期刊文献+

纵向加密认证装置转发性能测试的研究 被引量:3

Study on Longitudinal Encryption and Authentication Device Forwarding Performance
下载PDF
导出
摘要 随着纵向加密认证装置在电力安全防护系统中的广泛部署,其转发性能对电力应用系统网络性能有着重要影响,对纵向加密认证装置的转发性能测试进行研究意义重大;设备的转发性能包括吞吐量及背靠背两项指标,在这两项指标传统单帧长测试方案的基础上,提出混合帧长吞吐量测试的方案,详细分析了测试范例及结果,并采用不确定度来评估测试结果的可信度;实验结果准确、有效地反映了纵向加密认证装置在理想及模拟真实的网络环境下处理数据包的能力,达到预期目标。 With longitudinal eneryption and authentication devices widely deployed in power security system, the forwarding performance of such devices has crucial effect on scheduling performance of the whole power network system. Forwarding performance testing becomes an important part of test for such devices. The forwarding performance of a device includes two indices, throughput and back--to--back. On the basis of the traditional single frame size testing scheme of these indices, the mixed frame sizes scheme is applied to throughput test. Besides, test cases and their results are analyzed in detail and measurement uncertainty is utilized to evaluate the credible level of test results. The test results accurately and efficiently express the packet processing capability of longitudinal encryption and authentication devices in the ideal and
出处 《计算机测量与控制》 CSCD 北大核心 2012年第3期606-609,共4页 Computer Measurement &Control
关键词 纵向加密认证装置 转发能力测试 吞吐量 背靠背 混合帧长 测量不确定度在线 longitudinal encryption and authentication device forwarding performance testing throughput back--to--back mixedframe sizes measurement uncertainty
  • 相关文献

参考文献4

二级参考文献7

  • 1龚雷,陈性元,唐慧林,祝宁.面向安全测试攻击工具库设计[J].微计算机信息,2008,24(3):75-77. 被引量:4
  • 2[1]Koblitz N. Elliptic curve crypto systems[J]. Mathematics of Computation. 1987, 48(17):203-209.
  • 3[2]Menezes A J, Vanstone S A. Elliptic crypto system and their implementation[J]. Journal of Cryptology, 1993,6 (4):209-224.
  • 4[3]Vanstone S, Elliptic curve crypto system-the answer to strong, fast public-key cryptography for securing constrained environments[R]. Elsevier Information Security Technical Report, 1997, 78-87.
  • 5[4]Calli W,Dawson E,Rea S.PKI elliptic curve cryptography and digital signatures[J].Intemational Joumal of Computer and Security,1999, 18(1):47-66.
  • 6[5]Rivest R L,Shamir A, Adleman L. A method for obtaining digital signatures and public-key crypto systems[J]. Communications of the association for computing machinery, 1978, 21(2):120-126.
  • 7周宏林.测量不确定度评定方法的探讨[J].计量与测试技术,2004,31(3):37-38. 被引量:8

共引文献36

同被引文献17

引证文献3

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部