首页> 外文期刊>IEEE Aerospace and Electronic Systems Magazine >Information technology security using cryptography
【24h】

Information technology security using cryptography

机译:使用密码技术的信息技术安全

获取原文
获取原文并翻译 | 示例
           

摘要

It is widely known that information technology applications should be secured. During the last years, special efforts have been applied to achieve a great level of security. These efforts have increased security in some aspects, such as cryptographic algorithms and authentication techniques, etc. But many other security holes have appeared in these applications, making the improvements achieved a "waste of time and money". In this paper, some of these security holes are exposed. Using security hardware modules can overcome some of these holes, if they are designed according to the applications specification.
机译:众所周知,应确保信息技术应用的安全。在过去的几年中,为实现高级别的安全性付出了特殊的努力。这些努力在某些方面提高了安全性,例如密码算法和身份验证技术等。但是,在这些应用程序中出现了许多其他安全漏洞,使得这些改​​进实现了“时间和金钱的浪费”。在本文中,其中一些安全漏洞是暴露的。如果安全硬件模块是根据应用程序规范设计的,则使用它们可以克服其中的一些漏洞。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号