期刊文献+

基于P2P的安全内联网即时通信系统

下载PDF
导出
摘要 本文描述了一个基于P2P技术的安全内联网即时通信系统的实现技术,企业用户交互数据无需通过外部服务器传输,防止内部数据流入公网,最大限度保护内部数据安全,提高系统可靠性,满足企业内部可性,安全便捷通信的需求。
出处 《科技视界》 2017年第2期45-45,共1页 Science & Technology Vision
基金 2015年国家级大学生创新训练计划项目(201510595006)
  • 相关文献

参考文献2

二级参考文献18

  • 1O'GORMAN L.Comparing passwords,tokens,and biometrics for user authentication[J].Proceedings of the IEEE,2003,91(12):2021-2040.
  • 2WAYMAN J,JAIN A,MALTONI D.Biometric Systems,Technology,Design and Performance Evaluation[M].Springer Publishing Company,2005.
  • 3OBAIDAT M S,SADOUN B.Verification of computer users using keystroke dynamics[J].IEEE Transaction on System,Man,Cybernetics,1997,27(2):261-269.
  • 4PUSARA M,BRODLEY C E.User re-authentication via mouse movements[A].Proceedings of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security,DMSEC Session[C].Washington DC,USA,2004.1-8.
  • 5GAMBOA H,FRED A.A behavioral biometric system based on human computer interaction[J].Proceedings of SPIE,2004,54:4-36.
  • 6AHMED A A E,TRAORE I.Anomaly intrusion detection based on biometrics[A].Proceedings of 6th IEEE Information Assurance Workshop[C].New York,USA,2005.452-453.
  • 7SHEN C,CAI Z M,GUAN X H,et al.Feature analysis of mouse dynamics in identity authentication and monitoring[A].Proceedings of the 2009 IEEE International Conference on Communication[C].Dresden,2009.1-5.
  • 8AHMED A A E,TRAORE I.Detecting computer intrusions using behavioral biometrics[A].3rd Annual Conference on Privacy,Security and Trust,St[C].Andrews,Canada,2005.91-98.
  • 9AHMED A A E,TRAORE I.A new biometric technology based on mouse dynamics[J].IEEE Transactions on Dependable and Secure Computing,2007,4(3):165-179.
  • 10GARG A,VIDYARAMAN S,UPADHYAYA S,et al.USim:a user behavior simulation framework for training and testing idses in GUI based systems[A].Proceedings of 39th Annual Simulation Symposium[C].Huntsville,AL,2006.196-203.

共引文献17

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部