共 50 条
[31]
Trends in information security technology - Cryptography in the limelight
[J].
NTT REVIEW,
1996, 8 (01)
:24-31
[32]
The security and protection technology research of computer information
[J].
PROCEEDINGS OF THE 2016 2ND INTERNATIONAL CONFERENCE ON MATERIALS ENGINEERING AND INFORMATION TECHNOLOGY APPLICATIONS (MEITA 2016),
2017, 107
:90-94
[33]
Towards Information Technology Security for Universal Access
[J].
UNIVERSAL ACCESS IN HUMAN-COMPUTER INTERACTION: DESIGN FOR ALL AND EINCLUSION, PT 1,
2011, 6765
:443-451
[34]
The application of information security technology in electronic commerce
[J].
2017 2ND INTERNATIONAL CONFERENCE ON MECHATRONICS AND INFORMATION TECHNOLOGY (ICMIT 2017),
2017,
:380-383
[35]
Research on the security technology of big data information
[J].
PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND MANAGEMENT INNOVATION,
2015, 28
:1041-1044
[37]
Research of The Electronic Commerce Information Security Technology
[J].
PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON ANTI-COUNTERFEITING, SECURITY, AND IDENTIFICATION IN COMMUNICATION,
2009,
:124-126
[38]
Evolving towards Caribbean Information Technology Security
[J].
IEEE SOUTHEASTCON 2003, PROCEEDINGS: BRIDGING THE DIGITAL DIVIDE,
2003,
:100-104
[39]
The Security Protection and Technology Analysis of Information System
[J].
INFORMATION TECHNOLOGY APPLICATIONS IN INDUSTRY, PTS 1-4,
2013, 263-266
:3130-3134
[40]
Based on the research of WSN in information security technology
[J].
MECHATRONICS ENGINEERING, COMPUTING AND INFORMATION TECHNOLOGY,
2014, 556-562
:5976-5978