Information technology security

被引:0
作者
Elliott, AT [1 ]
机构
[1] Univ Glasgow, Western Infirm, Glasgow G11 6NT, Lanark, Scotland
关键词
D O I
10.1097/00006231-200312000-00001
中图分类号
R8 [特种医学]; R445 [影像诊断学];
学科分类号
1002 ; 100207 ; 1009 ;
摘要
引用
收藏
页码:1205 / 1205
页数:1
相关论文
共 50 条
[31]   Trends in information security technology - Cryptography in the limelight [J].
Suzuki, M ;
Hayashi, S ;
Murata, Y .
NTT REVIEW, 1996, 8 (01) :24-31
[32]   The security and protection technology research of computer information [J].
Liu, Yu ;
Zhou, Jing .
PROCEEDINGS OF THE 2016 2ND INTERNATIONAL CONFERENCE ON MATERIALS ENGINEERING AND INFORMATION TECHNOLOGY APPLICATIONS (MEITA 2016), 2017, 107 :90-94
[33]   Towards Information Technology Security for Universal Access [J].
Cohen, Shiran ;
Ben-Asher, Noam ;
Meyer, Joachim .
UNIVERSAL ACCESS IN HUMAN-COMPUTER INTERACTION: DESIGN FOR ALL AND EINCLUSION, PT 1, 2011, 6765 :443-451
[34]   The application of information security technology in electronic commerce [J].
Chen, Xinyi .
2017 2ND INTERNATIONAL CONFERENCE ON MECHATRONICS AND INFORMATION TECHNOLOGY (ICMIT 2017), 2017, :380-383
[35]   Research on the security technology of big data information [J].
Zhu, Hong ;
Xu, Zheng ;
Huang, Yingzhen .
PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND MANAGEMENT INNOVATION, 2015, 28 :1041-1044
[36]   NEW THINKING ABOUT INFORMATION TECHNOLOGY SECURITY [J].
ABRAMS, MD ;
JOYCE, MV .
COMPUTERS & SECURITY, 1995, 14 (01) :69-81
[37]   Research of The Electronic Commerce Information Security Technology [J].
Chen, Xing .
PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON ANTI-COUNTERFEITING, SECURITY, AND IDENTIFICATION IN COMMUNICATION, 2009, :124-126
[38]   Evolving towards Caribbean Information Technology Security [J].
Thorpe, S ;
Verma, M .
IEEE SOUTHEASTCON 2003, PROCEEDINGS: BRIDGING THE DIGITAL DIVIDE, 2003, :100-104
[39]   The Security Protection and Technology Analysis of Information System [J].
Wang, Hua ;
Zhao, GuoHong ;
Shi, BoShan ;
Meng, XianJun .
INFORMATION TECHNOLOGY APPLICATIONS IN INDUSTRY, PTS 1-4, 2013, 263-266 :3130-3134
[40]   Based on the research of WSN in information security technology [J].
Zhao, Ke ;
Xiao, LongFei ;
Hu, YaLong ;
Wang, Zhong .
MECHATRONICS ENGINEERING, COMPUTING AND INFORMATION TECHNOLOGY, 2014, 556-562 :5976-5978