期刊文献+
共找到166篇文章
< 1 2 9 >
每页显示 20 50 100
Batch Secret Sharing for Secure Multi-party Computation in Asynchronous Network
1
作者 黄征 龚征 李强 《Journal of Shanghai Jiaotong university(Science)》 EI 2009年第1期112-116,共5页
This paper proposes an efficient batch secret sharing protocol among n players resilient to t 〈 n/4 players in asynchronous network. The construction of our protocol is along the line of Hirt's protocol which works ... This paper proposes an efficient batch secret sharing protocol among n players resilient to t 〈 n/4 players in asynchronous network. The construction of our protocol is along the line of Hirt's protocol which works in synchronous model. Compared with the method of using secret share protocol m times to share m secrets, our protocol is quite efficient. The protocol can be used to improve the efficiency of secure multi-party computation (MPC) greatly in asynchronous network. 展开更多
关键词 secret share secure multi-party computation asynchronous network
原文传递
Privacy-preserving computation meets quantum computing:A scoping review
2
作者 Aitor Gómez-Goiri Iñaki Seco-Aguirre +1 位作者 Oscar Lage Alejandra Ruiz 《Digital Communications and Networks》 2025年第6期1707-1721,共15页
Privacy-Preserving Computation(PPC)comprises the techniques,schemes and protocols which ensure privacy and confidentiality in the context of secure computation and data analysis.Most of the current PPC techniques rely... Privacy-Preserving Computation(PPC)comprises the techniques,schemes and protocols which ensure privacy and confidentiality in the context of secure computation and data analysis.Most of the current PPC techniques rely on the complexity of cryptographic operations,which are expected to be efficiently solved by quantum computers soon.This review explores how PPC can be built on top of quantum computing itself to alleviate these future threats.We analyze quantum proposals for Secure Multi-party Computation,Oblivious Transfer and Homomorphic Encryption from the last decade focusing on their maturity and the challenges they currently face.Our findings show a strong focus on purely theoretical works,but a rise on the experimental consideration of these techniques in the last 5 years.The applicability of these techniques to actual use cases is an underexplored aspect which could lead to the practical assessment of these techniques. 展开更多
关键词 Quantum computing Privacy-preserving computation Oblivious transfer secure multi-party computation Homomorphic encryption Scoping review
在线阅读 下载PDF
A Phase Estimation Algorithm for Quantum Speed-Up Multi-Party Computing
3
作者 Wenbin Yu Hao Feng +3 位作者 Yinsong Xu Na Yin Yadang Chen Zhi-Xin Yang 《Computers, Materials & Continua》 SCIE EI 2021年第4期241-252,共12页
Security and privacy issues have attracted the attention of researchers in the field of IoT as the information processing scale grows in sensor networks.Quantum computing,theoretically known as an absolutely secure wa... Security and privacy issues have attracted the attention of researchers in the field of IoT as the information processing scale grows in sensor networks.Quantum computing,theoretically known as an absolutely secure way to store and transmit information as well as a speed-up way to accelerate local or distributed classical algorithms that are hard to solve with polynomial complexity in computation or communication.In this paper,we focus on the phase estimation method that is crucial to the realization of a general multi-party computing model,which is able to be accelerated by quantum algorithms.A novel