期刊文献+
共找到13篇文章
< 1 >
每页显示 20 50 100
对一种基于IP标识协议隐写的分析 被引量:3
1
作者 刘光杰 戴跃伟 +2 位作者 叶登攀 顾霞 王执铨 《计算机工程》 CAS CSCD 北大核心 2007年第24期136-137,140,共3页
针对一种基于IP标识位协议隐写算法进行了分析,提出可实现隐写分析的统计变量的构造方法,给出分析窗口内含密数据包比率的估计算法,对如何提高算法的安全性给出了改进策略,实验结果表明了该算法的有效性。
关键词 隐写分析 议隐写 tcp/ip协
下载PDF
IPSec:网络安全与虚拟专用网的基础 被引量:8
2
作者 吕华锋 吴秋峰 《计算机工程与应用》 CSCD 北大核心 2001年第2期36-38,共3页
介绍了现存TCP/IP协议族的安全扩展——IPSec协议族的基本概念和各个重要组件,以及利用IPSec构建VPN的方法,并给出了一个基于IPSec的VPN实例——FreeS/WAN。
关键词 ipSEC 网络安全 虚拟专用网 INTERNET tcp/ip协
下载PDF
远动IEC60870-5-104网络通信协议及其安全防护技术 被引量:3
3
作者 陈国华 《电工技术》 2004年第6期7-8,共2页
远动 IEC60870.5-104网络通信协议是厂站至控制中心主站通过数据网络传输数据的协议,正逐步推广使用。本文介绍了该协议的体系结构,分析了其安全隐患,提出了安全防护措施。
关键词 网络通信 tcp/ip协许多方面 远动IEC60870-5-104 安全防护 电力系统 电网
下载PDF
Discovering Attack Path Oriented-IP Traceback 被引量:1
4
作者 傅建明 Zhu +2 位作者 Fuxi PENG Guojun 《High Technology Letters》 EI CAS 2003年第4期56-60,共5页
The technique of IP traceback may effectively block DOS (Denial Of Service) and meet the requirement of the computer forensic, but its accuracy depends upon that condition that each node in the Internet must support I... The technique of IP traceback may effectively block DOS (Denial Of Service) and meet the requirement of the computer forensic, but its accuracy depends upon that condition that each node in the Internet must support IP packet marking or detected agents. So far, this requirement is not satisfied. On the basis of traditional traceroute,this paper investigates the efficiency of discovering path methods from aspects of the size and order of detecting packets, and the length of paths.It points out that the size of padding in probed packets has a slight effect on discovering latency, and the latency with the method of bulk sending receiving is much smaller than one with the traditional traceroute. Moreover, the loss rate of packets with the technique of TTL (Time To Live) which increases monotonously is less than that with the technique of TTL which decreases monotonously. Lastly,OS (Operating System) passive fingerprint is used as heuristic to predict the length of the discovered path so as to reduce disturbance in network traffic. 展开更多
关键词 ip traceback network performance measurement path discovering network Security
下载PDF
Modeling TCP performance with proxy and ARQ
5
作者 金彦亮 杨宇航 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2006年第2期164-171,共8页
TCP/IP is a next generation key technology in the wireless communication network where the different characteristics of wireless and wired links result in performance degradation. We can use the proxy and automatic re... TCP/IP is a next generation key technology in the wireless communication network where the different characteristics of wireless and wired links result in performance degradation. We can use the proxy and automatic repeat request (ARQ) schemes to deal with this problem. In this work, we investigate the TCP performance over proxy and ARQ in the wireless network. Our analysis results showed that using the proxy can result in lower transfer latency and higher throughput and that ARQ can decrease the loss rate of wireless link and improve the performance with little additional latency. The analytical results were validated against simulations using the NS-2 with some more realistic parameters. 展开更多
关键词 tcp performance Wireless communication PROXY ARQ
下载PDF
T-IP: A Self-Trustworthy and Secure Internet Protocol
6
作者 Xiaofeng Wang Huan Zhou +3 位作者 Jinshu Su Baosheng Wang Qianqian Xing Pengkun Li 《China Communications》 SCIE CSCD 2018年第2期1-14,共14页
IPsec has become an important supplement of IP to provide security protection. However, the heavyweight IPsec has a high transmission overhead and latency, and it cannot provide the address accountability. We propose ... IPsec has become an important supplement of IP to provide security protection. However, the heavyweight IPsec has a high transmission overhead and latency, and it cannot provide the address accountability. We propose the self-trustworthy and secure Internet protocol(T-IP) for authenticated and encrypted network layer communications. T-IP has the following advantages:(1) Self-Trustworthy IP address.(2) Low connection latency and transmission overhead.(3) Reserving the important merit of IP to be stateless.(4) Compatible with the existing TCP/IP architecture. We theoretically prove the security of our shared secret key in T-IP and the resistance to the known session key attack of our security-enhanced shared secret key calculation. Moreover, we analyse the possibility of the application of T-IP, including its resilience against the man-in-the-middle attack and Do S attack. The evaluation shows that T-IP has a much lower transmission overhead and connection latency compared with IPsec. 展开更多
关键词 identity-based cryptography self-trustworthy LIGHTWEIGHT low latency in-cremental deployment
下载PDF
妙用两块网卡实现网卡路由
7
作者 梦之碎片 《家庭电脑世界》 2004年第10S期26-26,共1页
对于一个拥有2个网段的局域网来说.如果要求2个同段之间能够相互Ping通,并且可以通过网上邻居“互访,一般的方法大多使用路由器来实现;其实像这种普通的访问,我们完全可以通过Windows2000自带的“路由和拨号连接”服务,利用两张网... 对于一个拥有2个网段的局域网来说.如果要求2个同段之间能够相互Ping通,并且可以通过网上邻居“互访,一般的方法大多使用路由器来实现;其实像这种普通的访问,我们完全可以通过Windows2000自带的“路由和拨号连接”服务,利用两张网卡来实现网卡路由的功能,而不用购买价格昂贵的路由器。 展开更多
关键词 局域网 tcp/ip协许多方面 网络 服务器 路由器 网卡
下载PDF
让笔记本电脑在不同网络间切换
8
作者 与熊共舞 《计算机应用文摘》 2004年第14期i021-i021,共1页
