The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A light-PKI Fast Authentication Model is proposed to improve the speed of communications authentication. In the light-PKI model, the root public key, CRL and canceled certificate are stored safely in terminal. It dose not need the TTP when two terminals authenticate each other. So, this model can enhance the authentication speed of PKI systems.
In this paper, a online undividable electronic cash scheme based on Schnorr digital signature is proposed. In the scheme, we introduce an authentication method of the business behaviour by using a random number, which effectively guarantees the right of the two trade parts. With analyzing, we find our scheme has many secure characters, such as, anonymity, unforgeability, exemption from repetitious...
Although electronic documents have been greatly improved in the transferring speed and processing speed, it would also result that electronic documents information is disclosed, counterfeited, tampered, repudiated and so on. In order to solve the above problems and greatly improve the security of electronic documents, this paper researches a hybrid encryption technology, that is, encryption technology,...
The electronic of government documents transmission and processing has greatly improved working efficiency. However, because the network has openness, connectivity and other features, resulting the network vulnerable to be attacked by hacker and viruses, and also resulting in information of electronic documents disclosure, counterfeiting, tampering, repudiation and many other issues. This paper firstly...
Signature Detection modules in IDS/IPS though accurate in pattern matching, yet it leads to false positives. This is due to the incompleteness of the signatures which lacks or has very little information about when, where and how to match these signatures. The signatures enriched with this information significantly brings down the false positives and at the same time enhances the performance of the...
A novel security scheme at network layer is proposed. It provides mutual authentication between the communication partners by adopting the effective combined public key (CPK) algorithm, which is an identity-based cryptosystem. And each outgoing packet can be digitally signed with CPK-based signature, which uses elliptic curve digital signature algorithm (ECDSA) and may offer equal security with a...
An authentication system based on trusted platform is presented in distributed network, network nodes are distributed in each domain, the domain authentication server based-TPM granted a certificate to each trusted member of domain and authorize trust token to access network source in different domain, in this paper, many security technologies are applied, member with trust token can span domain boundaries,...
This paper briefly describes what is a smart card and its standard authentication schemes. Additionally, this paper provides high level overview of code signing mechanisms, which serve the purpose to ensure the smart card application (possible provided by 3rd Party Application Provider) is genuine and from an authorized provider.
This article introduced the present situation of network information security and the present domestic network face existence main threat, as well as the prevent security threat main safety work classification and detailed explanation. Based on this elaboration this article main analysis each kind of invasion examinational technology characteristic and function superiority; In view of the current...
The paper describes a new electronic official seal system scheme based on the technologies of MD5, RSA and USBkey. In order to guarantee the reliability of transmitting data, the system develops the toolbar by utilizing VBA to found the toolbar object in WORD and calling CryptoAPI to realize encryption and decryption, and USBkey is applied to save the key and the digital certificate. Moreover, we...
Multicast is an efficient and natural way of communicating information via Internet, but its security is identified as one of the most important problems to solve for the successful deployment of group communication applications. First of all, in secure multicast group members must be able to verify that the data received is indeed sent by an authorized sender, and this is called dasiadata origin...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.