Full-Text Search:
Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
《Telecommunications Network Technology》 2017-08
Add to Favorite Get Latest Update

An optimization method on weak password verification based on distributed scheduling

WU Meng;CHEN Mingjie;SONG Zhiqiang;  
This paper introduces an optimization analysis method for weak passwords, weak passwords of the existing analysis methods are time-consuming and resource of the server overload disadvantage, analysis to ensure that all resources are fully utilized, the effective implementation of task scheduling solution, to avoid some of the computations are entirely occupied resources, the majority of the remaining idle computing resources, and tracking weak password verification schedule.
【CateGory Index】: TN929.5
Download(CAJ format) Download(PDF format)
CAJViewer7.0 supports all the CNKI file formats; AdobeReader only supports the PDF format.
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved