Full-Text Search:
Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
《Telecommunication Engineering》 2005-01
Add to Favorite Get Latest Update

Research and Realization of Wireless Communication Network Security Based on Public Key Infrastructure

ZHANG Hua(Software Theory and System Institute, School of Software,Tsinghua University, Beijing 100084,China)  
Security is becoming the key issue in current wireless communicating networks. In this paper Public Key Infrastructure( PKI) mechanism is proposed to protect network security. At first PKI is introduced, then the features and limitations of wireless communicating networks are discussed. A creative technology and solution is provided to apply PKI into wireless communicating networks. Finally a demo system using this solution is followed.
【CateGory Index】: TN925.93
Download(CAJ format) Download(PDF format)
CAJViewer7.0 supports all the CNKI file formats; AdobeReader only supports the PDF format.
【References】
Chinese Journal Full-text Database 2 Hits
1 Xu Qiting Wang Xin Gao Chuanshan(Department of Communication Science & Engineering,Fudan University,Shanghai 200433,China);APPLICATION AND STUDIES ON SECURITY ARCHITECTURE OF WIRELESS JAVA[J];Computer Applications and Software;2007-08
2 YIN Zhi-yu①,WANG Chang-guang①②, JIANG Xing-hua③,GUO Qing① (①Physical Institute,Hebei Normal University,Shijiazhuang Hebei 050016,China; ②Computer Institute,Xi’an Electronic Science and Technology University,Xi’an Shaanxi 710071,China; ③Information Technology Institute,Hebei Normal University,Shijiazhuang Hebei 050016,China);Solution for Wireless Security Problem in Mobile Office System[J];Communications Technology;2009-07
【Citations】
Chinese Journal Full-text Database 1 Hits
1 CHEN Xue-jun~(1,2),XUE Zhi~1,ZHOU Chao-meng~2 (1.Department of Electric Communication,Shanghai Jiaotong University,Shanghai 200030,China; 2. China Satellite Maritime Tracking and Control Department,Jiangyin 214431,China);WPKI Model and Implementation Method[J];Telecommunication Engineering;2004-06
【Co-citations】
Chinese Journal Full-text Database 5 Hits
1 HE Liang, TAN Cheng-xiang (Computer Application, Institute of Electronic and Information Engineering, Tongji University, Shanghai 201814,P.R.China);Design of Secured Short Message System for Wireless Business[J];Computer Security;2008-12
2 Li He1 Chen Sanming1 Wang Bin1,2(1.Guilin University of Technology,Guilin 541004,Guangxi;2.Graduate Department Jiamusi University,Jiamusi 154007,Heilongjiang);WPKI Architecture and Application Solution[J];Computer & Telecommunication;2009-01
3 ZONG Hua(Nanchang Customs of P.R.China,Nanchang330002,China);Research on Secure Model of Mobile OA Based on PKI[J];Computer and Modernization;2005-04
4 SUN Liang,ZHANG Lai-shun,ZHAO Guo-lei(Institute of Electronic Technology,The PLA Information Engineering University,Zhengzhou 450004,China);Design of Short Message Communication in Police Mobile Security System[J];Computer Technology and Development;2006-03
5 Han,Peisheng Zhang,Yanling Zhang,Han(Institute of Electronic Technology, the PLA Infor- mation Engineering University, Zhengzhou 450004, China);The Design and Implementation of CA in the Identity Authentication System based on Agent[J];;2006-23
【Co-references】
Chinese Journal Full-text Database 10 Hits
1 LIU Zhi-hong, ZHANG Chun-hua (Dept. Automation, No. 58 Research Institute of China Ordance Industries, Mianyang 621000, China);Glancing Analysis about OA System Development Technology[J];Ordnance Industry Automation;2005-03
2 YIN Xu-dong~1,PAN Qi-yong~2 (1.Changshu Gaozhuan Electric Equipment Co.,Ltd.,Changshu 215500,China; 2.Dept.of phys.Changshu College,Changshu 215500,China);The Research of Developing Application Program in Mobile Information Device Using J2ME Technology[J];Journal of Changshu College;2004-02
3 YANG Yu-feng, LI Yun, MEI Shun-liang iversity,Beijing 100084,China);A Solution to Mobile Computing Application Based on J2ME and PHP Technology[J];Telecommunication Engineering;2004-03
4 PENG Wei-hua (Department of ComputerHunan College of International Economics and Business Changsha,Hunan 410000,China);Security of mobile-business and analysis of its prospects[J];Computer and Information Technology;2005-04
5 ;A Consideration on Near Field Communication Technical Standard[J];Information Technology & Standardization;2006-05
6 Zhu Liqi, Huang Benxiong (Huazhong University of Science and Technology, Wuhan 430074, China);Formal Analysis and Amendment of AKA Protocol for 3G Mobile Communication System[J];Electronic Engineer;2004-05
7 JU Wei-cheng, YU Cheng-fang (Department of Electronic Engineering, Fudan University,Shanghai 200433,China);An Anti-Collision RFID Algorithm Based on the Dynamic Binary[J];Journal of Fudan University;2005-01
8 YAN Yue-feng~1, NIE Rui-hua~(1-2) (1. Dept. of Computer Science, South China Normal University,Guangzhou, Guangdong, 510631, P.R.China;2. Institute of E-education, South China Normal University, Guangzhou, Guangdong, 510631, P.R.China);The Research and Application of the Security of XML Data in Logistic Information System[J];Journal of Guangdong Education Institute;2005-03
9 CAO Ping~1,BAO Zhi-hua~2,YOU Yu-jun~1(1.Nanjing University of Posts and Telecommunications,Nanjing 210003,China;2.Nantong University,Nantong 226007,China);Research on anti-collision technology in near field communication[J];Information Technology;2007-01
10 SHANG Lei-ming~1,GUAN Ya-fei~2,SHI Bi-ming~1 (1.Dept. of Resource Exploration and Management Engineering, Anhui University of Science and Technology, Huannan ,Anhui 232001,China; 2.Sui xi Corporation of Power Supply, Suixi, Anhui 232001,China);Communication Mode between J2ME MIDP and J2EE Platform[J];Journal of Anhui University of Science and Technology(Natural Science);2004-S1
【Secondary References】
Chinese Journal Full-text Database 1 Hits
1 YANG Jian-qiang(Department of Electrical Information Engineering, Xiangfan University, Xiangfan 441053);Research on Security Technology of Web Services Based on Java ME/MIDP[J];Modern Computer;2007-06
【Secondary Citations】
Chinese Journal Full-text Database 2 Hits
1 LIU Jia-yong,ZHOU An-ming,FANG Yong (Information Security Institute,Sichuan University, Chengdu 610064,China);A Scheme for the Session Key Exchange and Identity Authentication Based on Smart Card[J];Telecommunication Engineering;2003-01
2 FANG Yong, LIU Jia-yong, GONG Hai-peng, OU Xiao-cong (Institute of Information Security, Sichuan University, Chengdu 61004, China);Implementation of Private Key Management[J];Telecommunication Engineering;2004-01
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved