ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Research on Computer Network Information Technology Security and the Preventive Measures
Proceedings of the 2017 4th International Conference on Machinery, Materials and Computer (MACMC 2017)
◽
10.2991/macmc-17.2018.8
◽
2018
◽
Author(s):
Min Lai
◽
Tao Chen
Keyword(s):
Information Technology
◽
Preventive Measures
◽
Computer Network
◽
Network Information
◽
Information Technology Security
Download Full-text
Related Documents
Cited By
References
Analysis of the Main Threats and Key Preventive Measures of Computer Network Information Security Based on Prison Institutions
2020 5th International Conference on Mechanical, Control and Computer Engineering (ICMCCE)
◽
10.1109/icmcce51767.2020.00393
◽
2020
◽
Author(s):
Xunfeng Yu
◽
Qida Wu
Keyword(s):
Information Security
◽
Preventive Measures
◽
Computer Network
◽
Network Information
Download Full-text
Information technology. Security techniques. Digital signature scheme giving message recovery
10.3403/00327120
◽
1994
◽
Keyword(s):
Information Technology
◽
Digital Signature
◽
Signature Scheme
◽
Information Technology Security
◽
Message Recovery
◽
Digital Signature Scheme
Download Full-text
Information technology. Security techniques. Entity authentication mechanisms
10.3403/00327117
◽
1994
◽
Cited By ~ 2
Keyword(s):
Information Technology
◽
Information Technology Security
Download Full-text
Information technology. Security techniques. Entity authentication mechanisms
10.3403/00553840u
◽
2015
◽
Keyword(s):
Information Technology
◽
Information Technology Security
Download Full-text
Information technology. Security techniques. Entity authentication mechanisms
10.3403/00553840
◽
1995
◽
Keyword(s):
Information Technology
◽
Information Technology Security
Download Full-text
Information technology. Security techniques. Key management
10.3403/01566482
◽
2000
◽
Keyword(s):
Information Technology
◽
Key Management
◽
Information Technology Security
Download Full-text
Information technology. Security techniques. Hash-functions
10.3403/01640663u
◽
2015
◽
Keyword(s):
Information Technology
◽
Hash Functions
◽
Information Technology Security
Download Full-text
Information technology. Security techniques. Digital signature schemes giving message recovery
10.3403/01569864
◽
1998
◽
Keyword(s):
Information Technology
◽
Digital Signature
◽
Signature Schemes
◽
Information Technology Security
◽
Message Recovery
Download Full-text
Information technology. Security techniques. Non-repudiation
10.3403/01496601
◽
1998
◽
Keyword(s):
Information Technology
◽
Information Technology Security
Download Full-text
Information technology. Security techniques. Digital signatures with appendix
10.3403/01829041u
◽
2015
◽
Keyword(s):
Information Technology
◽
Digital Signatures
◽
Information Technology Security
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close