• Title of article

    Information technology security using cryptography

  • Author/Authors

    R.، Sanchez-Reillo, نويسنده , , C.، Sanchez-Avila, نويسنده , , C.، Lopez-Ongil, نويسنده , , L.، Entrena-Arrontes, نويسنده ,

  • Issue Information
    روزنامه با شماره پیاپی سال 2003
  • Pages
    -20
  • From page
    21
  • To page
    0
  • Abstract
    It is widely known that information technology applications should be secured. During the last years, special efforts have been applied to achieve a great level of security. These efforts have increased security in some aspects, such as cryptographic algorithms and authentication techniques, etc. But many other security holes have appeared in these applications, making the improvements achieved a "waste of time and money". In this paper, some of these security holes are exposed. Using security hardware modules can overcome some of these holes, if they are designed according to the applications specification.
  • Keywords
    Intersubband transitions , mid-infrared , multiple-wavelength emission , quantum cascade laser , Quantum wells , Second-harmonic generation , nonlinear optics
  • Journal title
    IEEE AEROSPACE AND ELECTRONIC SYSTEMS MAGAZINE
  • Serial Year
    2003
  • Journal title
    IEEE AEROSPACE AND ELECTRONIC SYSTEMS MAGAZINE
  • Record number

    89846