications and Multimedia Security; Reinhard Posch Book 1995 IFIP International Federation for Information Processing 1995 communicati

[复制链接]
楼主: Goiter
发表于 2025-3-25 06:56:02 | 显示全部楼层
发表于 2025-3-25 07:57:50 | 显示全部楼层
发表于 2025-3-25 11:39:56 | 显示全部楼层
发表于 2025-3-25 18:48:58 | 显示全部楼层
Covered Trust Values in Distributed Systems,, a Key Distribution Center (KDC) is employed to distribute public keys, the receiver of such a key has to trust the KDC that the key is authentic. Sometimes, a trusted entity may recommend another entity as being trustworthy, which in turn can recommend further entities. Obviously, the longer such
发表于 2025-3-26 00:02:17 | 显示全部楼层
File server architecture for an open distributed document system,istributed document system is to provide an environment where a group of geographically distributed users can collaborate to develop documents efficiently and be assured that their integrity requirements will be enforced. We view the integrity policy as part of social contract between users. The ser
发表于 2025-3-26 02:29:43 | 显示全部楼层
A Heuristic for Securing Hypertext Systems,should be allowed to access which information. Many of the concerns are already being addressed by current secure database research—especially secure object-oriented database research. However, the particular structure of hypertext and hypermedia system allows one to study the particular requirement
发表于 2025-3-26 07:43:57 | 显示全部楼层
发表于 2025-3-26 11:07:21 | 显示全部楼层
发表于 2025-3-26 13:28:04 | 显示全部楼层
The Network Security Reference Model: its Security Subjects and their Classification Criteria,echnologies by decomposing a structure of communications network into four layers. The Model can also specify concrete network security problems and the technologies that solve these problems. The paper describes a criteria for classifying most concrete security problems of communications network, a
发表于 2025-3-26 19:43:31 | 显示全部楼层
A strategic approach to a national security policy,integrity” of information processing in the best systematic and balanced way as possible. For the further practical realization of this security policy, evaluation and certification proceedings have to be requested..This inquiry was presented in winter 1994. On the one hand it illustrates a high gen
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 吾爱论文网 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
QQ|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-8-15 06:08
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表