期刊文献+

VPN客户端在Windows2000下的实现

Implementation of VPN client based on Windows 2000
下载PDF
导出
摘要 简要介绍了IPSec协议体系结构以及在Windows平台下利用NDIS驱动程序接口技术开发基于IPSec协议的VPN客户端软件的方法后,利用流程图阐述了内核模块输入和输出处理的过程以及应用模块的实现。这种借鉴有线网络中的VPN技术和Windows环境编程技术为安全移动办公提供了一种新思路。 The architecture of IPSec is introduced in this paper. Then, the authors propose the method of deve loping the VPN client based on IPSec,which use NDIS interface in Windows 2000 environment. The flow chart that treate process of input and out put core module is illustrated. And the realization for the module is given. This VPN technology that reference the wire network and the programming technology in Windows environment give a new way for moving office in security.
机构地区 重庆邮电学院
出处 《重庆邮电学院学报(自然科学版)》 2005年第6期752-754,共3页 Journal of Chongqing University of Posts and Telecommunications(Natural Sciences Edition)
基金 重庆市教委科学技术研究基金项目资助(050301)
关键词 IPSEC协议 NDIS驱动程序 VPN客户端 IPSec NDIS driver VPN client
  • 相关文献

参考文献6

  • 1CARLTOR D 周永彬 冯登国 徐震译[美].IPSec VPN 的安全实施[M].北京:清华大学出版社,2002.165-202.
  • 2王伟,白硕,刘道斌.Windows平台基于IPSec的VPN系统的研究与实现[J].计算机工程与应用,2003,39(15):154-156. 被引量:4
  • 3RFC2402-1998.IP Authentication Header[S].
  • 4RFC2406-1998.IP Encapsulating Security Payload (ESP)[S].
  • 5MICROSOFTC 冯博琴 朱丹军 薛涛 译.Windows 2000驱动程序开发大全(第1卷)设计指南[M].北京:机械工业出版社,2001..
  • 6SUNZhi-xin,WANGRu-chuan,WANGShao-di.Research on Mixed Encryption Authentication[J].The Journal of China Universities of Posts and Telecommunications,2003,10(4):90-94. 被引量:5

二级参考文献18

  • 1Wa1terOney.ProgrammingtheMicrosoftWindowsDriverMode1[M].微软出版社,1999..
  • 2原著Naganand Doraswamy Dan Harkins.IPSec——新一代因特网安全标准[M].机械工业出版社,2000..
  • 3Microsoft Windows 2000 DDK.Windows 2000 Driver Development Kit Document.
  • 4DAVIES W, PRICE W L. Security for computer networks[M]. Chichesfer: John Wiley & Sons, 1989.
  • 5DIFFER W, Van OORSCHOT P C, WIENER M J.Authentication and authenticated key exchanges [J].Disigns Codes and Cryptography, 1992, 2 (2): 107 -125.
  • 6SCHNERLER B. Applied cryptography-protocols, algorithms and sources code in C[M]. New York: Wiley & Sons Inc, 1994.
  • 7SILVERMAN R D, WAGSTAFF S S. A practical analysis of the elliptic carve factoring algorithm [J].Mathematics of Computation, 1993, 61 (4): 445 - 462.
  • 8LU Kai-cheng. Cryptography of computer--data secrecy & security in computer network [M]. Beijing:Tsinghua University Press, 1998.
  • 9DAI Zong-duo, YE Ding-Feng. Algebra theory of nonlinear finite automation--FAPK3 public key encryption system[J]. Communication Secrecy, 1996, (2):45-51.
  • 10PFLEEGER C P. Security in computing. Second edition[M]. Englewood Cliff, NJ: Prentice Hall, 1997.

共引文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部