multi-party phase estimation algorithm and the related quantum circuit are proposed by using a distributed Oracle operator with iterations.The proved theoretical communication complexity of this algorithm shows it can give the phase estimation before applying multi-party computing efficiently without increasing any additional complexity.Moreover,a practical problem of multi-party dating investigated shows it can make a successful estimation of the number of solution in advance with zero communication complexity by utilizing its special statistic feature.Sufficient simulations present the correctness,validity and efficiency of the proposed estimation method. 展开更多
关键词 Edge computing security multi-party computing quantum algorithm phase estimation communication complexity
在线阅读 下载PDF
Secure planar convex hull protocol for large-scaled point sets in semi-honest model
4
作者 孙茂华 Zhu Hongliang Li Qi 《High Technology Letters》 EI CAS 2015年第4期471-478,共8页
Efficiency and scalability are still the bottleneck for secure multi-party computation geometry (SMCG). In this work a secure planar convex hull (SPCH) protocol for large-scaled point sets in semi-honest model has... Efficiency and scalability are still the bottleneck for secure multi-party computation geometry (SMCG). In this work a secure planar convex hull (SPCH) protocol for large-scaled point sets in semi-honest model has been proposed efficiently to solve the above problems. Firstly, a novel priva- cy-preserving point-inclusion (PPPI) protocol is designed based on the classic homomorphic encryp- tion and secure cross product protocol, and it is demonstrated that the complexity of PPPI protocol is independent of the vertex size of the input convex hull. And then on the basis of the novel PPPI pro- tocol, an effective SPCH protocol is presented. Analysis shows that this SPCH protocol has a good performance for large-scaled point sets compared with previous solutions. Moreover, analysis finds that the complexity of our SPCH protocol relies on the size of the points on the outermost layer of the input point sets only. 展开更多
关键词 secure multi-party computation secure multi-party computational geometry (SMCG) secure planar convex hull protocol (SPCH) privacy-preserving point-inclusion protocol (PPPI) semi-honest model
在线阅读 下载PDF
A Secure Microgrid Data Storage Strategy with Directed Acyclic Graph Consensus Mechanism
5
作者 Jian Shang Runmin Guan Wei Wang 《Intelligent Automation & Soft Computing》 SCIE 2023年第9期2609-2626,共18页
The wide application of intelligent terminals in microgrids has fueled the surge of data amount in recent years.In real-world scenarios,microgrids must store large amounts of data efficiently while also being able to ... The wide application of intelligent terminals in microgrids has fueled the surge of data amount in recent years.In real-world scenarios,microgrids must store large amounts of data efficiently while also being able to withstand malicious cyberattacks.To meet the high hardware resource requirements,address the vulnerability to network attacks and poor reliability in the tradi-tional centralized data storage schemes,this paper proposes a secure storage management method for microgrid data that considers node trust and directed acyclic graph(DAG)consensus mechanism.Firstly,the microgrid data storage model is designed based on the edge computing technology.The blockchain,deployed on the edge computing server and combined with cloud storage,ensures reliable data storage in the microgrid.Secondly,a blockchain consen-sus