期刊文献+
共找到169篇文章
< 1 2 9 >
每页显示 20 50 100
Implicit Continuous User Authentication for Mobile Devices based on Deep Reinforcement Learning 被引量:1
1
作者 Christy James Jose M.S.Rajasree 《Computer Systems Science & Engineering》 SCIE EI 2023年第2期1357-1372,共16页
The predominant method for smart phone accessing is confined to methods directing the authentication by means of Point-of-Entry that heavily depend on physiological biometrics like,fingerprint or face.Implicit continuou... The predominant method for smart phone accessing is confined to methods directing the authentication by means of Point-of-Entry that heavily depend on physiological biometrics like,fingerprint or face.Implicit continuous authentication initiating to be loftier to conventional authentication mechanisms by continuously confirming users’identities on continuing basis and mark the instant at which an illegitimate hacker grasps dominance of the session.However,divergent issues remain unaddressed.This research aims to investigate the power of Deep Reinforcement Learning technique to implicit continuous authentication for mobile devices using a method called,Gaussian Weighted Cauchy Kriging-based Continuous Czekanowski’s(GWCK-CC).First,a Gaussian Weighted Non-local Mean Filter Preprocessing model is applied for reducing the noise pre-sent in the raw input face images.Cauchy Kriging Regression function is employed to reduce the dimensionality.Finally,Continuous Czekanowski’s Clas-sification is utilized for proficient classification between the genuine user and attacker.By this way,the proposed GWCK-CC method achieves accurate authen-tication with minimum error rate and time.Experimental assessment of the pro-posed GWCK-CC method and existing methods are carried out with different factors by using UMDAA-02 Face Dataset.The results confirm that the proposed GWCK-CC method enhances authentication accuracy,by 9%,reduces the authen-tication time,and error rate by 44%,and 43%as compared to the existing methods. 展开更多
关键词 Deep reinforcement learning gaussian weighted non-local meanfilter cauchy kriging regression continuous czekanowski’s implicit continuous authentication mobile devices
下载PDF
Substance P and its tachykinin NK1 receptor: a novel neuroprotective target for Parkinson's disease 被引量:3
2
作者 Emma Thornton Robert Vink 《Neural Regeneration Research》 SCIE CAS CSCD 2015年第9期1403-1405,共3页
Parkinson's disease (PD) is the most common motor neurode- generative disorder affecting approximately 4 million people worldwide. Although PD presents primarily with motor dysfunction, non-motor symptoms including... Parkinson's disease (PD) is the most common motor neurode- generative disorder affecting approximately 4 million people worldwide. Although PD presents primarily with motor dysfunction, non-motor symptoms including cognitive decline, mood disorders, reduced olfaction and constipation are also of- ten present, with some of these non-motor symptoms even pre- senting prior to the onset of motor symptoms. It is well known that PD is largely caused by the gradual degeneration of dopa- minergic neurons within the substantia nigra pars compacta (SNc), along with the presence of protein aggregates called Lewy bodies, which consist primarily of ct-synuclein and are found in the cytoplasm of surviving neurons. This ongoing cell loss and Lewy body pathology is not confined to the SNc, but is also seen in other brain regions implicated in PD pathogenesis such as the locus ceruleus. 展开更多