关键词 笔记本电脑 局域网 ip地址 tcp/ip协许多方面 DHCP
下载PDF
Co-design for an SoC embedded network controller 被引量:4
9
作者 ZOU Lian-ying ZOU Xue-cheng 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2006年第4期591-596,共6页
With the development of Ethernet systems and the growing capacity of modem silicon technology, embedded communication networks are playing an increasingly important role in embedded and safety critical systems. Hardwa... With the development of Ethernet systems and the growing capacity of modem silicon technology, embedded communication networks are playing an increasingly important role in embedded and safety critical systems. Hardware/software co-design is a methodology for solving design problems in processor based embedded systems. In this work, we implemented a new 1-cycle pipeline microprocessor and a fast Ethemet transceiver and established a low cost, high performance embedded network controller, and designed a TCP/IP stack to access the Intemet. We discussed the hardware/software architecture in the forepart, and then the whole system-on-a-chip on Altera Stratix EP1S25F780C6 device. Using the FPGA environment and SmartBit tester, we tested the system's throughput. Our simulation results showed that the maximum throughput of Ethemet packets is up to 7 Mbps, that of UDP packets is up to 5.8 Mbps, and that of TCP packets is up to 3.4 Mbps, which showed that this embedded system can easily transmit basic voice and video signals through Ethemet, and that using only one chip can realize that many electronic devices access to the Intemet directly and get high performance. 展开更多
关键词 System-on-Chip (SoC) EMBEDDED MICROPROCESSOR Network controller tcp/ip CO-DESIGN
下载PDF
Research of data transmission security in videoconference system
10
作者 刘延龙 王春雷 孙志涛 《Journal of Coal Science & Engineering(China)》 2007年第3期384-388,共5页
Many coal enterprises have built the videoconference systems on their LAN (Local Area Network). As the development of these enterprises, their organizations are distributed over our country and even over the world. ... Many coal enterprises have built the videoconference systems on their LAN (Local Area Network). As the development of these enterprises, their organizations are distributed over our country and even over the world. Therefore, the videoconference systems have to run over WAN (Wide Area Network). Normally, the structure of a videoconference system is center_division including MCU (multi control unit)and participants. No QoS and security assurance are available now because all videoconference system is based on TCP/IP. Therefore, the system stability is absolutely depended on the Network. This paper discussed how to anti ARP attacking. The method discussed in this paper is based on TCP/IP. 展开更多
关键词 VIDEOCONFERENCE PROTOCOL tcp/ip ARP(Address Resolution Protocol) LAN(Local Area Network)
下载PDF
Performance analyses and optimization based on iSCSI
11
作者 李伟明 《Journal of Chongqing University》 CAS 2005年第1期47-49,共3页
The overhead in iSCSI subsystems is analyzed through the model of iSCSI reading and writing requests. An analytic model of iSCSI subsystem overhead is developed. According to the analytic model, the overhead of iSCSI ... The overhead in iSCSI subsystems is analyzed through the model of iSCSI reading and writing requests. An analytic model of iSCSI subsystem overhead is developed. According to the analytic model, the overhead of iSCSI subsystems is measured, which reveals that the main overhead is caused by protocol processing as well as kernel functions for fair allocation of system resources. Several methods have been proposed to optimize iSCSI subsystems, such as small I/O requests adherent that can be merged into a large I/O request. Checksum is found to be a time consuming work and may not be always necessary for applications. 展开更多
关键词 ISCSI performance analyses performance optimization ip SAN
下载PDF
计算机网络互连技术
12
作者 陈思云 刘心 沈思敏 《武汉工业大学学报》 CSCD 1995年第1期93-95,共3页
本文从计算机网络的开放性原理出发,阐述网格互连的技术、环境及设备。
关键词 计算机网络 互连 网关 tcp/ip协 网桥
原文传递
Trustworthy Mobile Network Architecture Based on Locator/Identity Split
13
作者 Haoxue Wang Ke Zhu Yuxiang Hu Dongnian Cheng 《Journal of Systems Science and Information》 2008年第1期71-80,共10页
Today's Internet architecture faces many challenges, from poor support for mobility to security threats. By analyzing the drawbacks of current TCP/IP protocol, we propose a new network architecture model LISNA. LISNA... Today's Internet architecture faces many challenges, from poor support for mobility to security threats. By analyzing the drawbacks of current TCP/IP protocol, we propose a new network architecture model LISNA. LISNA defines a kind of network architecture with mobility and trustworthiness, based upon the decoupling of end-host identity information from location information. This paper makes a brief description of the basic concepts and model structure that support network mobility and security. After introducing the key techniques in LISNA, the paper further illustrates how to promote the mobility handoff and to keep security association. 展开更多
关键词 location/identity split trustworthy mobile network LISNA network architecture model
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部