A Study of Security on Computer Auditing Task-Based on Dual Complexities Using RSA and ElGamal Signatures
碩士 === 國防大學國防管理學院 === 國防資訊研究所 === 97 === Due to the vigorous development of infornations technology, the function of computer soft and hardware advances day by day. The computer popularrate of governmental agency and school continues to grow fast. Detailed information is established mostly in the co...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2008
|
Online Access: | http://ndltd.ncl.edu.tw/handle/57702972827945168057 |
id |
ndltd-TW-097NDMC1654020 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-097NDMC16540202015-10-13T13:08:48Z http://ndltd.ncl.edu.tw/handle/57702972827945168057 A Study of Security on Computer Auditing Task-Based on Dual Complexities Using RSA and ElGamal Signatures 電腦審計作業之安全性研究-以因數分解與離散對數雙重複雜度為研究構面 Feng-Mei Chen 陳鳳美 碩士 國防大學國防管理學院 國防資訊研究所 97 Due to the vigorous development of infornations technology, the function of computer soft and hardware advances day by day. The computer popularrate of governmental agency and school continues to grow fast. Detailed information is established mostly in the computer hard disk, magnetic tape or in the electromagnetism storage memory, causes the audit trail to reduce even predicament of gradually the evanishment. Auditors all levels of institution organization faced with strike unprecedentedly with challenge. The risks of auditing enhance largely. Facing the computerization tendency, employ the good computer auxiliary auditing technique is inevitable. This research is for the purpose of discussing in the audit work process to produce the system regarding the auditors all report formas, RSA and ElGamal of complexity visa way by the foctor, joins personnel’s status authentication to eradicate corrupt practices. And strengthens the electron financial reporting result potency in order to enhance enterprise internal control, so as to the enhancerment audit sevice quality, reduces the audit risk. Enables the advantage acceleration follow-up audit report circulation, moreover, to enter the step to become relizings the continuous computer audit footstone. Yen-Lin Yin 尹延齡 2008 學位論文 ; thesis 78 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 國防大學國防管理學院 === 國防資訊研究所 === 97 === Due to the vigorous development of infornations technology, the function of computer soft and hardware advances day by day. The computer popularrate of governmental agency and school continues to grow fast. Detailed information is established mostly in the computer hard disk, magnetic tape or in the electromagnetism storage memory, causes the audit trail to reduce even predicament of gradually the evanishment. Auditors all levels of institution organization faced with strike unprecedentedly with challenge. The risks of auditing enhance largely. Facing the computerization tendency, employ the good computer auxiliary auditing technique is inevitable. This research is for the purpose of discussing in the audit work process to produce the system regarding the auditors all report formas, RSA and ElGamal of complexity visa way by the foctor, joins personnel’s status authentication to eradicate corrupt practices. And strengthens the electron financial reporting result potency in order to enhance enterprise internal control, so as to the enhancerment audit sevice quality, reduces the audit risk. Enables the advantage acceleration follow-up audit report circulation, moreover, to enter the step to become relizings the continuous computer audit footstone.
|
author2 |
Yen-Lin Yin |
author_facet |
Yen-Lin Yin Feng-Mei Chen 陳鳳美 |
author |
Feng-Mei Chen 陳鳳美 |
spellingShingle |
Feng-Mei Chen 陳鳳美 A Study of Security on Computer Auditing Task-Based on Dual Complexities Using RSA and ElGamal Signatures |
author_sort |
Feng-Mei Chen |
title |
A Study of Security on Computer Auditing Task-Based on Dual Complexities Using RSA and ElGamal Signatures |
title_short |
A Study of Security on Computer Auditing Task-Based on Dual Complexities Using RSA and ElGamal Signatures |
title_full |
A Study of Security on Computer Auditing Task-Based on Dual Complexities Using RSA and ElGamal Signatures |
title_fullStr |
A Study of Security on Computer Auditing Task-Based on Dual Complexities Using RSA and ElGamal Signatures |
title_full_unstemmed |
A Study of Security on Computer Auditing Task-Based on Dual Complexities Using RSA and ElGamal Signatures |
title_sort |
study of security on computer auditing task-based on dual complexities using rsa and elgamal signatures |
publishDate |
2008 |
url |
http://ndltd.ncl.edu.tw/handle/57702972827945168057 |
work_keys_str_mv |
AT fengmeichen astudyofsecurityoncomputerauditingtaskbasedondualcomplexitiesusingrsaandelgamalsignatures AT chénfèngměi astudyofsecurityoncomputerauditingtaskbasedondualcomplexitiesusingrsaandelgamalsignatures AT fengmeichen diànnǎoshěnjìzuòyèzhīānquánxìngyánjiūyǐyīnshùfēnjiěyǔlísànduìshùshuāngzhòngfùzádùwèiyánjiūgòumiàn AT chénfèngměi diànnǎoshěnjìzuòyèzhīānquánxìngyánjiūyǐyīnshùfēnjiěyǔlísànduìshùshuāngzhòngfùzádùwèiyánjiūgòumiàn AT fengmeichen studyofsecurityoncomputerauditingtaskbasedondualcomplexitiesusingrsaandelgamalsignatures AT chénfèngměi studyofsecurityoncomputerauditingtaskbasedondualcomplexitiesusingrsaandelgamalsignatures |
_version_ |
1717733401362956288 |