Generation and Distribution of Decoy Document System

3Citations
Citations of this article
2Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Currently a lot of the document data are leaked. We designed and implemented a decoy document system, which made up for the lack of traditional protection technology. We researched the document content generating technology, the document distributing technology and the document tracking and locating technology. We tested the system on networks, and our technology was proved to be effective. © Springer-Verlag Berlin Heidelberg 2014.

Cite

CITATION STYLE

APA

Wang, L., Li, C., Tan, Q. F., & Wang, X. B. (2014). Generation and Distribution of Decoy Document System. In Communications in Computer and Information Science (Vol. 426 CCIS, pp. 123–129). Springer Verlag. https://doi.org/10.1007/978-3-662-43908-1_16

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free