algorithm based on directed acyclic graph data structure is then proposed to effectively improve the data storage timeliness and avoid disadvantages in traditional blockchain topology such as long chain construction time and low consensus efficiency.Finally,considering the tolerance differences among the candidate chain-building nodes to network attacks,a hash value update mechanism of blockchain header with node trust identification to ensure data storage security is proposed.Experimental results from the microgrid data storage platform show that the proposed method can achieve a private key update time of less than 5 milliseconds.When the number of blockchain nodes is less than 25,the blockchain construction takes no more than 80 mins,and the data throughput is close to 300 kbps.Compared with the traditional chain-topology-based consensus methods that do not consider node trust,the proposed method has higher efficiency in data storage and better resistance to network attacks. 展开更多
关键词 MICROGRID data security storage node trust degree directed acyclic graph data structure consensus mechanism secure multi-party computing blockchain
在线阅读 下载PDF
对称可搜索加密研究综述
6
作者 赵陈斌 李金美 +2 位作者 何琨 陈晶 杜瑞颖 《密码学报(中英文)》 北大核心 2026年第1期1-27,共27页
随着云计算的发展,可搜索加密技术在保障敏感数据隐私的同时实现对密态外包数据的高效搜索,有效平衡了数据安全性与可用性.本文系统地探讨了对称可搜索加密(SSE)技术对密态数据库的支撑,介绍了SSE的基本原理和模型架构,注重于SSE技术在... 随着云计算的发展,可搜索加密技术在保障敏感数据隐私的同时实现对密态外包数据的高效搜索,有效平衡了数据安全性与可用性.本文系统地探讨了对称可搜索加密(SSE)技术对密态数据库的支撑,介绍了SSE的基本原理和模型架构,注重于SSE技术在实际密态数据库系统中的应用,特别关注其如何在不牺牲数据安全性的前提下,提供有效和灵活的检索功能.依据查询功能的不同对现有SSE方案进行了系统分类,详细分析了各类方案的关键特性,讨论了SSE技术对结果可验证性和多用户的支持,对SSE技术在关系数据库中的应用进行了深入分析.最后提出SSE面临的困难和未来的发展方向. 展开更多
关键词 对称可搜索加密 云计算 安全云存储 密态数据库
在线阅读 下载PDF
Preserving Privacy of Software-Defined Networking Policies by Secure Multi-Party Computation 被引量:1
7
作者 Maryam Zarezadeh Hamid Mala Homa Khajeh 《Journal of Computer Science & Technology》 SCIE EI CSCD 2020年第4期863-874,共12页
In software-defined networking(SDN),controllers are sinks of information such as network topology collected from switches.Organizations often like to protect their internal network topology and keep their network poli... In software-defined networking(SDN),controllers are sinks of information such as network topology collected from switches.Organizations often like to protect their internal network topology and keep their network policies private.We borrow techniques from secure multi-party computation(SMC)to preserve the privacy of policies of SDN controllers about status of routers.On the other hand,the number of controllers is one of the most important concerns in scalability of SMC application in SDNs.To address this issue,we formulate an optimization problem to minimize the number of SDN controllers while considering their reliability in SMC operations.We use Non-Dominated Sorting Genetic Algorithm II(NSGA-II)to determine the optimal number of controllers,and simulate SMC for typical SDNs with this number of controllers.Simulation results show that applying the SMC technique to preserve the privacy of organization policies causes only a little delay in SDNs,which is completely justifiable by the privacy obtained. 展开更多
关键词 software-defined NETWORKING (SDN) PRIVACY secure multi-party computation (SMC) structure function MULTI-OBJECTIVE optimization
原文传递
Concretely ecient secure multi-party computation protocols:survey and mor 被引量:3
8
作者 Dengguo Feng Kang Yang 《Security and Safety》 2022年第1期47-89,共43页
