Full-Text Search:
Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
《Journal of Ankang Teachers College》 2006-01
Add to Favorite Get Latest Update

The Design and Implementation of Campus Networks Security System Based on Public Key Infrastructure (PKI)

FU Yongping, ZHAO Yinliang, REN Qin'an, ZHONG Shenghai, FU Zhengfang ( Xi'an Jiaotong University, Xi 'an 710049; Ankang Teachers ' College, Ankang 725000, Shaanxi, China)  
In this paper, the author researched the character of Campus Networks, designed a Campus Networks security System based on Public key Infrastructure (PKI) and implemented the system based on JAVA.
【Fund】: 安康师范专科学校基金项目“X.509数字证书废除方案研究与改进”(2004AZX006)
【CateGory Index】: TP393.08
Download(CAJ format) Download(PDF format)
CAJViewer7.0 supports all the CNKI file formats; AdobeReader only supports the PDF format.
Chinese Journal Full-text Database 1 Hits
1 Li Zhenmin Zhao Jinrong(Network Center of Tsinghua University,Beijing100084);Design and Implementation of PKI for Campus Networks[J];Computer Engineering and Applications;2002-01
Chinese Journal Full-text Database 10 Hits
1 ZHANG Yu1, FEI Wen-xiao1, YU Bo2 (1. College of Computer, Southwest University of Science & Technology, Mianyang 621002, China; 2. College of Finance & Economics, Southwest University of Science & Technology, Mianyang 621002, China);Digital Certificate Based on PKI[J];Ordnance Industry Automation;2006-04
2 SHI Wei-min~1,GAO Hai-ying~2(1.College of Computer Science and Technology,Beijing University of Technology,Beijing 100022,China;2.Electronic Technology Institute,People's Liberation Army Information Engineering University,Zhengzhou 450004,China);A High Efficiency Certification Path Construction Algorithm of Cross Domain[J];Journal of Beijing University of Posts and Telecommunications;2006-05
3 YUAN Shu-xiong (Changsha Environmental Protection Institute, Changsha 410004);On Public Basic Facilities and Enterprise Network Safety Plan[J];;2005-02
4 XU Jun(School of Computer Science & Technology,Suzhou University,Suzhou 215006);On Digital Signing and Analysis of Its Defects[J];;2005-04
5 QIAN Yin-zhong(Software School,Changzhou College of Information Technology,Changzhou 213164);The Design and Application of Uniform Identity Authentication in Digital Campus[J];Journal of Changzhou Institute of Technology;2005-06
6 QU Chao-yang, WEN Wan-ru, WANG Fu-sen (Department of Information Engineering,Northeast China Institute of Electric Power Engineering,Jilin 132012);PKI and the application in email system of e-government[J];Journal of Northeast China Institute of Electric Power Engineering(Natural Science Edition);2005-06
7 ZHOU Quan,HUANG Ji-hai(Air Defense Forces Command Academy,Zhengzhou 450052,China);Scheme of signature step by step based on multi-agent[J];Electronics Optics & Control;2006-03
8 SHI Gui-xia 1 , YANG Jia-ming 2 (1. College of Computer Science and Technology,Donghua University,Shanghai,200051; 2. College of Infomation Science and Technology,Donghua University,Shanghai,200051);PKI Based Online Payment System[J];Journal of Donghua University(Natural Science);2006-06
9 ;Research on Turst Model based on PKI[J];Computer Development & Applications;2005-03
10 ;Analysis and Research of Multi-level Trust Models in PKI[J];Computer Development & Applications;2007-04
China Proceedings of conference Full-text Database 1 Hits
1 Lu HongCheng, Chen XinXiang (Computer School Beijing University Of Technology 100022);The research on application of PKI technology in OA System[A];[C];2006
Chinese Journal Full-text Database 4 Hits
1 YUAN Shu-xiong (Changsha Environmental Protection Institute, Changsha 410004);On Public Basic Facilities and Enterprise Network Safety Plan[J];;2005-02
2 LIN Xian-mao (The School of Computer, Hangzhou Institute of Electronics Engineering, Hangzhou Zhejiang 310037,China);The Network Information Security Systems Based on Data Encrypted Technology[J];Journal of Hangzhou Institute of Electronic Engineering;2001-01
3 Shang Jianwei, Li Daxing (Institute of Network Security, Shandong University, Jinan 250100);A Security Scheme of Public Key Infrastructure in an Enterprise[J];Communications Technology;2002-01
4 (The department of computer ,Changsha environmental protection institute yuanshuxiong,410004 China);Build PKI-based enterprise information application[J];Journal of Yichun University;2005-04
【Secondary Citations】
Chinese Journal Full-text Database 1 Hits
1 Kun Lei Zhao Jinrong (Network Centre,Tsinghua University, Beijing 100084);Network Security and the Proxy[J];Computer Engineering and Applications;2001-14
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved