Currently a lot of the document data are leaked. We designed and implemented a decoy document system, which made up for the lack of traditional protection technology. We researched the document content generating technology, the document distributing technology and the document tracking and locating technology. We tested the system on networks, and our technology was proved to be effective. © Springer-Verlag Berlin Heidelberg 2014.
CITATION STYLE
Wang, L., Li, C., Tan, Q. F., & Wang, X. B. (2014). Generation and Distribution of Decoy Document System. In Communications in Computer and Information Science (Vol. 426 CCIS, pp. 123–129). Springer Verlag. https://doi.org/10.1007/978-3-662-43908-1_16
Mendeley helps you to discover research relevant for your work.