首页 | 本学科首页   官方微博 | 高级检索  
     检索      


Information technology security using cryptography
Authors:Sanchez-Reillo  R Lopez-Ongil  C Entrena-Arrontes  L Sanchez-Avila  C
Institution:Dpt. Tecnologia Electronica, Univ. Carlos III de Madrid, Spain;
Abstract:It is widely known that information technology applications should be secured. During the last years, special efforts have been applied to achieve a great level of security. These efforts have increased security in some aspects, such as cryptographic algorithms and authentication techniques, etc. But many other security holes have appeared in these applications, making the improvements achieved a "waste of time and money". In this paper, some of these security holes are exposed. Using security hardware modules can overcome some of these holes, if they are designed according to the applications specification.
Keywords:
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号