日本在线观看不卡,国产成人免费观看,国产gaysex男同视频chinese,欧美一级www

樹人論文網(wǎng)一個專業(yè)的學(xué)術(shù)咨詢網(wǎng)站?。?!
樹人論文網(wǎng)
學(xué)術(shù)咨詢服務(wù)

IET Information Security

來源: 樹人論文網(wǎng) 瀏覽次數(shù):276次
周期:Quarterly
ISSN:1751-8709
影響因子:0.949
是否開源:No
年文章量:52
錄用比:容易
學(xué)科方向:計算機:信息系統(tǒng)
研究方向:工程技術(shù)
通訊地址:INST ENGINEERING TECHNOLOGY-IET, MICHAEL FARADAY HOUSE SIX HILLS WAY STEVENAGE, HERTFORD, ENGLAND, SG1 2AY
官網(wǎng)地址:http://www.ietdl.org/IET-IFS
投稿地址:http://mc.manuscriptcentral.com/iet-ifs
網(wǎng)友分享經(jīng)驗:約6.0個月

IET Information Security雜志中文介紹

IET信息安全在信息安全和密碼學(xué)的以下領(lǐng)域發(fā)表原始研究論文。提交論文的作者應(yīng)在其封面聲明中明確說明論文所涉及的領(lǐng)域。訪問控制和數(shù)據(jù)庫安全即席網(wǎng)絡(luò)方面匿名和電子投票認(rèn)證分組密碼和哈希函數(shù)區(qū)塊鏈,比特幣(僅技術(shù)方面)廣播加密和叛徒追蹤組合方面秘密渠道和信息流關(guān)鍵基礎(chǔ)設(shè)施密碼分析可靠性數(shù)字版權(quán)管理數(shù)字簽名方案數(shù)字隱寫術(shù)信息安全的經(jīng)濟方面橢圓曲線密碼學(xué)與數(shù)論嵌入式系統(tǒng)方面嵌入式系統(tǒng)安全與取證金融密碼術(shù)防火墻安全正式方法和安全驗證人的方面信息戰(zhàn)與生存能力入侵檢測Java與XML安全密鑰分發(fā)密鑰管理惡意軟件多方計算與門限加密對等安全PKIS公鑰和混合加密量子密碼術(shù)使用計算機的風(fēng)險魯棒網(wǎng)絡(luò)秘密共享安全電子商務(wù)軟件迷亂流密碼信任模型水印和指紋

IET Information Security雜志英文介紹

IET Information Security publishes original research papers in the following areas of information security and cryptography. Submitting authors should specify clearly in their covering statement the area into which their paper falls.Access Control and Database SecurityAd-Hoc Network AspectsAnonymity and E-VotingAuthenticationBlock Ciphers and Hash FunctionsBlockchain, Bitcoin (Technical aspects only)Broadcast Encryption and Traitor TracingCombinatorial AspectsCovert Channels and Information FlowCritical InfrastructuresCryptanalysisDependabilityDigital Rights ManagementDigital Signature SchemesDigital SteganographyEconomic Aspects of Information SecurityElliptic Curve Cryptography and Number TheoryEmbedded Systems AspectsEmbedded Systems Security and ForensicsFinancial CryptographyFirewall SecurityFormal Methods and Security VerificationHuman AspectsInformation Warfare and SurvivabilityIntrusion DetectionJava and XML SecurityKey DistributionKey ManagementMalwareMulti-Party Computation and Threshold CryptographyPeer-to-peer SecurityPKIsPublic-Key and Hybrid EncryptionQuantum CryptographyRisks of using ComputersRobust NetworksSecret SharingSecure Electronic CommerceSoftware ObfuscationStream CiphersTrust ModelsWatermarking and Fingerprinting

IET Information Security影響因子