期刊文献+

AES加密的WiFi安全智能签到系统的设计与实现 被引量:2

Design and Implementation of WiFi Security Intelligent Check-in System Encrypted by AES
下载PDF
导出
摘要 针对现有的基于WiFi签到系统只考虑系统设计及功能实现,未考虑到数据的安全传输问题,提出利用随机数加时间戳作为密钥,使用AES算法加密服务器之间的通信数据,保证无线控制服务器、认证服务器及签到服务器间个人信息的安全传输。最后,利用微信向客户端发送签到信息。实验结果表明,服务器端能够精准地获取客户端的签到时间、地点及个人信息,保证了师生信息的安全。 Aiming at the fact that the existing WiFi-based check-in system only concerns system design and function realization,but hardly considers the problem of data security transmission,this paper proposed using random number plus time stamp as key and using AES algorithm to encrypt communication data between servers,so as to ensure the secure transmission of personal information among wireless control servers,authentication servers and check-in servers.Finally,we used Wechat to send check-in information to the clients.The experimental results show that the server can accurately obtain the check-in time,place and personal information of the clients,which ensures the security of the information of teachers and students.
作者 石玲玲 SHI Lingling(Modern Educational Technology Center,Anhui University of Science and Technology,Huainan Anhui 232001,China)
出处 《安徽理工大学学报(自然科学版)》 CAS 2019年第4期56-59,共4页 Journal of Anhui University of Science and Technology:Natural Science
基金 安徽理工大学青年教师科学研究基金资助项目(QN2017224)
关键词 WIFI AES 智能签到系统 微信平台 WiFi AES intelligent check-in system WeChat platform
  • 相关文献

参考文献9

二级参考文献90

  • 1罗斌,裘正定.网络身份认证新技术[J].计算机安全,2005(10):29-31. 被引量:14
  • 2陈飞翔,杨崇俊,申胜利,于文洋,杨建宇.基于LBS的移动GIS研究[J].计算机工程与应用,2006,42(2):200-202. 被引量:43
  • 3薛辉,王再芊,梁晶,王平,安凯.网络身份认证若干安全问题及其解决方案[J].计算机与数字工程,2007,35(1):81-83. 被引量:6
  • 4Y. Xu, C. Lin, W. Zhao. Producing computationally efficient KPCA- based feature extraction for classification problems[J]. Electronics Letters (SCI), 2010,46(6), 452-453.
  • 5Zarzoso V,Comon P, Robust independent component analysis by iterative maximization of the kurtosis contrast with algebraic optimal step size[J]. IEEE Transactions on Neural Networks . 2010, (21) : 248-261.
  • 6O. Lahdenoja, M. Laiho, A. Paasio, "Reducing the feature vector length in local binary pattern based face recognition" Proc[C]. IEEE International Conference on Image Processing (2005),Genoa, Italy, vol. 2, pp. 914-917.
  • 7Lipton A .,Fujiyoshi H.,Patil R. Moving Target Classification and Tracking from Real Time video[C].In Proceedings of the Workshop on Application of computer Vision,October,1998,47-58.
  • 8孙卓实时人眼跟踪与眨眼检测[D].杭州:浙江大学,2008.
  • 9Lin You,Jie Lu. A Novel Fuzzy Vault Scheme for Secret Key Exchange[C].International Conference on Security and Cryptography, 2012:426-429.
  • 10袁立,穆志纯.一种人耳生物特征模板保护方法[C].第三十一届中国控制会议论文集B卷,2012:5.

共引文献168

同被引文献14

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部