Secure multi-party computation(MPC)allows a set of parties to jointly compute a function on their private inputs,and reveals nothing but the output of the function.In the last decade,MPC has rapidly moved from a purel... Secure multi-party computation(MPC)allows a set of parties to jointly compute a function on their private inputs,and reveals nothing but the output of the function.In the last decade,MPC has rapidly moved from a purely theoretical study to an object of practical interest,with a growing interest in practical applications such as privacy-preserving machine learning(PPML).In this paper,we comprehensively survey existing work on concretely ecient MPC protocols with both semi-honest and malicious security,in both dishonest-majority and honest-majority settings.We focus on considering the notion of security with abort,meaning that corrupted parties could prevent honest parties from receiving output after they receive output.We present high-level ideas of the basic and key approaches for designing di erent styles of MPC protocols and the crucial building blocks of MPC.For MPC applications,we compare the known PPML protocols built on MPC,and describe the eciency of private inference and training for the state-of-the-art PPML protocols.Further-more,we summarize several challenges and open problems to break though the eciency of MPC protocols as well as some interesting future work that is worth being addressed.This survey aims to provide the recent development and key approaches of MPC to researchers,who are interested in knowing,improving,and applying concretely ecient MPC protocols. 展开更多
关键词 secure multi-party computation Privacy-preserving machine learning Secret sharings Garbled circuits Oblivious transfer and its arithmetic generalization
原文传递
Robust peer-to-peer learning via secure multi-party computation 被引量:1
9
作者 Yongkang Luo Wenjian Luo +2 位作者 Ruizhuo Zhang Hongwei Zhang Yuhui Shi 《Journal of Information and Intelligence》 2023年第4期341-351,共11页
To solve the data island problem,federated learning(FL)provides a solution paradigm where each client sends the model parameters but not the data to a server for model aggregation.Peer-to-peer(P2P)federated learning f... To solve the data island problem,federated learning(FL)provides a solution paradigm where each client sends the model parameters but not the data to a server for model aggregation.Peer-to-peer(P2P)federated learning further improves the robustness of the system,in which there is no server and each client communicates directly with the other.For secure aggregation,secure multi-party computing(SMPC)protocols have been utilized in peer-to-peer manner.However,the ideal SMPC protocols could fail when some clients drop out.In this paper,we propose a robust peer-to-peer learning(RP2PL)algorithm via SMPC to resist clients dropping out.We improve the segmentbased SMPC protocol by adding a check and designing the generation method of random segments.In RP2PL,each client aggregates their models by the improved robust secure multi-part computation protocol when finishes the local training.Experimental results demonstrate that the RP2PL paradigm can mitigate clients dropping out with no significant degradation in performance. 展开更多
关键词 Federated learning Swarm learning secure multi-party computation Peer-to-peer learning
原文传递
Nearly universal and efficient quantum secure multi-party computation protocol
10
作者 Han Yushan Che Bichen +2 位作者 Liu Jiali Dou Zhao Di Junyu 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2022年第4期51-68,88,共19页
