文化大學機構典藏 CCUR:Item 987654321/19713
English  |  正體中文  |  简体中文  |  Items with full text/Total items : 46962/50828 (92%)
Visitors : 12461664      Online Users : 715
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version


    Please use this identifier to cite or link to this item: https://irlib.pccu.edu.tw/handle/987654321/19713


    Title: 資料在電腦系統安全處理之研究
    Authors: 王祥宇
    Contributors: 資訊管理學系
    Keywords: 檔案
    加密
    解密
    Date: 2010
    Issue Date: 2011-10-11 15:08:31 (UTC+8)
    Abstract: 資料必須安全的存放在電腦系統中,我們必須安全保護資料的安全性。將欲加密的資料與虛擬資料結合成一個文件,再設置加密資料表,並利用它的數據來加密文件製作成密文。加密完後再插入機密資料表在密文中,我們將密文存儲於電腦系統,當想要得到的原始的資料,使用解密演算法解密來還原它。每個使用者都有不同的位置碼來存儲插入加密資料表來加密密文。我們用位置碼來獲得這個位置中的資料加密密文。我們使用這加密資料表來進行解密。我們安裝這些加解密運算法在電腦系統處理中使它能安全處理。
    The security data must keep security in the computer system. We propose the safe treatment of these data in security. We insert the dummy data into the security data to combine to one file. We set encryption data and use it to encrypt the combined file to cipher text. After we insert encryption data to cipher text, we store the cipher text to the computer system. When we want to get the original security data, we use decryption algorithm to decrypt to get it. Every user has different location code to store encryption data in the cipher text. We use this location code to get encryption data in the cipher text. We use this encryption data to do decryption. When we install these algorithms in the computer system to process, it is more secure.
    Appears in Collections:[Department of Computer Science and Information Engineering] thesis

    Files in This Item:

    File Description SizeFormat
    index.html0KbHTML493View/Open


    All items in CCUR are protected by copyright, with all rights reserved.


    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback