Full-Text Search:
Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
《Geospatial Information》 2010-01
Add to Favorite Get Latest Update

Analysis of Distributed Network Security Issues

XIONG Miao1,XIONG Xian2 (1.School of Information and Communication Engineering,Beijing University of Posts and Telecommunications,Beijing 100876,China;2.Hubei Second Institute of Surveying and Mapping,Wuhan 430071,China  
In this paper we introduced some security issues that existed in distributed network,and distributed network security solution was summarized,furthermore,reliable authentication using virtual CA (Certificate Authority) and certification chains and quantifiable trust mechanism were proposed to resolve the communication security between peer nodes in distributed network.
【CateGory Index】: TP393.08
Download(CAJ format) Download(PDF format)
CAJViewer7.0 supports all the CNKI file formats; AdobeReader only supports the PDF format.
【Co-citations】
Chinese Journal Full-text Database 10 Hits
1 ZHANG Guo-jun~① BAI Ju-he~②(~①Dept.of Electronic Information Engineering,Changzhou College of Information Technology,Changzhou 213164~②Software Engineering Center Based,Tongji University,Shanghai 200331,China);Security Component of Education Information System[J];Journal of Changzhou Vocational College of Information Technology;2006-04
2 ZHANG Guo-jun~① BAI Ju-he~②(~① Electronic and Electrical Engineering College,Changzhou College of Information Technology,Changzhou 213164~② Software Engineering Center Based,Tongji University,Shanghai 200331,China);Embedded Electronic Seal System Based on PKI[J];Journal of Changzhou Vocational College of Information Technology;2008-01
3 ZHENG Jie Ying, ZHOU Ling Ling, XU Guo Zhi (Department of Electronic Engineering, Shanghai Jiaotong University, Shanghai 200240,China);Design of an encryption scheme of unconditional security for mobile data communication[J];Application of Electronic Technique;2008-01
4 YANG Li-fang1,XING Hai-tao2,PANG Hui3,LI Yue1(1.Computing Center of Guangxi,Nanning,Guangxi,530022,China;2.Guangxi Liugong Machinery Co.,Ltd,Liuzhou,Guangxi,545007,China;3.The Traffic Police Department of Nanning,Nanning,Guangxi,530028,China);The Internal Information Security System Based on Dynamic Protecting Technology[J];Journal of Guangxi Academy of Sciences;2007-04
5 LI Yinyi,LI Li;A Program that Solves the Problem of Security in File Transferring by Means of Mixed Cryptography[J];Journal of Guizhou University for Ethnic Minorities(Philosophy and Social Sciences);2009-04
6 Song Huaidong;Using Batch Processing to Realize Real-time Alert of ARP Virus[J];Computer Study;2010-02
7 HU Ju-zhou1 WANG Chun-ming2(1.Department of Information,Hunan University of Commerce,Changsha 410205;2.Department of Research and Development,Hunan Talkweb Information System Co., Ltd,Changsha 410205);Information Security Algorithm and Its Java Implementation in M-commerce[J];Journal of Hunan Business College;2008-03
8 ZHAO Yu-hua,GUAN Yu-jing(Institute of Mathematics,Jilin University,Changchun 130012,China;Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education,Jilin University,Changchun 130012,China);An Image Digital Watermarking System Based on Digital Signature and Digital Timestamp[J];Journal of Jilin University(Science Edition);2007-01
9 XU Wei,ZHAO Song-zheng,LIU Hong-yu 1.Management School,Northwestern Polytechnical University,Xi'an 710072,China 2.Software Engineering School,Xi'an Jiaotong University,Xi'an 710049,China;New electronic seal system based on fusion of multiple feature algorithm[J];Computer Engineering and Applications;2009-10
10 GUO Wei-qing1,CHEN Dan2,TONG Hua-zhang3(1.Zhijiang College,Zhejiang University of Technology,Hangzhou 310024;2.City College,Zhejiang University,Hangzhou 310027;3.School of Information,Zhejiang University,Hangzhou 310027,China);Design of a Public-Key Encryption Scheme Based on the Prime Region Elliptic Curve[J];Computer Engineering & Science;2008-02
China Proceedings of conference Full-text Database 2 Hits
1 YANG Li-fang~1 XING Hai-tao~2 PANG Hui~3 LI Yue~1 1.Computing Center of Guangxi,Nanning,Guangxi,530022,China; 2.Guangxi Liugong Machinery Co.,Ltd,Liuzhou,Guangxi,545007,China; 3.The Traffic Police Department of Nanning,Nanning,Guangxi,530028,China;The Internal Information Security System Based on Dynamic Protecting Technology[A];[C];2007
2 YU Kai~1 ZHANG Yi~2 WANG Yongjun~3 1 School of Computer,National University of Defense Technology,Changsha,410073 2 School of Computer,National University of Defense Technology,Changsha,410073 3 School of Computer,National University of Defense Technology,Changsha,410073;Research and Analysis to the Login Protocol's Security of QQ[A];[C];2008
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved