Full-Text Search:
Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
《Computer Systems & Applications》 2010-09
Add to Favorite Get Latest Update

File Integrity Check on Mobile Platform Based on Merkle Tree

ZHANG Xiao-Yan, FAN Bing-Bing (Dept.of Computer, South China Normal University, Guangzhou 510631, China)  
In addition to the message service, the download service is another important business.The effective management and control of the download process is a prerequisite for stable operations for the business.The data integrity is the core content for download business.This article describes the content integrity check program in the download process of a mobile platform.It proposes a content integrity check strategy on the mobile platform based on Merkle tree, which reduces the cost of the integrity check effectively by shortening the size of checksum on the course of the network transmission.Theoretical analysis and the project has proven that the mechanism has high security connectivity and low network latency.
【Fund】: 广州科技支撑计划(200922-D261)
【CateGory Index】: TN929.5
Download(CAJ format) Download(PDF format)
CAJViewer7.0 supports all the CNKI file formats; AdobeReader only supports the PDF format.
Chinese Journal Full-text Database 1 Hits
1 Wang Dongbin 1 Fang Binxing 2 Yun Xiaochun 11 (Department of Computer Science and Technology,Harbin Institute of Technology,Harbin150001) 2 (National Computer Network and Information System Security Administration Center,Beijing100031);The Research of Intrusion Detection and Recovery System Based on File Integrity Checker[J];Computer Engineering and Applications;2003-31
Chinese Journal Full-text Database 5 Hits
1 TIAN Wen-yan (Shenzhen senior Technical Institute,Shenzhen 518000,China);The Encryption Techniques of MD5 about User Accounts in ASP Web[J];Computer Knowledge and Technology(Academic Exchange);2007-01
2 GAO Fa-gui~1,GAO Lu~2,XU Kai-peng~1 (1.College of Information Engineering,Hubei Institute for Nationalities, Enshi 445000, China; 2.College of Computer Science, Wuhan University,Wuhan 430072, China);Design of Web MIS Security Framework Based on ASP[J];Journal of Hubei Institute For Nationalities;2005-01
3 LIN Ke-zheng,LI Dong-qin,LI Shao-hua(College of Computer Science and Technology,Harbin University of Science and Technology,Harbin 150080,China);Fragile image watermarking algorithm based on Hash functions[J];Journal of Harbin Engineering University;2008-01
4 TAN Min1,2,HU Xiao-long1,LIU Lian-chen3(1.College of Information Science and Engineering,Central South University,Changsha 410083,China;2.Hunan Public Security College,Changsha 410006,China;3.CIMS-ERC,Tsinghua University,Beijing 100084,China);Intrusion detection system model based on multi detection technology[J];Computer Engineering and Design;2008-07
5 XIAO You-an,LIU Jun-bo(School of Information Engineering,Wuhan University of Technology,Wuhan 430070,China);New Type of Digital Seal Technique[J];Journal of Wuhan University of Technology;2009-13
【Secondary Citations】
Chinese Journal Full-text Database 1 Hits
1 CHEN Shuo,\ AN Chang\|qing,\ LI Xue\|nong(Network Research Center, Tsinghua University, Beijing 100084, China);A Distributed Intrusion Detection System and Its Apperception Ability[J];Journal of Software;2001-02
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved