期刊文献+

计算机网络安全技术初探 被引量:3

Discussion of Computer Network Security Technology
下载PDF
导出
摘要 本文介绍了网络安全的来源和TCP/IP协议的安全漏洞 ,同时介绍了当前网络采用的各种安全防范技术 。 This paper introduces the threat source of network security and security problems of TCP/IP, and at the same time introduces all kinds of security technology,which have reference value for recognizing network and network security.
出处 《电讯技术》 北大核心 2001年第6期99-101,共3页 Telecommunication Engineering
关键词 计算机网络 网络安全 TCP/IP协议 防火墙 Computer network Network security TCP/IP Fire wall
  • 相关文献

参考文献1

二级参考文献3

共引文献29

同被引文献23

  • 1陈帅,钟先信,巫正中.无线传感器网络混沌分组密码研究[J].中国科学(F辑:信息科学),2009,39(3):357-362. 被引量:6
  • 2Ahlswede R, Cai N, Li R, et al. Network Information Flow [J]. IEEE Transactions on Information Theory,2000,46(4) : 1204- 1216.
  • 3Li S Y, Yeung R W, Cai N. Linear network coding[J]. IEEE Transactions on Information Theory,2003,49(2) :371 - 381.
  • 4Cai N, Yeung R W. Secure network coding[ C ]//Proceedings of 2002 IEEE International Symposium on Information Theory. Lausanne, Switzerland: IEEE, 2002: 323.
  • 5Cai N, Yeung R W. A security condition for multi-source linear network coding[C]//Proceedio.gs of 2007 IEEE International Symposium on Information Theory. Los Alamitis, CA, USA: IEEE, 2007 : 561 - 565.
  • 6Jain K. Security based on network topology against the wiretapping attack[J]. IEEE Wireless Communications, 2004,11 (1) :68 - 71.
  • 7Bhattad K, Narayanan K R. Weakly secure network coding [ C ]//Proceedings of First Workshop on Network Coding, Theory, and Applications. Riva del Garda, Italy: IEEE, 2005 : 1 - 5.
  • 8Lima L, Medard M, Barros J. Random linear network coding: A free cypher? [C]// Proceedings of 2007 IEEE International Symposium on Information Theory. Washington, DC: IEEE,2007:546 - 550.
  • 9Feldman J, Malkin T,Stein C, et al. On the capacity of secure network coding[ C]//Proceedings of the 42nd Annual Allerton Conference on Communication, Control, and Computing. Monticello, IL, USA: IEEE, 2004.
  • 10Jain K. Security based on network topology against the wiretapping attack [ J]. IEEE Wireless Communications, 2004, 11(1):68-71.

引证文献3

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部