期刊文献+

基于Merkle树的移动平台文件完整性校验 被引量:1

File Integrity Check on Mobile Platform Based on Merkle Tree
下载PDF
导出
摘要 移动平台的下载业务是除消息类业务外另一类重要的移动增值数据服务,对下载过程的有效管理和控制是该业务稳定运营的前提。下载数据的完整性是下载业务的核心内容。描述了移动平台下载业务内容完整性校验方案。提出了Merkle树在移动平台内容完整性校验上的实现策略,该策略通过缩短校验值在网络传输中的大小,来有效减少完整性校验的代价。理论分析与工程项目证明,该机制具有较高的安全连通性和较低的网络延迟。 In addition to the message service, the download service is another important business.The effective management and control of the download process is a prerequisite for stable operations for the business.The data integrity is the core content for download business.This article describes the content integrity check program in the download process of a mobile platform.It proposes a content integrity check strategy on the mobile platform based on Merkle tree, which reduces the cost of the integrity check effectively by shortening the size of checksum on the course of the network transmission.Theoretical analysis and the project has proven that the mechanism has high security connectivity and low network latency.
出处 《计算机系统应用》 2010年第9期173-176,162,共5页 Computer Systems & Applications
基金 广州科技支撑计划(200922-D261)
关键词 完整性校验 移动平台下载业务 MERKLE树 integrity check download business on mobile platform Merkle tree
  • 相关文献

参考文献5

二级参考文献12

  • 1[1]Rivest R. The MD5 Message-Digest Algorithm[S]. RFC 1321. MIT Laboratory for Computer Science and RSA DATA Security,Inc.,April 1992.
  • 2[2]Touch J. Report on MD5 Performance[S]. RFC 1810. University of Southern California, June 1995.
  • 3[3]Dobertin H. The Status of MD5 After a Recent Attack[C]. CryptoBytes, Summer 1996.
  • 4[4]Kim GH,Spafford EH. The Design and Implementation of Tripwire: A File System Integrity Checker[R]. Purdue Technical Report CSD-TR-93-071,November 1993.
  • 5J Hockberg.NADIR:An Automated System for Detecting Network Intrusion and Misuse[J].Computers and Security, 1993; 12(3) :235-248.
  • 6James Cannady,James Mahaffey.The Application of Artificial Neural Networks to Misuse Detection : Initial Results[C].In :Proceedings of First International Workshop on the Recent Advances in Intrusion Detection, 1998-09.
  • 7J S Balasubram,J O Garcia-Fernandez,D Isacoff et al.An Architec ture for Intrusion Detection Using Autonomous agents[C].In :Computer Security Applications Conference, 1998 Proceedings, 14th Annual, 1998: 13-24.
  • 8Ragsdale Daniel J,Carver Curtis A Jr,Humphries Jeffrey W et al. Adaptation techniques for intrusion detection and intrusion response systems[C].In :Proceedings of the IEEE International Conference on Systems,Man and Cybernetics 4,2000-10.
  • 9Gene H Spafford,Eugene H.The Design and Implementation of Tripwire:A File System Integrity Checker[C].In:Proceedings of the ACM Conference on Computer and Communications Security, 1994-11:18.
  • 10吴世忠 祝世雄 张文政 等.应用密码学协议、算法与C源程序[M].北京:机械工业出版社,2000..

共引文献22

同被引文献2

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部