Information technology - security technology - public key infrastructure - minimum interoperability specification for pki components 信息技术安全技术公钥基础设施pki组件最小互操作规范
Information technology - security techniques - evaluation criteria for it security part 1 : introduction and general model 信息技术安全技术信息技术安全性评估准则第1部分:简介和一般模型
Information technology - security technology - evaluation criteria for it security part 3 : security assurance requirements 信息技术安全技术信息技术安全性评估准则第3部分:安全保证要求
Information technology - security techniques - entity authentication - part 2 : mechanisms using symmetric encipherment algorithms 信息技术安全技术实体鉴别第2部分:采用对称加密算法的机制
Information technology - security techniques - evaluation criteria for it security part 2 : security functional requirements 信息技术安全技术信息技术安全性评估准则第2部分:安全功能要求
Information technology - security techniques - data integrity mechanism using a cryptographic check function employing a block cipher algorithm 信息技术安全技术用块密码算法作密码校验函数的数据完整性机制
And based on the ways that a hostility function may acts , the methods used to detect ( test ) and prevent these functions are studied 该方法以模糊综合评价为主,局部采用加权平均,是信息技术安全评估的新思路。
The theoretical contributions of this paper are that the author analyzes the bottom layer of the protocol , pointed out the elliptical curve and secondary encryption in rsa based on common used secure protocols 本文的理论贡献是在分析常用的信息技术安全协议的基础上,分析了网络底层的安全协议,提出了椭圆曲线在密钥交换和对rsa进行指数二次加密的解决方案。