[1] |
WU Sujuan.The Research and Application of Data Encryption Technology in Computer Network Security[J]. Computer Knowledge and Technology, 2014, 10(36): 8633-8634.
|
|
吴苏娟. 计算机网络安全中数据加密技术的应用研究[J].电脑知识与技术,2014,10(36): 8633-8634.
|
[2] |
HOU Fangyong.Research on Key Techniques of Memory System Data Confidentiality and Integrity Protection[D]. Changsha: School of Computer National University of Defense Technology, 2015.
|
|
侯方勇. 存储系统数据机密性与完整性保护的关键技术研究[D].长沙:国防科学技术大学,2015.
|
[3] |
CHEN Shangyi.Transparent File Encryption Technology and Its Application[J]. Information Security and Communications Privacy, 2007, 7(11): 75-77.
|
|
陈尚义. 透明文件加解密技术及其应用[J].信息安全与通信保密,2007,7(11): 75-77.
|
[4] |
HU Hongyin, HE Chengwan.Design of Multiple Security Level Supported File Encryption Tool[J]. Computer Engineering and Design, 2011, 32(8): 2569-2571.
|
|
胡宏银,何成万.支持多种安全级别的文件加密工具设计[J].计算机工程与设计,2011,32(8): 2569-2571.
|
[5] |
CHENG Guoyong.Design and Application of Trusted Encryption Disk[D]. Beijing: Beijing University of Technology, 2013.
|
|
成国永. 可信加密磁盘的设计与应用[D].北京:北京工业大学,2013.
|
[6] |
SHEN Shanchao.Design and Realization of Disk Encrypt System[D]. Changchun: Jilin University, 2011.
|
|
沈善超. 整盘加密系统的设计与实现[D].长春:吉林大学,2011.
|
[7] |
SHAHBAZI M. Mobile Data Security System and Methods: U.S. Patent 8,495,700[P].2013-7-23.
|
[8] |
ZHANG Xin, FENG Quanyuan.Dynamic ID-based remote user authentication scheme[J]. Computer Engineering and Design, 2007, 28(3): 545-546.
|
|
张馨,冯全源.基于动态ID的远程用户身份认证方案[J].计算机工程与设计,2007,28(3):545-546.
|
[9] |
XIONG Jun.Application of User Identity Authentication Technology in Computer in Information Security[J]. Information Security and Technology, 2013, 4(6): 33-36.
|
|
熊俊. 用户身份认证技术在计算机信息安全中的应用[J].信息安全与技术, 2013,4(6): 33-36.
|
[10] |
ZHANG Hong, CHEN Zhigang.Design and Analysis of a New One-time Password Authentication Scheme[J]. Computer Engineering, 2004, 30(17): 112-113.
|
|
张宏,陈志刚.一种新型一次性口令身份认证方案的设计与分析[J].计算机工程,2004,30(17):112-113.
|
[11] |
LI Qingjun, GAN Meng.File Encryption Approach Based on Virtual Disk[J]. Computer Engineering and Design, 2006, 27(15): 2835-2838.
|
|
李清俊,甘萌.基于虚拟磁盘的文件加密方法[J].计算机工程与设计,2006, 27(15):2835-2838.
|
[12] |
NI Kaibin, YAO Guoxiang, GUAN Quanlong.Security Enhanced Virtual Disk Encryption System and Technology[J]. Journal of Computer Applications, 2009, 29(11): 2987-2989.
|
|
倪凯斌,姚国祥,官全龙.安全增强型虚拟磁盘加密系统技术[J].计算机应用,2009, 29(11):2987-2989.
|
[13] |
KORNBLUM J D.Implementing Bitlocker Drive Encryption for Forensic Analysis[J]. Digital Investigation, 2009, 5(3-4): 75-84.
|
[14] |
SUBAIR P S, BALAN C, DIJA S, et al. Forensic Decryption of FAT BitLocker Volumes[EB/OL]. , 2018-5-15.
|
[15] |
TAO Tianyi.Research and Implementation of Self-Securing Disk Encrypted System Based on TrueCrypt[D]. Beijing: Beijing University of Posts and Telecommunications, 2013.
|
|
陶天一. 基于TrueCrypt的自安全磁盘加密系统的研究与实现[D].北京:北京邮电大学,2013.
|