Full-Text Search:
Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
《Communications Technology》 2009-07
Add to Favorite Get Latest Update

Solution for Wireless Security Problem in Mobile Office System

YIN Zhi-yu①,WANG Chang-guang①②, JIANG Xing-hua③,GUO Qing① (①Physical Institute,Hebei Normal University,Shijiazhuang Hebei 050016,China; ②Computer Institute,Xi’an Electronic Science and Technology University,Xi’an Shaanxi 710071,China; ③Information Technology Institute,Hebei Normal University,Shijiazhuang Hebei 050016,China)  
With the appearance of mobile office and the development of wireless network technology,the wireless mobile office system emerges as the times demand. The security problem of private network and Internet wireless connection is increasingly prominent. Through the in-depth study on the wireless problem and by using SSL VPN,AES,ECC technologies,the solution for wireless security problem in mobile office system is provided.
【Fund】: 国家自然科学基金资助项目(60573036);; 河北省教育厅自然科学基金资助项目(Z2008447);; 河北师范大学青年基金资助项目(L2007Q13)
【CateGory Index】: TP393.08;TP317.1
Download(CAJ format) Download(PDF format)
CAJViewer7.0 supports all the CNKI file formats; AdobeReader only supports the PDF format.
Chinese Journal Full-text Database 2 Hits
1 LI Chun-lin①,HUANG Yue-jiang①,LIU Jian-gang②,GAO Xiang①,XIE Jing-tao①(①No.30 Institute of CETC,Chengdu Sichuan 610041,China; ②PLA Unit 65165,Harbin Heilongjiang 150080,China);A Solution for Secret Leakage by Cellphone in Enterprise Information Security[J];Communications Technology;2012-12
2 LIN Zhi-gang Information Center,The First Affiliated Hospital of Fujian Medical University,Fuzhou Fujian 350005,China;Construction and Application of Hospital Wireless Clinical Information System[J];China Medical Devices;2011-09
Chinese Journal Full-text Database 6 Hits
1 LIU Zhi-hong, ZHANG Chun-hua (Dept. Automation, No. 58 Research Institute of China Ordance Industries, Mianyang 621000, China);Glancing Analysis about OA System Development Technology[J];Ordnance Industry Automation;2005-03
2 ZHANG Hua(Software Theory and System Institute, School of Software,Tsinghua University, Beijing 100084,China);Research and Realization of Wireless Communication Network Security Based on Public Key Infrastructure[J];Telecommunication Engineering;2005-01
3 Zhu Daofei1 Wang Dongyan1,2 Chen Qianbin1 Long Keping11(COIWIN,Chongqing University and Posts and Telecommunications,Chongqing 400065)2(Datang Mobile Communication Co.,Beijing 100083);The Analysis of Wireless LAN Security Protocol[J];Computer Engineering and Applications;2005-09
4 LIU Zhong-qing,REN Xiao-yan(The Three Gorges University,Yichang Hubei 443002,China);Research on Key Algorithms of Point Multiplication on the Elliptic Curve Cryptosystem Based on Wireless Network Security[J];Communications Technology;2007-11
5 WANG Feng,ZHANG Xiao-qiang,ZHU Gui-liang(College of Information Engineering,North China Institute of Water Conservancy and Hydroelectric Power,Zhengzhou Henan 450011,China);A Block Image Element Encryption Algorithm Based on ECC[J];Communications Technology;2008-03
6 LANG Rong-ling, XIA Yu, DAI Guan-zhong (Department of Applied Mathematics,Northwestern Polytechnical University,Xi'an 710072,China) (Department of Automatic Control,North-western Polytechnical University,Xi'an 710072, China);Research on the Algorithm of Advanced Encryption Standard (AES)[J];Mini-micro Systems;2003-05
Chinese Journal Full-text Database 10 Hits
1 LIU Lian-hao,HU Zhi-yong(College of Information Science and Engineering, Central South University, Changsha 410083, China);The Decimal System Encryption Based on AES and Its Application in the Prepay System[J];Journal of Changsha University of Electric Power(Natural Science);2005-03
2 LI Zhi-tang,WU Yang(College of Computer Science and Technology,Huazhong University of Science and Technology,Wuhan 430074,China);Dynamic encryption approach based on wireless network[J];Journal of Dalian University of Technology;2005-S1
