Security Protection of Software Programs by Information Sharing and Authentication Techniques Using Invisible ASCII Control Code.
I-Shi LeeWen-Hsiang TsaiPublished in: Int. J. Netw. Secur. (2010)
Keyphrases
- information sharing
- security protection
- source code
- java programs
- secure manner
- control flow
- information exchange
- data sharing
- share information
- legacy software
- homeland security
- emergency response
- network security
- software development
- public safety
- situation awareness
- information resources
- law enforcement
- intelligence and security informatics
- government agencies
- knowledge sharing
- control system
- data mining
- java virtual machine
- public safety networks
- criminal justice
- open standards
- emergency management
- public sector
- e government
- information systems