首页> 外文期刊>IEEE Aerospace and Electronic Systems Magazine >Information technology security using cryptography
【24h】

Information technology security using cryptography

机译:信息技术安全使用密码学

获取原文
获取原文并翻译 | 示例
           

摘要

It is widely known that information technology applications should be secured. During the last years, special efforts have been applied to achieve a great level of security. These efforts have increased security in some aspects, such as cryptographic algorithms and authentication techniques, etc. But many other security holes have appeared in these applications, making the improvements achieved a "waste of time and money". In this paper, some of these security holes are exposed. Using security hardware modules can overcome some of these holes, if they are designed according to the applications specification.
机译:众所周知,应确保信息技术应用。在过去几年中,已经采用了特殊的努力来实现巨大的安全水平。这些努力在一些方面提高了安全性,例如加密算法和认证技术等。但是许多其他安全漏洞已经出现在这些应用中,使得改进取得了“浪费时间和金钱”。在本文中,一些安全孔中的一些曝光。如果根据应用规范设计,则使用安全硬件模块可以克服其中一些孔。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号