期刊文献+

A Way to Set up Security Layer over Internet

A Way to Set up Security Layer over Internet
下载PDF
导出
摘要 A security architecture using secret key algorithm and vertical authentication mode is proposed. Establish security protocols in the chip of smart key at network client or mobile phone, and establish key exchange protocol in the chip of encryption cards at network key management center. A combined key real-time generation algorithm is used to solve the update and management problems. Online or offline authentication and documents encryption transmission protocols are adopted to achieve credible connection between users. Accordingly, set up security layer over Internet, which provides convenient encryption ability to each network user, and build credible and secure network system. A security architecture using secret key algorithm and vertical authentication mode is proposed. Establish security protocols in the chip of smart key at network client or mobile phone, and establish key exchange protocol in the chip of encryption cards at network key management center. A combined key real-time generation algorithm is used to solve the update and management problems. Online or offline authentication and documents encryption transmission protocols are adopted to achieve credible connection between users. Accordingly, set up security layer over Internet, which provides convenient encryption ability to each network user, and build credible and secure network system.
出处 《Journal of Computer and Communications》 2015年第5期174-181,共8页 电脑和通信(英文)
关键词 Security Layer VERTICAL AUTHENTICATION Combined SECRET Key Credible Network Online AUTHENTICATION OFFLINE AUTHENTICATION Security Layer Vertical Authentication Combined Secret Key Credible Network Online Authentication Offline Authentication
  • 相关文献

参考文献2

二级参考文献18

  • 1Sanjay Ghemawat, Howard Gobioff, Shun-Tak Leung. The google file system, http://labs.google.condpapers/gfs-sosp2003.pdf.
  • 2Mike Burrows. The chubby lock service for loosely-coupled distributed systems, http://labs.google.com/papers/chubby-osdi06.pdf.
  • 3Michael Armbrust, Armando Fox, Rean Griffith, et al. Above the clouds: a berkeley wiew of cloud computing.Communication Magazine, 2009.
  • 4IBM虚拟化与云计算小组.虚拟化与云计算.北京:电子工业出版社.2009.
  • 5Michael Miller著.姜进磊,孙瑞志,向勇等译.云计算.北京:机械工业出版社.2009.
  • 6刘黎明.云计算一第三次IT产业变革.http://labs.chinamobile.com/mblog/74856_1794.
  • 7尼古拉斯·卡尔.IT不再重要.北京:中信出版社,2008.
  • 8范承工.抢云市场先机,迎产业洗牌,http://storage.it168.com/a2009/0526/577/000000577295.shtml,2009.
  • 9电信运营商将主导企业云计算市场,http://labs.chinamobile.com/mblog/57950_11090.
  • 10中电信抢滩云计算在上海开建“信息银行”.http://www.ezcom.cn/Article/16813.

共引文献156

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部