首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   133篇
  免费   38篇
  国内免费   13篇
系统科学   5篇
丛书文集   2篇
综合类   177篇
  2023年   1篇
  2022年   3篇
  2020年   1篇
  2019年   2篇
  2018年   3篇
  2017年   2篇
  2016年   5篇
  2015年   4篇
  2014年   15篇
  2013年   7篇
  2012年   11篇
  2011年   11篇
  2010年   18篇
  2009年   12篇
  2008年   32篇
  2007年   12篇
  2006年   23篇
  2005年   6篇
  2003年   1篇
  2002年   3篇
  2001年   2篇
  2000年   4篇
  1999年   6篇
排序方式: 共有184条查询结果,搜索用时 406 毫秒
1.
The method of extracting and describing the intended behavior of software precisely has become one of the key points in the fields of software behavior's dynamic and trusted authentication. In this paper, the author proposes a specified measure of extracting SIBDS (software intended behaviors describing sets) statically from the binary executable using the software's API functions invoking, and also introduces the definition of the structure used to store the SIBDS in detail. Experimental results demonstrate that the extracting method and the storage structure definition offers three strong properties: (i) it can describe the software's intended behavior accurately; (ii) it demands a small storage expense; (iii) it provides strong capability to defend against mimicry attack.  相似文献   
2.
会计目标关系到会计基本理论框架的构建以及会计实务的拓展。美国会计界关于会计目标的研究形成两个主要流派——受托责任学派和决策有用学派。探讨了这两种观点对会计理论和实务的影响,以构建出真正符合我国现阶段经济环境的会计目标理论。  相似文献   
3.
针对广受关注的秘密信息的安全共享问题,提出一种基于可信计算的群内安全信息共享混合模型.基于分裂密钥RSA(split-key RSA)算法,综合超级分发和微分发的优点,提出一种新的混合架构,在不影响安全性的情况下,对密钥进行了统一的分割,将控制中心端的密钥参数缩短为32bit,并且不随RSA的强度而变化,使得控制中心端的在线计算量显著降低,RSA2048模式下降低为原来的1.6%.原型系统验证对比测试结果表明,系统的运行效率有了较大提高,RSA2048模式下系统的读请求响应时间降低到原来的5%以下.  相似文献   
4.
提出一种基于兴趣相似度的可信群划分策略.将全局评估转化为群内评估,既解决了评估消息集聚的问题,又区分了不同兴趣域内的评估结果,提高了系统的服务成功率.同时提出一种结合评估值波动性和一致性的权重计算方法.仿真结果表明,新模型能抵抗各类恶意节点,且比以往的模型服务成功率更高.  相似文献   
5.
This paper, focusing on the trusted computing group's standards, explained the key concept of trusted compuling and provided the architecture of trusted PC. It built trust bottom-up by starting with trusted hardware and adding layers of trusted software. It is a system-level solution available to all applications running on the member platforms. This solution reduces the security burden on applications and thus simplifies application programming.  相似文献   
6.
0 IntroductionDigital signatureis a key technique to provide datainteg-rity andsource authenticationcapabilities to enhance da-ta trustworthiness in trusted computing platform. Most cur-rent digital signature schemes are based on complex mathe-matical problems , such as integer factoring, discrete log-arithm,and discrete logarithm on elliptic curves . The hard-ness of these underlying mathematical problems is really un-certain at present . Merkle treeis a method used for authenti-cation and di…  相似文献   
7.
Trusted path is one of the crucial features that operating systems must provide for fundamental security support. In order to explore the possibility of implementing a trusted path mechanism with the support of trusted platform module (TPM) technologies, and to support TPM capabilities in operating systems, the paper extended the scope of the conventional trusted path to cover the situation in which a user communicates with software residing on a remote host. The paper combined the concept of operating system support for trusted path with that for TPM platforms, and proposed the architecture of an extended trusted path mechanism in operating system with considerations on TPM-capable platforms support. As part of the author's research in secure operating systems, the work of the paper was carried out with Linux as an experimental prototype system. The research result shows that TPM capabilities can strengthen extended trusted path mechanisms of operating systems.  相似文献   
8.
0 IntroductionPeople need a secure and dependable computing environ-ment[1]. The cryptology is known as the core of com-puter security[2]. The application of cryptologyis mainly ful-filled by key management and credential mechanism.In thispaper , we should study the key management and credentialmechanismbased ontrusted computing platform,and give theactual application of these security mechanisms for buildingtrusted computing environment .1 OverviewTrusted Computing1 .1 The Original of Trus…  相似文献   
9.
0 IntroductionDue to the fast development of communication technolo-gies ,the lowered cost of hardware,there is anincreas-ing reliance on computer networks . However ,along with thetremendous convenience provided,there is increasing numberof network based attacks .One particular kind of attacks exploits software vulnera-bilities .It is lunched by a virus or worm.Some examples in-clude earlier worms such as Code Red, Ni mda as well as re-cently high speed worms ,such as Slammer , Witty and F…  相似文献   
10.
With analysis of limitations Trusted Computing Group (TCG) has encountered, we argued that virtual machine monitor (VMM) is the appropriate architecture for implementing TCG specification. Putting together the VMM architecture, TCG hardware and application-oriented "thin" virtual machine (VM), Trusted VMM-based security architecture is present in this paper with the character of reduced and distributed trusted computing base (TCB). It provides isolation and integrity guarantees based on which general security requirements can be satisfied.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号