Universality is an important property in software and hardware design.This paper concentrates on the universality of quantum secure multi-party computation(SMC)protocol.First of all,an in-depth study of universality h... Universality is an important property in software and hardware design.This paper concentrates on the universality of quantum secure multi-party computation(SMC)protocol.First of all,an in-depth study of universality has been conducted,and then a nearly universal protocol is proposed by using the Greenberger-Horne-Zeilinger(GHZ)-like state and stabilizer formalism.The protocol can resolve the quantum SMC problem which can be deduced as modulo subtraction,and the steps are simple and effective.Secondly,three quantum SMC protocols based on the proposed universal protocol:Quantum private comparison(QPC)protocol,quantum millionaire(QM)protocol,and quantum multi-party summation(QMS)protocol are presented.These protocols are given as examples to explain universality.Thirdly,analyses of the example protocols are shown.Concretely,the correctness,fairness,and efficiency are confirmed.And the proposed universal protocol meets security from the perspective of preventing inside attacks and outside attacks.Finally,the experimental results of the example protocols on the International Business Machines(IBM)quantum platform are consistent with the theoretical results.Our research indicates that our protocol is universal to a certain degree and easy to perform. 展开更多
关键词 UNIVERSALITY quantum secure multi-party computation security Greenberger-Horne-Zeilinger-like state simple operation
原文传递
基于无服务器计算的多方数据库安全计算系统 被引量:2
11
作者 马旭阳 周小凯 +5 位作者 郑浩宇 崔斌 徐泉清 杨传辉 晏潇 江佳伟 《软件学报》 北大核心 2025年第3期1084-1106,共23页
联合多方数据库的安全计算可以在保护数据隐私的情况下,对多个数据库的私有数据进行联合查询或联合建模.这样的联合体通常是一个松散的组织,各参与的数据库可以随时离线,然而现有多方安全计算系统通常采用秘密共享等隐私计算方案,需要... 联合多方数据库的安全计算可以在保护数据隐私的情况下,对多个数据库的私有数据进行联合查询或联合建模.这样的联合体通常是一个松散的组织,各参与的数据库可以随时离线,然而现有多方安全计算系统通常采用秘密共享等隐私计算方案,需要参与者保持在线状态,导致系统的可用性较差.此外,现有系统对外提供服务时无法预知用户的数量以及请求速度,如果将系统部署在私有集群或者租用云计算平台的虚拟机,面对爆发式请求时系统延迟增大,在请求较少时又造成资源浪费,表现出较差的可扩展性.随着云计算技术的发展,无服务器计算(serverless computing)作为一种新的云原生部署范式出现,具有良好的弹性资源伸缩能力.在该工作中,提出了基于无服务器计算环境的系统架构和间接通信方案,实现了一套高可扩展、高可用的多方数据库安全计算系统,可以容忍数据库节点掉线,并且在用户请求流量发生变化时自动伸缩系统资源.基于阿里云和OceanBase数据库实现了系统原型并进行了充分的实验对比,结果显示该系统在低频查询、横向建模等任务上,在计算成本、系统性能和可扩展性方面优于现有系统,最高能够节省78%的计算成本、提升系统性能1.6倍,同时也分析了本系统对于复杂查询、纵向建模等任务存在的不足. 展开更多
关键词 云原生系统 无服务器计算 多方数据库安全计算
在线阅读 下载PDF
Secure Two-Party Computational Geometry 被引量:37
12
作者 Shun-DongLi Yi-QiDai 《Journal of Computer Science & Technology》 SCIE EI CSCD 2005年第2期258-263,共6页
Secure Multi-party Computation has been a research focus in international cryptographic community in recent years. In this paper the authors investigate how some computational geometric problems could be solved in a c... Secure Multi-party Computation has been a research focus in international cryptographic community in recent years. In this paper the authors investigate how some computational geometric problems could be solved in a cooperative environment, where two parties need to solve a geometric problem based on their joint data, but neither wants to disclose its private data to the other party. These problems are the distance between two private points, the relation between a private point and a circle area, the relation between a private point and an ellipse area and the shortest distance between two point sets. The paper gives solutions to these specific geometric. problems, and in doing so a building block is developed, the protocol for the distance between two private points, that is also useful in the solutions to other geometric problems and combinatorial problems. 展开更多
