期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
浅谈网络安全
1
作者 王恩源 《哈尔滨职业技术学院学报》 2005年第4期72-73,共2页
计算机病毒和黑客攻击作为网络安全的主要隐患,时时刻刻在威胁着进行互联网应用的计算机系统的安全。防病毒软件和网络防火墙作为阻挡病毒和黑客入侵的主要手段,也已经成为网络安全建设不可缺少的必备条件。本文介绍了网络遭攻击时常见... 计算机病毒和黑客攻击作为网络安全的主要隐患,时时刻刻在威胁着进行互联网应用的计算机系统的安全。防病毒软件和网络防火墙作为阻挡病毒和黑客入侵的主要手段,也已经成为网络安全建设不可缺少的必备条件。本文介绍了网络遭攻击时常见的几种攻击手段。 展开更多
关键词 网络安全电子邮件 网络监听 定时炸弹 黑客技术
下载PDF
Improvements on robust email protocols with perfect forward secrecy
2
作者 蒋睿 胡爱群 杨晓辉 《Journal of Southeast University(English Edition)》 EI CAS 2008年第2期139-142,共4页
According to the security shortages of two robust practical email protocols with perfect forward secrecy, attacks on the two protocols are analyzed and corresponding improvements on the two protocols are proposed. Fir... According to the security shortages of two robust practical email protocols with perfect forward secrecy, attacks on the two protocols are analyzed and corresponding improvements on the two protocols are proposed. First, by analyzing the two email protocols, the corresponding man-in-the-middle attacks are proposed, where the adversary forges the messages in the receiving phase to cheat the two communication participants and makes them share the wrong session keys with him. Consequently, the man-in-the-middle attacks can make the two protocols fail to provide perfect forward secrecy. Secondly, by adding corresponding signatures in the receiving phases of the two protocols, two corresponding improvements on the protocols are proposed to overcome the man-in-the-middle attacks on the two protocols and make them provide perfect forward secrecy. Moreover, the two improved protocols can retain all the merits of the former protocols. 展开更多
关键词 man-in-the-middle attack EMAIL network security perfect forward secrecy
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部