期刊文献+

安全短信通信技术研究 被引量:1

Research on Secure Short Message Communication Technology
下载PDF
导出
摘要 短信是人们沟通联系的重要手段之一,同时也是移动运营商为客户提供的基础服务。保障短信通信的安全对广大客户来讲意义重大。如果短信通信安全无法得到切实的保障,那么用户的隐私就无法得到保障,甚至会导致严重的损失。因此,研究安全短信通信管理,将更多新型可靠的安全保护技术应用到其中有十分重要的现实意义。本文将安全短信通信技术作为研究话题,首先,就短信通信机制进行了简单的分析,然后分析了安全短信通信技术的详细情况,最终明确了安全短信通信技术的解决方案,希望对维护短信通信的安全性有一定的借鉴和参考。 Short message is one of the most important means of communication,and it is also the basic service provided by mobile operators for customers. Safeguarding the security of short message communication is of great significance to customers. If the security of short message communication can not be effectively guaranteed,the privacy of users can not be guaranteed,and even serious losses occur. Therefore,it is of great practical significance to study the management of secure short message communication and apply more new and reliable security protection technologies to it. This paper regards secure short message communication technology as the research topic. Firstly,the communication mechanism of short message is simply analyzed,and then the details of secure short message communication technology are analyzed. The solution of secure short message communication technology is clarified. It is hoped that it can be used for reference in maintaining the security of short message communication.
作者 舒丽媛 SHU Liyuan(China Mobile Communications Group Hebei Co.,Ltd.,Shijiazhuang 050011,China)
出处 《现代信息科技》 2019年第13期78-79,共2页 Modern Information Technology
关键词 通信安全 短信通信技术 通讯服务 数据加密 communication security short message communication technology communication service data encryption
  • 相关文献

参考文献4

二级参考文献22

  • 1孙亮,张来顺,赵国磊.移动警务安全短消息通信系统设计[J].计算机技术与发展,2006,16(3):173-175. 被引量:5
  • 2聂明.短信网关在短信信息服务中的作用[R].信息产业部北京邮电设计院,2002..
  • 3Short Message Peer to Peer Protocol Specification v3.4[EB/OL].SMS Forum, 1999.
  • 4.中国移动通信信息资源站实体与互联网短消息网关接口协议(V1.3)[EB/OL].中国移动通信集团公司,2001.
  • 5Tang Chun Ming, Zhao Yan Meng. Identity—based undeniable signatures from bilinear pairings.[J]. Shenzhen Daxue Xuebao Ligong Ban (Journal of Shenzhen University of Science and Engineering), 2006, 1(23): 85—89.
  • 6Cheng Y., Liu K, Yang J. Human face recognition method based on the statistical model of small sample size[C]. SPIE Proc, Intell. Robots and Computer Vision X: Algorithms and Techn.1991, 1606: 85—95.
  • 7W. S. Yambor, B. A. Draper, J. R. Beveridge. Analyzing PCA—based face recognition a^orithim: Eigenvector selection and distance measures, Empirical evaluation methods in computer vision[M], H. Christensen andj. Phillips (eds.). World Scientific Press, Singapore, 2002.
  • 8杨轩.高级数据加密标准AES的Java实现与应用研究[D].2006.
  • 9MAO Wen—bo. Modem cryptography: theory and practice[M].北京: 电子工业出版社,2004.
  • 10Barreto PSLM, Kim HY, Lynn B, Scott M. E伍cient algorithms for pairing-based cryptosystems[C]. In: Yung M, ed. Proc. of the Advances in Cryptology—Crypto 2002XNCS 2442, Berlin, Heidelberg: Springer—Verlag, 2002. 354-368. 参考文献:.

共引文献2

同被引文献3

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部