关键词 NK a novel neuroprotective target for Parkinson’s disease substance P and its tachykinin NK1 receptor
下载PDF
Security Analysis of an Attractive Online Authentication Standard:FIDO UAF Protocol 被引量:1
3
作者 Kexin Hu Zhenfeng Zhang 《China Communications》 SCIE CSCD 2016年第12期189-198,共10页
FIDO(Fast IDentity Online) Alliance proposed a set of standard in 2014 for change the nature of online authentication. By now, it has drawn attention from many companies, including Google, VISA, Intel etc. In this pap... FIDO(Fast IDentity Online) Alliance proposed a set of standard in 2014 for change the nature of online authentication. By now, it has drawn attention from many companies, including Google, VISA, Intel etc. In this paper, we analyze the FIDO UAF(Universal Authentication Framework) Protocol, one of the two sets of specifications in the standard. We first present protocols' cryptographic abstractions for the registration and authentication protocols of the FIDO UAF. According to the abstractions, we discuss on selected security goals presented in the standard to study UAF security properties. We also propose three attacks, which the first two are based on an assumption that an attacker can corrupt the software installed on the user device, and the third is based on two users sharing a FIDO roaming authenticator. The results of the attacks are to impersonate the legitimate user to pass the online authentication. 展开更多
关键词 FIDO UAF protocol online authentication impersonation attack protocol’s cryptographic abstraction
下载PDF
Mapping the Child’s Grey Interior:Authenticity of Plague Narrative in The Great Plague
4
作者 SHI Long 《Journal of Literature and Art Studies》 2023年第4期272-275,共4页
The Great Plague:The Diary of Alice Paynton,London 1665-1666 adopts the realistic painting style and direct writing to the painful experience,describes the situation of the Great Plague in London truly from the perspe... The Great Plague:The Diary of Alice Paynton,London 1665-1666 adopts the realistic painting style and direct writing to the painful experience,describes the situation of the Great Plague in London truly from the perspective of children,and breaks people’s cognitive expectation of children’s literature,the construction of children’s Gray inner world is completed behind the true description of the Great Plague in London with the true brushwork,which presents a different world of childlike innocence.Despite the importance of epidemics writing in literature,the child’s diary perspective of them is one of the least developed of Plague Narrative.Only when authenticity and the child’s grey interior are integrated will we reveal a true picture of society as it was. 展开更多
关键词 The Great Plague The Diary of Alice Paynton authentICITY plague narrative the child’s grey interior
下载PDF
Authentication Methods for 802.11s Mesh Networks
5
作者 SangJae Moon 《China Communications》 SCIE CSCD 2007年第1期56-65,共10页
