ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
An Information Security Model Based on P2P Network
2008 International Symposium on Electronic Commerce and Security
◽
10.1109/isecs.2008.24
◽
2008
◽
Author(s):
Liu Yihe
◽
Tang Nianqing
◽
He Wenxiao
Keyword(s):
Information Security
◽
P2p Network
◽
Security Model
◽
Model Based
Download Full-text
Related Documents
Cited By
References
An Information Security Model Based on Reputation and Integrality of P2P Network
2009 International Conference on Networks Security, Wireless Communications and Trusted Computing
◽
10.1109/nswctc.2009.233
◽
2009
◽
Author(s):
Yihe Liu
Keyword(s):
Information Security
◽
P2p Network
◽
Security Model
◽
Model Based
Download Full-text
A New Information Security Model Based on Network Service Protection
2009 First International Conference on Information Science and Engineering
◽
10.1109/icise.2009.91
◽
2009
◽
Cited By ~ 1
Author(s):
Wei Li
◽
Dongdong Wu
◽
Hui Lu
Keyword(s):
Information Security
◽
Security Model
◽
Network Service
◽
Model Based
◽
New Information
Download Full-text
E-commerce Transaction Information Security Model Based on Big Data Analysis
Advances in Intelligent Systems and Computing - Cyber Security Intelligence and Analytics
◽
10.1007/978-3-030-43309-3_45
◽
2020
◽
pp. 322-328
Author(s):
Yang Wang
◽
Meng Tu
◽
Jiejie Cui
Keyword(s):
Big Data
◽
Data Analysis
◽
Information Security
◽
Big Data Analysis
◽
Security Model
◽
Model Based
Download Full-text
An enhanced smartphone security model based on information security management system (ISMS)
Electronic Commerce Research
◽
10.1007/s10660-014-9146-3
◽
2014
◽
Vol 14
(3)
◽
pp. 321-348
◽
Cited By ~ 6
Author(s):
Jong Hyuk Park
◽
Ki Jung Yi
◽
Young-Sik Jeong
Keyword(s):
Information Security
◽
Management System
◽
Security Management
◽
Security Model
◽
Information Security Management
◽
Smartphone Security
◽
Model Based
◽
Information Security Management System
Download Full-text
Network Information Security Model Based on Web Data Mining
Advances in Intelligent Systems and Computing - International Conference on Intelligent Computing and Applications
◽
10.1007/978-981-10-5520-1_6
◽
2017
◽
pp. 51-56
Author(s):
M. Shankar Lingam
◽
A. Arun Kumar
◽
A. M. Sudhakara
Keyword(s):
Data Mining
◽
Information Security
◽
Security Model
◽
Web Data
◽
Web Data Mining
◽
Network Information
◽
Model Based
Download Full-text
A new information security model based on BLP model and BIBA model
Proceedings 7th International Conference on Signal Processing, 2004. Proceedings. ICSP '04. 2004.
◽
10.1109/icosp.2004.1442325
◽
2005
◽
Cited By ~ 1
Author(s):
Yihe Liu
◽
Xingshu Chen
Keyword(s):
Information Security
◽
Security Model
◽
Model Based
◽
New Information
Download Full-text
Design and Implementation of Sensitive Information Security Model based on Term Clustering
International Journal of Computer Applications
◽
10.5120/6112-8200
◽
2012
◽
Vol 43
(7)
◽
pp. 1-6
◽
Cited By ~ 1
Author(s):
Sona Kaushik
◽
Shalini Puri
◽
Pankaj Gupta
Keyword(s):
Information Security
◽
Sensitive Information
◽
Security Model
◽
Design And Implementation
◽
Model Based
◽
Term Clustering
Download Full-text
Research on Overall Simulation of an Information Security Model Based on System Architecture on the Border of an Application Area
International Journal of Simulation Systems Science & Technology
◽
10.5013/ijssst.a.16.4b.11
◽
2020
◽
Author(s):
Guest Editor Liutian Ye
Keyword(s):
Information Security
◽
System Architecture
◽
Security Model
◽
Application Area
◽
Model Based
Download Full-text
Analysis of input conditions in the information security model based on the rare event apparatus
Science Bulletin of the Novosibirsk State Technical University
◽
10.17212/1814-1196-2019-2-69-88
◽
2019
◽
pp. 69-88
Author(s):
Georgy Popov
◽
◽
Ekaterina Popova
◽
Olga Vasilieva
◽
◽
...
Keyword(s):
Information Security
◽
Rare Event
◽
Security Model
◽
Model Based
Download Full-text
INFORMATION SECURITY MODEL BASED DIGITAL SIGNATURE ALGORITHM WITH RSA ALGORITHM
Computer Engineering Science and System Journal
◽
10.24114/cess.v1i1.4037
◽
2016
◽
Vol 1
(1)
◽
pp. 15-20
◽
Cited By ~ 1
Author(s):
Mohamad Ihwani
◽
Keyword(s):
Information Security
◽
Digital Signature
◽
Security Model
◽
Rsa Algorithm
◽
Model Based
◽
Digital Signature Algorithm
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close