3 WANG Haike (Journal of Zhengzhou University,Zhengzhou 450001,China);AES Encryption Algorithm Based on Chaotic Sequence[J];Journal of Henan Institute of Engineering(Natural Science Edition);2010-02
4 Song Shengfeng;Analysis and Improvement of Wireless LAN Security Protocol[J];Ship Electronic Engineering;2007-03
5 Xu Qiting Wang Xin Gao Chuanshan(Department of Communication Science & Engineering,Fudan University,Shanghai 200433,China);APPLICATION AND STUDIES ON SECURITY ARCHITECTURE OF WIRELESS JAVA[J];Computer Applications and Software;2007-08
6 Feng Lingjie,Zhang Mei,Hu Yueming(Staet Engineering Research Centre for Precision Electronic Manufacturing Equipments,College of Automation,South China University of Technology,Guangzhou 510640,China);Research and Design of Peritoneal Dialysis Remote Monitoring System Information Security[J];Computer Measurement & Control;2011-04
7 Dai Yunwu Chen Shuya(1.School of Education Science, Gannan Normal College, Jiangxi Ganzhou 341000; 2.School of Math and Computer Science, Gannan Normal College, Jiangxi Ganzhou 341000);Analysis of Wireless Local Network Secuity[J];Science Mosaic;2008-12
8 MA Sheng-hai(Dept.of Computer,Xi' an University of Science and Technology,Xi'an Shaanxi,710054 China);Application of Digital Signautre Based on ECC in Mobile Office[J];Science & Technology Information;2010-05
9 GAO Wei-min,ZHU Ling-zhi(Computer and information science department,Hunan institute of technology,Hengyang Hunan 421002,China);Applicationof Chaos Encryption Algorithm in J2ME Platform[J];Computer Simulation;2013-03
10 Jiang Jianjun(School of Electronic Information, Shanghai DianJi University, Shanghai, 200240);Research into Security of WLAN Based on IEEE802.11b[J];Journal of Shanghai Dianji University;2006-02
Chinese Journal Full-text Database 10 Hits
1 Li Fudong Wu Weiming (Institute of Integrated Communication Network Technology of Beijing University of Posts and Telecommunications Beijing 100876);The Architecture of 3G Mobile OA Platform and Technology Related[J];Office Informatization;2008-04
2 YANG Yi-jiao~1,2,LU Wu-yi~1 ZHAO Hong~3 (1.School Of Information Science And Engineering, Central South University410083;2.Network Center, Changsha University of Science And Technology410076;3.Information Center,The Second Xiangya Hospital, Central South University410011,China);Design and Development of the Clinical Network Application Platform Based on WLAN and PDA[J];Journal of Changsha University of Electric Power(Natural Science);2005-01
3 Zhang Jing (Department of Communication Engineering, Nanjing University of Posts & Telecommunications, Nanjing 210003);Primary Problems on the Evolution From 2G to 3G[J];Telecom Engineering Techniques and Standardization;2005-09
4 Zhu Xia Wang Qian (Department of Computer Science and Engineering,Southeast University,Nanjing 210096,China);Design and implementation of data exchange model in heterogeneous systems[J];Journal of Southeast University(Natural Science Edition);2006-02
5 LI Huan(Huazhong University of Science and Technology,Wuhan 430074,China);Research of Mobile Application System Based on J2ME/J2EE[J];Computer Knowledge and Technology;2006-05
6 ZHAO Lei,ZHANG Jun-bao,HUANG Qing-song (Faculty of Information Engineering and Automation,Kunming University of Science and Technology,Kunming 650051,China);The Design of an Agent and J2ME—Based Mobile Application Platform[J];Computer Knowledge and Technology(Academic Exchange);2007-06
7 Zheng Zhibin1, Wu Hao2, Chen Jing1 (1.Huawei Technology Co., Ltd., Shenzhen 518129, China; 2. Beijing Jiaotong University, Beijing 100044, China);Research on Home Base Station Security Mechanism[J];Telecommunications Science;2009-04
8 GAO Xia,Li-qiong,TENG Lu-lingChinese Medicine Hospital of Gansu Province,Lanzhou Gansu China 730050;Application of Wireless Network in Hospital Information Construction[J];Gansu Journal of Traditional Chinese Medicine;2010-03
9 WU Qi-ming1,YI Yun-fei1,2(1.Department of Computer and In Formation Science,Hechi University,Yizhou,Guangxi 546300;2.College of Computer Science,South-central University for Nationalities,Wuhan,Hubei 430074,China);An Appropriate Middleware of Heterogeneous Database Based on XML[J];Journal of Hechi University;2007-05