With the rapid development of the WLAN,the 802. 11 s mesh network is emerging.Reliability,adaptability and scalability are the most important attributes of a mesh network.However,the security in an 802.11s mesh networ... With the rapid development of the WLAN,the 802. 11 s mesh network is emerging.Reliability,adaptability and scalability are the most important attributes of a mesh network.However,the security in an 802.11s mesh network is not well defined or specified,and there is no standard method to authenticate a mesh point that is creating a mesh link.In this paper,we propose solutions for the authentication of mesh points.For the Basic Infrastructure Security Mode,we combine the 802.1X/EAP and neighbor graph to realize the fast mutual authentication between a new mesh point and every its mesh link.We prove that our scheme maintains the security of the standardized EAP authentication algorithm.At the same time,the simulation result shows that the authentication latency of our scheme is much lower than that of the scheme in[2].In the Basic Decentralized Security Mode(BDSM),802.11s mesh networks are very similar to ad hoc networks,but they are different in several aspects.We first analyze the differences between them.Based on this analysis, we investigate the main authentication methods used in ad hoc networks and select the pairwise key pre-distribution model and identity-based model for the WLAN mesh network. 展开更多
关键词 authentication 802.11s MEsH NETWORKs AD HOC NETWORKs
下载PDF
The predictive value of serum S1P and Adropin levels for the restenosis after cerebrovascular stent implantation and their relationship with vasoactive substances and cytokines
6
作者 Li Wang Zhi-Guo Li +2 位作者 Yan Liu Gao-Ying Dai Ping Xu 《Journal of Hainan Medical University》 2017年第11期79-82,共4页
Objective:To explore the predictive value of serum S1P and Adropin levels for the restenosis after cerebrovascular stent implantation and their relationship with vasoactive substances and cytokines.Methods:A total of ... Objective:To explore the predictive value of serum S1P and Adropin levels for the restenosis after cerebrovascular stent implantation and their relationship with vasoactive substances and cytokines.Methods:A total of 109 patients with cerebral infarction who accepted cerebrovascular stent implantation in our hospital between July 2012 and May 2016 were selected, their treatment outcome were reviewed, 35 patients with restenosis after cerebrovascular stent implantation were selected as observation group, and 74 patients without restenosis after cerebrovascular stent implantation were selected as control group. Serum S1P and Adropin levels were compared between two groups of patients before and after stent implantation, and the inner link of S1P and Adropin levels with vasoactive substance and cytokine levels in patients with restenosis after cerebrovascular stent implantation was further explored.Results: Before stent implantation, the differences in serum levels of S1P, Adropin, vasoactive substances and cytokines were not statistically significant between two groups of patients. After stent implantation, serum S1P and Adropin levels in observation group were lower than those in control group;serum vasoactive substance NO level was lower than that in control group while ET-1, TXB2 and AngⅡ levels were higher than those in control group;serum inflammatory factors TNF-α, IL-6, IL-10 and IL-13 levels were higher than those in control group. Pearson test showed that serum S1P and Adropin levels in patients with restenosis after cerebrovascular stent implantation were directly correlated with the levels of vasoactive substances and cytokines.Conclusion: Serum S1P and Adropin are lowly expressed in patients with restenosis after cerebrovascular stent implantation, and their specific expression are directly correlated with the levels of vasoactive substances and inflammatory cytokines, and can be used as the reliable indexes for early prediction of restenosis after cerebrovascular stent implantation. 展开更多
