Paper Title:
Study on Chaotic Theory in an Information Security Management Approach
  Abstract

This paper discussed library under the network environment of the movement and the development. Digital Library will be understood as a new information environment is a more broad definition. The mandate of the Digital Library will focus on building a network of resources and resource organizations, the number of objects a unique identifier, metadata interoperability, digital resources, such as opening up links.

  Info
Periodical
Edited by
Honghua Tan
Pages
1976-1980
DOI
10.4028/www.scientific.net/AMM.29-32.1976
Citation
Z. G. Ji, "Study on Chaotic Theory in an Information Security Management Approach", Applied Mechanics and Materials, Vols. 29-32, pp. 1976-1980, 2010
Online since
August 2010
Authors
Export
Price
$32.00
Share

In order to see related information, you need to Login.

In order to see related information, you need to Login.

Authors: Chao Jing
Micro-Electronic Packaging Technology and Equipment
Abstract:Increasing number of network applications require authentication of the user's identity which is the first step to ensure security. This...
1791
Authors: Ya Qin Fan, Meng Guo, Chao Sun
Chapter 7: Mechanical & Automation
Abstract:In order to better meet the government, enterprises, schools and other units of information transmission of the security and confidentiality,...
1081
Authors: Chun Jiang Pang
Chapter 5: Information Processing and Computational Science
Abstract:This paper analyzes a sort of color still image algorithm based on the Logistic map sorting, and verifies the confidentiality. Further, this...
850
Authors: Yu Guang Yang, Hai Ping Chai
Chapter 1: Computing, Industrial Engineering and Technology
Abstract:In most existing authentication schemes users are authenticated by the server one by one which results in lower efficiency of authentication...
20
Authors: Chun Ling Cheng, Ya Shi Wang, Chun Ju Sun, Zhi Hua Zhang, Jiang Ning Wang
Chapter 16: Computer Applications in Industry and Engineering
Abstract:With the development of information technology in power industry, information security of the distribution automation system is facing...
2142