首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   7篇
  免费   0篇
财政金融   1篇
计划管理   3篇
经济学   2篇
综合类   1篇
  2019年   1篇
  2015年   1篇
  2011年   1篇
  2010年   1篇
  2009年   1篇
  2008年   2篇
排序方式: 共有7条查询结果,搜索用时 15 毫秒
1
1.
移动电子商务技术及其安全策略   总被引:2,自引:0,他引:2  
作为新一代电子商务,移动电子商务充分利用其移动性,为电子交易带来更多的便捷性,为运营商开创了新的盈利空间。本文对移动电子商务技术进行了分析,探讨了移动电子商务的安全策略。  相似文献   
2.
工程用水泥基复合材料(engineered cementitious composite,简称ECC)在拉伸荷栽下呈现出多微缝开裂和应变-硬化性能.当前该材料主要应用于桥面板、建筑物减震、挡土墙和灌溉渠道等工程中.在这些应用中,由于ECC承受拉伸荷栽的能力大大提高,在抗渗性方面表现出很大的优势.文章将时目前ECC在结构工程中的应用进行简要介绍.  相似文献   
3.
分析公钥加密体制与对称加密算法的异同点,介绍公钥加密算法实现的理论基础,重点说明椭圆加密算法的发展瓶颈,指明这种密码体制的研究方向。  相似文献   
4.
With advancements in quantum computing happening almost weekly it is time to examine the effects this new technology will have on society and current computational systems. Specifically, cryptographic systems need to be carefully analyzed since the introduction of quantum computational resources would render discrete logarithm and factoring based cryptographic systems like those based on Rivest, Shamir, Adleman (RSA) and Elliptic Curve Cryptography (ECC) algorithms woefully obsolete. These algorithms are widely used in the form of digital certificates, message encryption, and even physical authentication devices like Radio Frequency Identification (RFID) badges. With this technology compromised by quantum computing, governments and other organizations would be able to eavesdrop on private citizens with relative ease. This has the potential to cause a slew of rights violations and atrocities leading to catastrophe. With compromised digital certificates 3rd parties could masquerade as trusted organizations. This would call many types of digital transactions like into question, including those related to stock exchanges, personal banking, and software verification. By eroding this previously solid foundation of trust global scale economic catastrophes are not out of the question. This paper introduces quantum computing to the study of catastrophic threats since the use of quantum technology while existing vulnerable encryption schemes are still in place raises severe safety issues. These issues are addressed here along with a proposed two-fold solution involving the development and maturation of post-quantum cryptographic algorithms coupled with government and international regulation. This regulation would promote the containment and responsible use of quantum computers in order to help alleviate some of the security issues posed by outdated cryptographic systems in a post-quantum environment.  相似文献   
5.
工程用水泥基复合材料(engineered cementitious composite,简称ECC)在拉伸荷载下呈现出多微缝开裂和应变一硬化性能。当前该材料主要应用于桥面板、建筑物减震、挡土墙和灌溉渠道等工程中。在这些应用中,由于ECC承受拉伸荷载的能力大大提高;在抗渗性方面表现出很大的优势。文章将对翦前ECC在结构工程中的应用进行简要介绍。  相似文献   
6.
本文介绍了SSL协议的主要子协议Handshake的工作过程,并对公钥加密算法RSA和ECC耗能进行了比较,提出了一种在SSL协议中同时应用RSA和ECC的算法,使移动设备即节能又能安全通信的方案。  相似文献   
7.
The games in which large amount of money is involved are always called into question about the existence of the possibility to manipulate the game for an immediate benefit. Lottery system is not an exception in this regard; moreover, it is a subject of rumours that the game is not as fair as it is pretended to be. After studying the advantages and drawbacks of conventional lottery systems, the authors are proposing an e-lottery system based on anonymous signatures. Even though the proposal is using electronic signatures, which imply complex calculus and the possession of digital certificates for each player, the proposed system compensates these drawbacks by increasing trust and confidence of both the players and the lottery organizer. This will lead to more players participating in the lottery, which translates to more revenue for the lottery and larger prizes for the players.  相似文献   
1
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号