关键词 CEREBROVAsCULAR sTENT IMPLANTATION s1P Adropin Vasoactive substances
下载PDF
Authentication and Secret Message Transmission Technique Using Discrete Fourier Transformation
7
作者 Debnath BHATTACHARYYA Jhuma DUTTA +2 位作者 Poulami DAS Samir Kumar BANDYOPADHYAY Tai-hoon KIM 《International Journal of Communications, Network and System Sciences》 2009年第5期363-370,共8页
In this paper a novel technique, Authentication and Secret Message Transmission using Discrete Fourier Transformation (ASMTDFT) has been proposed to authenticate an image and also some secret message or image can be t... In this paper a novel technique, Authentication and Secret Message Transmission using Discrete Fourier Transformation (ASMTDFT) has been proposed to authenticate an image and also some secret message or image can be transmitted over the network. Instead of direct embedding a message or image within the source image, choosing a window of size 2 x 2 of the source image in sliding window manner and then con-vert it from spatial domain to frequency domain using Discrete Fourier Transform (DFT). The bits of the authenticating message or image are then embedded at LSB within the real part of the transformed image. Inverse DFT is performed for the transformation from frequency domain to spatial domain as final step of encoding. Decoding is done through the reverse procedure. The experimental results have been discussed and compared with the existing steganography algorithm S-Tools. Histogram analysis and Chi-Square test of source image with embedded image shows the better results in comparison with the S-Tools. 展开更多
关键词 Data Hiding authentication Frequency Domain DIsCRETE FOURIER Transformation (DFT) INVERsE DIsCRETE FOURIER TRANsFORM (IDFT) s-Tools
下载PDF
Approaching Contemporary Readers: Authenticities and Theme of Two Literary Works about the Holocaust, Sarah's Key and Schindler's Ark
8
作者 姜雨晴 《海外英语》 2017年第11期157-160,共4页
There have been disputes about the ethical fictionalization of the Holocaust.Among all the presentations,two contemporary literary works Sarah’s Key and Schindler’s Ark represent two different writings,fiction and n... There have been disputes about the ethical fictionalization of the Holocaust.Among all the presentations,two contemporary literary works Sarah’s Key and Schindler’s Ark represent two different writings,fiction and non-fiction.Through the comparison of the writing techniques and themes in the illusion of the horror,this essay aims at discussing the method of recording the humanity catastrophe when losing testimonies as time pass by and approaching modern readers with this historical themes authentically. 展开更多
关键词 HOLOCAUsT sarah’s Key schindler’s Ark authentICITY
下载PDF
基于CiteSpace的抑郁症食药物质干预研究的文献计量分析
9
作者 毛黎黎 周天玉 杨欣怡 《基层中医药》 2023年第10期111-118,共8页
目的 通过统计文献数据,绘制图谱,分析食药物质在抑郁症中的应用现状。方法 检索Web of Science核心合集数据库中有关抑郁症食药物质研究的文献,使用CiteSpace 5.7.R2软件对纳入的文献进行机构合作关系分析、期刊共被引分析,使用Note Ex... 目的 通过统计文献数据,绘制图谱,分析食药物质在抑郁症中的应用现状。方法 检索Web of Science核心合集数据库中有关抑郁症食药物质研究的文献,使用CiteSpace 5.7.R2软件对纳入的文献进行机构合作关系分析、期刊共被引分析,使用Note Express的文件夹信息统计功能进行年度发文量分析和高频食药物质分析。结果 共纳入文献144篇,分析发现2000—2022年抑郁症食药物质干预研究的发文量在曲折中缓步上升;人参、藏红花、百合等食药物质已经在抑郁症中得到应用,通过脑源性神经营养因子、 5-羟色胺、多巴胺、去甲肾上腺素等参与的多种代谢途径,减弱生物体的抑郁样行为;发文量较多的机构主要是中国的大学及其附属医院和伊朗的大学,同一国家内各机构间合作密切;研究成果主要发表在精神病学、药理学期刊上。结论 食药物质对抑郁症的意义不仅仅是相关指标的改善,更多应着眼于抑郁样行为的改变,更多的人群试验和更长的随访期在开展研究时需要被考虑;在食药物质的植物成分、理化性质及其对抑郁症的作用机制方面可进行更多更深入的研究。 展开更多
关键词 抑郁症 食药物质 文献计量分析 Citespace软件
下载PDF
基于B/S架构的项目管理系统的网络安全模式设计
10
作者 刘永志 《信息与电脑》 2023年第7期149-151,共3页
为实现对数据和系统的有效保护,以“项目管理系统”为研究对象,利用浏览器/服务器(Browser/Server,B/S)架构,分析3层网络架构的安全性,探讨系统应用的安全性,研究系统数据库访问的安全性,确保合法用户直接安全化访问和应用系统资源,避... 为实现对数据和系统的有效保护,以“项目管理系统”为研究对象,利用浏览器/服务器(Browser/Server,B/S)架构,分析3层网络架构的安全性,探讨系统应用的安全性,研究系统数据库访问的安全性,确保合法用户直接安全化访问和应用系统资源,避免因非法访问者入侵和攻击系统而造成系统重要数据出现丢失和泄露等问题,以期为相关人员提供有效的借鉴和参考。 展开更多
关键词 浏览器/服务器(B/s)架构 项目管理系统 身份验证 存储过程 网络安全模式
下载PDF
知识分享社区中的社交互动对用户隐私信息披露的影响
11
作者 王君 刘红德 +1 位作者 王亚妮 吴昊 《系统管理学报》 CSCD 北大核心 2024年第5期1284-1302,共19页
研究围绕用户隐私披露意愿和披露水平,探索了知识分享社区中的社交互动行为对用户隐私信息披露的影响机制。基于刺激-有机体-反应(Stimulus-Organism-Response,S-O-R)理论研究用户社交互动中的外界刺激如何影响隐私信息披露者的内在状态... 研究围绕用户隐私披露意愿和披露水平,探索了知识分享社区中的社交互动行为对用户隐私信息披露的影响机制。基于刺激-有机体-反应(Stimulus-Organism-Response,S-O-R)理论研究用户社交互动中的外界刺激如何影响隐私信息披露者的内在状态,进而影响其隐私信息披露意愿。采用问卷调查收集数据,验证提出模型及假设,并借助知识分享社区中的用户行为数据探究用户间的社交互动对其信息披露水平的影响。结果表明,社交互动对用户的自我效能、用户间信任和社会认同均产生显著促进作用,进而影响用户的隐私信息披露意愿。社交互动在一定程度上影响用户的信息披露水平,且账户信息认证起到一定的正向调节作用。研究结论能够为促进知识分享社区中用户信息的合理披露行为提供建议。 展开更多
关键词 社交互动 用户隐私信息披露 知识分享社区 账户信息认证 s-O-R模型
下载PDF
巴沙鱼片和龙利鱼片营养和风味成分对比分析
12
作者 李运燕 王萍亚 +4 位作者 薛静 何欣 赵巧灵 沈清 陈康 《食品研究与开发》 CAS 2024年第3期22-28,共7页
为从营养成分和风味物质差异方面研究巴沙鱼片和龙利鱼片的鉴定方法,该试验对两种鱼片的基本成分、氨基酸组成、脂肪酸、质构、色泽和风味物质进行分析。研究结果表明,龙利鱼肉相对于巴沙鱼肉蛋白质含量高而脂肪含量低。龙利鱼中风味氨... 为从营养成分和风味物质差异方面研究巴沙鱼片和龙利鱼片的鉴定方法,该试验对两种鱼片的基本成分、氨基酸组成、脂肪酸、质构、色泽和风味物质进行分析。研究结果表明,龙利鱼肉相对于巴沙鱼肉蛋白质含量高而脂肪含量低。龙利鱼中风味氨基酸的比例(18.29%)略高于巴沙鱼(15.47%),表明龙利鱼较美味、食用价值较高。根据测得的脂肪酸结果可知,龙利鱼中含有更多对健康有益的多不饱和脂肪酸,其中二十碳五烯酸(eicosapentaenoic acid,EPA)和二十二碳六烯酸(docosahexaenoic acid,DHA)总量龙利鱼(19.02%)高于巴沙鱼(2.39%)。通过质构和色差分析发现,巴沙鱼有更高的硬度和弹性,但透明度和亮度较低。在风味特征方面,巴沙鱼风味主体为醛类物质,具有较浓的土腥味,而龙利鱼中风味主体为鱼腥味物质。该研究结果表明脂肪酸和风味成分可作为巴沙鱼片和龙利鱼片鉴定的潜在指标。 展开更多
关键词 巴沙鱼 龙利鱼 品种鉴别 基本成分 风味物质
下载PDF
胶束电动毛细管色谱法分析头孢哌酮与其S-异构体等杂质 被引量:6
13
作者 张慧文 胡昌勤 +2 位作者 许明哲 李娅萍 杭太俊 《色谱》 CAS CSCD 北大核心 2007年第5期699-704,共6页
以十二烷基硫酸钠(SDS)胶束为准固定相,考察了头孢哌酮、头孢哌酮S-异构体、头孢哌酮杂质A及其他未知杂质在胶束电动毛细管色谱(MECC)分离模式下的分离行为。研究了运行缓冲液的pH值、磷酸盐浓度、SDS浓度、甲醇体积分数、分离电压、分... 以十二烷基硫酸钠(SDS)胶束为准固定相,考察了头孢哌酮、头孢哌酮S-异构体、头孢哌酮杂质A及其他未知杂质在胶束电动毛细管色谱(MECC)分离模式下的分离行为。研究了运行缓冲液的pH值、磷酸盐浓度、SDS浓度、甲醇体积分数、分离电压、分离温度等因素对头孢哌酮、S-异构体、头孢哌酮杂质A及其他杂质的迁移时间、分离度以及可分离出的杂质个数的影响。结果发现,这些因素对头孢哌酮与诸杂质间的分离及检测有显著的影响,尤以pH值为最。它不仅影响它们的迁移时间和分离效率,还直接影响头孢哌酮及其杂质峰的检测。优化后的分离条件:运行缓冲液为70mmol/L磷酸盐-100mmol/LSDS(pH6.5),分离电压为15kV,分离温度为25℃。在此条件下,用非涂渍石英毛细管51.0cm×75μm(有效长度42.5cm),压力进样5kPa×5s,在254nm波长下进行检测,可分离出28个杂质,诸杂质彼此间及与头孢哌酮间可得到有效分离。并将该方法成功地用于测定注射用头孢哌酮钠的含量和有关物质,结果令人满意。 展开更多
关键词 胶束电动毛细管色谱 头孢哌酮 头孢哌酮s-异构体 相关杂质
下载PDF
P2P-SIP网络通信安全方案 被引量:4
14
作者 王庆磊 张曦煌 高炳贞 《计算机工程与应用》 CSCD 北大核心 2010年第35期109-111,118,共4页
P2P和SIP融合技术已经普遍应用于多媒体通信中,它解决了传统的SIP网络单点失效的问题。但是由于现有的P2P-SIP缺少有效的认证方案,给其带来很多安全隐患。现有的P2P-SIP网络的认证方案大多采用节点的真实ID,不能满足其匿名性的特殊要求... P2P和SIP融合技术已经普遍应用于多媒体通信中,它解决了传统的SIP网络单点失效的问题。但是由于现有的P2P-SIP缺少有效的认证方案,给其带来很多安全隐患。现有的P2P-SIP网络的认证方案大多采用节点的真实ID,不能满足其匿名性的特殊要求。针对这个问题,提出了一种基于Diffie-Hellman算法的节点匿名认证方案DHB,该方案初始化阶段使用代理ID分发中心PIAC产生节点的假名。认证阶段采用改进的Diffie-Hellman算法和节点共享信息进行身份认证,实现了P2P-SIP中节点间的匿名认证。理论和实验分析表明,DHB可以有效抵御中间人攻击和猜测攻击,是一种安全有效的节点匿名认证方案。 展开更多
关键词 会话初始化协议 通信安全 匿名 认证
下载PDF
基于B/S结构的一种网络安全性解决方案 被引量:4
15
作者 甘志华 季超 《河南大学学报(自然科学版)》 CAS 北大核心 2005年第4期98-100,共3页
就B/S结构的安全性问题针对敏感信息的过滤,提出了一种解决方案.实际测试结果表明,这种方案有效可行.
关键词 B/s结构 认证 会话 安全
下载PDF
基于SOAP的Web远程监控系统 被引量:2
16
作者 董丽丽 祁飞 罗婵 《微电子学与计算机》 CSCD 北大核心 2006年第10期84-86,共3页
利用SOAP技术,构建远程设备监控系统。针对设备监控系统存在的问题,给出了基于SOAP技术的远程设备监控系统的一个实现方案,并着重探讨了其中的关键技术。
关键词 sOAP 统一身份认证 远程监控 B/s
下载PDF
烟草赤星病拮抗菌株S-7发酵条件的优化 被引量:4
17
作者 罗英 韩文君 李俊刚 《贵州农业科学》 CAS 北大核心 2010年第1期81-85,共5页
为了解决农用抗生素在品种和数量上远远不能满足农业对新型农用抗生素的需求问题,对防治烟草赤星病农用抗生素产生菌S-7菌株进行了培养基组分和发酵条件优化的研究。结果表明:S-7菌株培养基配方为葡萄糖3%、玉米面3%、(NH4)2SO40... 为了解决农用抗生素在品种和数量上远远不能满足农业对新型农用抗生素的需求问题,对防治烟草赤星病农用抗生素产生菌S-7菌株进行了培养基组分和发酵条件优化的研究。结果表明:S-7菌株培养基配方为葡萄糖3%、玉米面3%、(NH4)2SO40.4%、黄豆饼粉3%;最佳发酵条件为:在30℃条件下,接种量7.59/6~10%,初始pH值为7.0左右,培养36-40h的种子液经过96h振荡培养(200r/min)发酵后,其抑菌圈半径可达1.19cm。 展开更多
关键词 s-7菌株 烟草赤星病 发酵条件的优化 农用抗生素
下载PDF
S/Key协议的分析与改进 被引量:2
18
作者 王世卿 雷根平 +1 位作者 张红艳 唐瑾 《微计算机信息》 北大核心 2008年第36期60-61,173,共3页
本文分析了S/Key协议的安全性,指出了其中存在的安全漏洞。针对其不能抵抗冒充攻击和协议破坏攻击的缺陷,通过在认证过程中加入随机数,对S/Key协议进行了改进,并分析了改进方案的安全性。
关键词 s/KEY 身份认证 一次性口令
下载PDF
基于B/S结构的教务管理系统中的数字签名 被引量:7
19
作者 刘涛 侯正风 《安徽机电学院学报》 CAS 2002年第4期44-47,共4页
随着Internet/Intranet技术和教育事业的发展,教务管理系统正在由C/S结构的运行模式转为B/S结构的运行模式.在基于B/S模式下的教务管理信息系统中,为了防止非法用户录入或者修改学生的成绩,本文阐述了如何采用数字签名机制来进行用户身... 随着Internet/Intranet技术和教育事业的发展,教务管理系统正在由C/S结构的运行模式转为B/S结构的运行模式.在基于B/S模式下的教务管理信息系统中,为了防止非法用户录入或者修改学生的成绩,本文阐述了如何采用数字签名机制来进行用户身份认证,从而保证成绩的真实性和系统的安全性.通过对学生、教师、教学管理员、课程、课件及密钥等的管理以及数字签名在系统中的实现,使系统成为一个高效、完善、安全易用的管理信息系统. 展开更多
关键词 数字签名 身份认证 公开密钥密码体制 RsA算法 C/s结构 B/s结构 教务管理系统
下载PDF
用Java Socket实现高校信息化中用户动态口令身份认证 被引量:2
20
作者 申永军 董彬峰 吴小华 《现代教育技术》 CSSCI 2010年第1期120-123,共4页
身份认证作为网络应用系统的第一道防线,是最重要的安全服务。在高校信息化过程中,如何保障高校信息资源的安全性,已经受到越来越多的关注。文章基于S/Key一次性口令身份认证系统以及Java套接字,Applet等技术,详细介绍了如何用Java套接... 身份认证作为网络应用系统的第一道防线,是最重要的安全服务。在高校信息化过程中,如何保障高校信息资源的安全性,已经受到越来越多的关注。文章基于S/Key一次性口令身份认证系统以及Java套接字,Applet等技术,详细介绍了如何用Java套接字实现高校信息化系统中动态口令身份认证的过程,并相应的给出了一些关键代码。 展开更多
关键词 身份认证 s/Key系统 一次性口令 高校信息化
下载PDF
上一页 1 2 9 下一页 到第
使用帮助 返回顶部