10 ZHANG Yue-jin,XIE Xin,HUANG De-chang(School of Information Engineering,East China Jiaotong University,Nanchang 330013,China);Study and Implement of 3G Authentication Based on WPKI[J];Journal of East China Jiaotong University;2008-03
【Secondary References】
Chinese Journal Full-text Database 4 Hits
1 ;Mobile BPM-based Equipment Maintenance Integrated Information System[J];Industrial Control Computer;2013-04
2 LIU Xia,JIANG Zhou(Sanya Aviation & Tourism College,Sanya Hainan 572000,China);Mobile-phone Customization based on Information Security[J];Communications Technology;2013-08
3 JI Hong(Information Management Center,the Third Hospital of Peking University,Beijing 100191,China);Clinical Application of New Wireless Mobile Medical Care Vehicle[J];Chinese Medical Equipment Journal;2012-12
4 Yang Qigang 1 ,Zheng Wei 2 (Xiaogan tobacco monopoly administration 431600);Research and design of mobile office system design of tobacco[J];Electronic Test;2013-09
【Secondary Citations】
Chinese Journal Full-text Database 10 Hits
1 YANG Ya-li, CAI Na, NI Guo-qiang (School of Information Science and Technology, Beijing Institute of Technology, Beijing 100081, China);Digital Image Scrambling Technology Based on the Symmetry of Arnold Transform[J];北京理工大学学报(英文版);2006-02
2 CHEN Xue-jun~(1,2),XUE Zhi~1,ZHOU Chao-meng~2 (1.Department of Electric Communication,Shanghai Jiaotong University,Shanghai 200030,China; 2. China Satellite Maritime Tracking and Control Department,Jiangyin 214431,China);WPKI Model and Implementation Method[J];Telecommunication Engineering;2004-06
3 SUN Hong,YANG Yi-xian (Information Security Center,Beijing Univ.of Posts & Telecomm,Beijing 100876,China);On the Security of Wireless Network Protocol 802.11[J];Acta Electronica Sinica;2003-07
4 FU Mao-sheng~(1,2),LIU Wei~1,HOU Zheng-feng~2(1.Dept.of Computer Science & Technology,West Anhui University,Lu'an 237012,China;2.School of Computer and Information,Hefei University of Technology,Hefei 230009,China);Improvement of the algorithm of point multiplication on elliptic curves over GF(2~m)[J];Journal of Hefei University of Technology(Natural Science);2006-02
5 LI Ya~1, XU Jiang-feng~2 (1.Department of Information, Henan Institute of Eeconomic and Ttrade, Zhengzhou 450053,China; 2. School of Information and Engineering, Zhengzhou University, Zhengzhou 450052,China);The new development of based-chaos image encryption technology[J];Journal of Henan Normal University(Natural Science);2005-03
6 XIA Xian-Zhi ZHAO Yi (Computer Center of Chongqing Credit Union,Chongqing 400023) (Computer Information Center,Chongqing Jiaotong University,Chongqing 400074);The Research on Technical Advantages of ECC[J];Computer Science;2003-10
7 LI Tai-yong~1,JIA Hua-ding~2,WU Jiang~1(1.School of Economic Information Engineering,Southwestern University of Finance and Economics,Chengdu Sichuan 610074,China;2.Institute of Image and Graphics,Sichuan University,Chengdu Sichuan 610064,China );Study on digital image encryption algorithm based on 3D chaotic sequences[J];Journal of Computer Applications;2006-07
8 WHANG Yan-chun ZHANG Chen-xia ( Communication Science and Electric Engineering College, Qiqihar University, Qiqihar 161006 );Research of security for wireless Network[J];Journal of Qiqihar University(Natural Science Edition);2005-02
9 LIU Pei1,2, TENG Ling-ying1, SHE Kun1,2, ZHOU Ming-tian1,2 (1. Information Security United Lab of Westone, College of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu 610054, China;2. College of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu 610054, China);Security analyse of elliptic curve cryptosystem[J];Computer Engineering and Design;2006-16
10 LAI HUI(Information Security and National Computing Grid Labora-tory,Southwest Jiaotong University,Chengdu 610031,China);Fast Algorithm for Scalar Multiplication in Elliptic Curve Cryptography[J];;2007-09
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved