• 综合
  • 标题
  • 关键词
  • 摘要
  • 学者
  • 期刊-刊名
  • 期刊-ISSN
  • 会议名称
搜索

作者:

Yu, Yan-Feng (Yu, Yan-Feng.) | Liu, Yi (Liu, Yi.) | Zhang, Shu-Jie (Zhang, Shu-Jie.) | Duan, Li-Juan (Duan, Li-Juan.) (学者:段立娟)

收录:

EI Scopus PKU CSCD

摘要:

In order to realize a trusted private network, firstly, trusted computing technologies are utilized. Then with the use of combined public key algorithm (CPK), the trust chain from trustworthy terminal can be led into private networks, and the USB Key technique is used to overcome the weakness of CPK. Finally, with the cryptogram management and security management as the center, a comprehensive secure defensive system is constructed, and a trusted network model is established to realize security, authenticity, controllability and reliability of private networks.

关键词:

Algorithms Computer networks Controllability Light emitting diodes Public key cryptography Reliability Security of data

作者机构:

  • [ 1 ] [Yu, Yan-Feng]College of Computer Science and Technology, Beijing University of Technology, Beijing 100022, China
  • [ 2 ] [Liu, Yi]Naval Institute of Computing Technology, Beijing 100841, China
  • [ 3 ] [Zhang, Shu-Jie]College of Computer Science and Technology, Beijing University of Technology, Beijing 100022, China
  • [ 4 ] [Duan, Li-Juan]College of Computer Science and Technology, Beijing University of Technology, Beijing 100022, China

通讯作者信息:

电子邮件地址:

查看成果更多字段

相关关键词:

相关文章:

来源 :

Journal of Beijing University of Technology

ISSN: 0254-0037

年份: 2006

期: 11

卷: 32

页码: 1032-1036

被引次数:

WoS核心集被引频次: 0

SCOPUS被引频次:

ESI高被引论文在榜: 0 展开所有

万方被引频次:

中文被引频次:

近30日浏览量: 5

在线人数/总访问数:407/2896127
地址:北京工业大学图书馆(北京市朝阳区平乐园100号 邮编:100124) 联系我们:010-67392185
版权所有:北京工业大学图书馆 站点建设与维护:北京爱琴海乐之技术有限公司