关键词 secure multi-party computation oblivious transfer millionaire problem secure computation geometry PROTOCOL
原文传递
云计算网络安全等级保护测评系统的设计及功能测试 被引量:5
13
作者 乔木 《科学技术创新》 2025年第8期73-76,共4页
探究了云计算网络安全等级保护测评系统的设计要点,并对其基本功能的实现情况进行了测试。该系统采用B/S架构,客户端为Web浏览器,服务器包含表现层、业务逻辑层和数据层,与数据库之间进行双向通信。该系统的基本功能有用户管理、项目管... 探究了云计算网络安全等级保护测评系统的设计要点,并对其基本功能的实现情况进行了测试。该系统采用B/S架构,客户端为Web浏览器,服务器包含表现层、业务逻辑层和数据层,与数据库之间进行双向通信。该系统的基本功能有用户管理、项目管理、项目实施、风险分析与评价和报告管理五项。从测试情况来看,系统各项功能可以正常实现,在辅助测评人员高效、准确完成云计算网络安全等级保护测评工作方面发挥了重要作用。 展开更多
关键词 云计算 数据库 网络安全等级保护测评系统 风险分析
在线阅读 下载PDF
计算机网络与数据库的安全技术优化研究
14
作者 张世虎 《移动信息》 2025年第3期192-194,共3页
在数字时代,计算机网络与数据库已经成为企业与组织运作的重要部分。然而,由于网络攻击方式的多样性,传统的安全技术已很难应对日趋复杂的网络安全威胁,如何对安全技术进行优化就显得尤为重要。因此,文中对计算机网络与数据库的安全技... 在数字时代,计算机网络与数据库已经成为企业与组织运作的重要部分。然而,由于网络攻击方式的多样性,传统的安全技术已很难应对日趋复杂的网络安全威胁,如何对安全技术进行优化就显得尤为重要。因此,文中对计算机网络与数据库的安全技术优化进行了分析,并提出了有效的优化策略,保障了计算机网络相关工作的顺利开展,同时确保了数据库内的资料信息得到有效保管。 展开更多
关键词 计算机网络 数据库 安全技术
在线阅读 下载PDF
基于云计算的数据库通信安全检测系统
15
作者 刁家全 《通信电源技术》 2025年第2期10-12,共3页
针对云计算环境下数据库通信面临的诸多安全挑战,提出一种基于云计算的数据库通信安全检测系统。该系统集成数据采集、安全策略、检测分析及告警响应4大模块,利用深度包检测与智能策略生成技术,实现了对数据库通信中异常行为的有效识别... 针对云计算环境下数据库通信面临的诸多安全挑战,提出一种基于云计算的数据库通信安全检测系统。该系统集成数据采集、安全策略、检测分析及告警响应4大模块,利用深度包检测与智能策略生成技术,实现了对数据库通信中异常行为的有效识别。实验结果显示,系统在面对多种攻击类型时,检测准确率高于98%,平均延迟不超过4 ms,吞吐量不低于9.2 Gb/s,验证了其在保障云数据库安全方面的高效性与实用性。 展开更多
关键词 云计算 数据库安全 异常检测 智能策略
在线阅读 下载PDF
机房网络安全漏洞自动挖掘与定位方法研究
16
作者 刘青 《自动化应用》 2025年第18期270-272,共3页
传统的漏洞定位方法定位精度较低,为此,提出一种机房网络安全漏洞自动挖掘与定位方法。首先,设计机房网络安全态势感知模型,利用攻击关联性矩阵和网络态势评估函数,以精准感知机房网络的安全态势。然后,利用信息提取引擎和关联分析子模... 传统的漏洞定位方法定位精度较低,为此,提出一种机房网络安全漏洞自动挖掘与定位方法。首先,设计机房网络安全态势感知模型,利用攻击关联性矩阵和网络态势评估函数,以精准感知机房网络的安全态势。然后,利用信息提取引擎和关联分析子模块,并结合优化的目标函数和皮尔逊相关系数,对机房网络安全的漏洞进行自动挖掘。最后,建立漏洞数据库,并通过构建安全漏洞弧序列,引入蚁群算法,定位安全漏洞位置具体的网络节点。结果表明,该方法能够有效提升机房网络安全漏洞的定位精度,在不同场景下均无漏检和误检现象,具有实际应用价值。 展开更多
关键词 机房网络安全 安全态势感知 漏洞自动挖掘 漏洞定位 漏洞数据库
在线阅读 下载PDF
电网广域动态安全监测系统及其动态模拟试验 被引量:43
17
作者 肖晋宇 谢小荣 +4 位作者 李建 张涛 罗建裕 王小英 吴玉林 《电网技术》 EI CSCD 北大核心 2004年第6期5-9,共5页
介绍了一种新型电网广域动态安全监测系统及其动态模拟试验。该系统由 3 部分组成:以相量测量单元(PMU)为核心的子站系统、以同步相量数据平台为核心的主站系统和分析中心站高级应用系统。PMU 在子站实现相量的同步实时测量和打包发送;... 介绍了一种新型电网广域动态安全监测系统及其动态模拟试验。该系统由 3 部分组成:以相量测量单元(PMU)为核心的子站系统、以同步相量数据平台为核心的主站系统和分析中心站高级应用系统。PMU 在子站实现相量的同步实时测量和打包发送;主站系统对来自子站的相量数据进行再同步处理、存储管理以及转发,为高级分析功能提供实时的或历史的相量数据;分析中心站集成了用于实时在线监视与事后分析的软件。在清华大学电力系统大型发电设备安全控制与仿真国家重点实验室用 3 机 9 节点的试验系统,对该系统的性能进行了全面测试,进行了精度测试以及短路故障、线路无故障跳开和断线等多种扰动下的模拟试验。试验结果表明,该系统具备了对实际电网动态过程进行广域实时监测与分析的能力。 展开更多
关键词 电网 广域动态安全监测系统 动态模拟试验 电力系统
在线阅读 下载PDF
数据库应用系统中的安全访问代理的设计与实现 被引量:13
18
作者 徐恪 刘亚霄 刘卫东 《计算机工程与应用》 CSCD 北大核心 2000年第1期105-107,共3页
随着计算机网络的发展,基于计算机网络的数据库应用系统的安全问题日益突出。为了能够有效地利用现有的安全技术来增强网络数据库应用系统的安全性,该文提出了利用安全访问代理来进行数据库访问的技术,并描述了具体的设计和实现。为... 随着计算机网络的发展,基于计算机网络的数据库应用系统的安全问题日益突出。为了能够有效地利用现有的安全技术来增强网络数据库应用系统的安全性,该文提出了利用安全访问代理来进行数据库访问的技术,并描述了具体的设计和实现。为了提高安全访问代理的运行效率,减少网络流量,该文最后一部分还描述了安全访问代理中的数据缓存的实现。 展开更多
关键词 数据库 应用系统 安全访问代理 计算机网络
在线阅读 下载PDF
面向数据库应用的隐私保护研究综述 被引量:222
19
作者 周水庚 李丰 +1 位作者 陶宇飞 肖小奎 《计算机学报》 EI CSCD 北大核心 2009年第5期847-861,共15页
随着数据挖掘和数据发布等数据库应用的出现与发展,如何保护隐私数据和防止敏感信息泄露成为当前面临的重大挑战.隐私保护技术需要在保护数据隐私的同时不影响数据应用.根据采用技术的不同,出现了数据失真、数据加密、限制发布等隐私保... 随着数据挖掘和数据发布等数据库应用的出现与发展,如何保护隐私数据和防止敏感信息泄露成为当前面临的重大挑战.隐私保护技术需要在保护数据隐私的同时不影响数据应用.根据采用技术的不同,出现了数据失真、数据加密、限制发布等隐私保护技术.文中对隐私保护领域已有研究成果进行了总结,对各类隐私保护技术的基本原理、特点进行了阐述,还详细介绍了各类技术的典型应用,并重点介绍了当前该领域的研究热点:基于数据匿名化的隐私保护技术.在对已有技术深入对比分析的基础上,指出了隐私保护技术的未来发展方向. 展开更多
关键词 数据库应用 隐私保护 数据挖掘 数据发布 随机化 多方安全计算 匿名化
在线阅读 下载PDF
计算机弱点数据库综述与评价 被引量:8
20
作者 张永铮 方滨兴 迟悦 《计算机科学》 CSCD 北大核心 2006年第8期19-21,49,共4页
计算机弱点数据库已成为弱点研究的重要组成部分,对收集、存储和组织弱点信息具有重要意义。本文介绍了计算机弱点的定义及分类,分析并评价了现有的弱点数据库,最后讨论了其存在的问题以及将采取的技术路线。
关键词 网络安全 计算机脆弱性 安全漏洞 弱点分类法 弱点数据库
在线阅读 下载PDF
上一页 1 2 9 下一页 到第
使用帮助 返回顶部