Full-Text Search:
Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
《Computer Engineering》 2006-01
Add to Favorite Get Latest Update

Schema of Secure Identity Verification in a Conference Based on Certificate

SONG Ling(College of Computer & Electronics Information,Guangxi University,Nanning 530004)  
One of key factors in a successful multimedia conference is security.Based on digital certificate,this paper uses the technology of public key encryption and digital signature to propose a scheme which can send the information of the person who participates in the conference safely and verify the identity,then it gives its implementation in detail.The scheme solves one of the problems about security management in a video conference system successfully,it has been proved to be effective by practice.
【Fund】: 广西科学基金资助项目(桂科基0342011)
【CateGory Index】: TN948.63
Download(CAJ format) Download(PDF format)
CAJViewer7.0 supports all the CNKI file formats; AdobeReader only supports the PDF format.
Chinese Journal Full-text Database 2 Hits
1 ZHU Xing-rong1,2, WANG Jian-xin1 (1.The Centre South University, Changsha 410083, China; 2. Hunan Railway Professional Technology College, Zhuzhou 412000, China);The Research of Security Access Platform in Digital Campus[J];Computer Knowledge and Technology;2009-18
2 WANG Ze,LIU Wen-ju,KE Yong-zhen School of Computer Technology and Automation,Tianjin Polytechnic University,Tianjin 300160,China;Scalable streaming media secure communication protocol with perfect forward secrecy[J];Computer Engineering and Applications;2008-23
Chinese Journal Full-text Database 1 Hits
1 CHEN Xiaochun, YUAN Zhen, LI Jianhua (Dept.of Electronic Engineeriong,Shanghai Jiaotong University,Shanghai 200030);A Solution of Video Conference with High Ratio of Performance to Price[J];Computer Engineering;2000-11
Chinese Journal Full-text Database 10 Hits
1 DONG Tao YANG Li - jun(Anyang Highway Administration Bureau, Anyang 455000, China);Application of FDDI Net Interface Card in Windows NT[J];Journal of Anyang University;2004-04
2 JIANG Wei-qiang, CHEN Bo (College of Computer Science and Technology, Southwest University of Science and Technology, Mianyang 621002, China);Summarization on PKI/CA Technology[J];Ordnance Industry Automation;2003-06
3 CHEN Tian hua (College of Information Engineering, Beijing Technology and Business University, Beijing 100037, China);NETWORK SECURITY TECHNOLOGY BASED ON PKI[J];Journal of Beijing Institute of Light Indusry;2002-03
4 GUO Jing,CHEN Yi(College of Computer Science and Technology,Beijing Technology and Business University,Beijing 100037,China);DESIGN AND REALIZATION OF CA SERVER IN PKI SYSTEM[J];Journal of Beijing Technology and Business University(Natural Science Edition);2006-05
5 ;PKI技术的应用及思考[J];Journal of Chengdu Electromechanical College;2006-04
6 ZHANG Yuan-mao,LIU Di(College of Computer Science & Engineering, UESTC, Chengdu 610054, China);Function model of RA in PKI and its implementation[J];Journal of Chengdu University of Information Technology;2005-01
7 YE Xiao-feng,FANG Yong(Institute of Information Security,SCU,Chengdu 610064,China);Application of PKI to grid trust models[J];Journal of Chengdu University of Information Technology;2008-06
8 ZHAO Cai-yun(Dept.of Computer Science & Engineering,Changshu Institute of Technology,Changshu 215500,China);Research on an Atomic-unit-based General PKI Support Platform[J];Journal of Changshu Institute of Technology;2006-06
9 GUO Qu1,2,HE Da-ke1(1.Information Security and National Computing Grid Laboratory,Southwest Jiaotong University,Chengdu 610031,China;2.China Tietong Nanning Branch,Nanning 530001,China);Analysis and Modification of a Private Key Protection Scheme[J];Telecommunication Engineering;2008-07
10 SHI Gui-xia 1 , YANG Jia-ming 2 (1. College of Computer Science and Technology,Donghua University,Shanghai,200051; 2. College of Infomation Science and Technology,Donghua University,Shanghai,200051);PKI Based Online Payment System[J];Journal of Donghua University(Natural Science);2006-06
China Proceedings of conference Full-text Database 4 Hits
1 Shao Ying, Wu Qiang (Key Laboratory of Computer Network and Information Integration (Southeast University ) , Ministry of Education, Nanjing, 210096);The Design and Implementation of BIA System Based On SPI[A];[C];2006
2 Economics Information Center of Guangxi Province Li Chenglin Hu Yingxue;The application of PKI in E-Government of Guangxi Development and Reform Commission[A];[C];2004
3 Ding Liang Hou Zhengfeng (Hefei University of Technology, Hefei 230009);The Accessing Control of Network Resource Using Winsock[A];[C];2003
4 XUE Weimin~1 LIN Benjing~2 1 Department of Computer Science & Technology,Tsinghua University,Beijing 100089 2 College of Information,Beijing University of Chemical Technology,Beijing 100029;Research of Wireless Network Security Based on Status Authentication[A];[C];2008
Chinese Journal Full-text Database 10 Hits
1 WANG Shi-xin (College of Electronic Technology, PLA Information Engineering University, Zhengzhou 450004, China);Discuss on Development of Transfer System for Military Document[J];Ordnance Industry Automation;2005-05
2 ZHAO Wenqing, WANG Dewen(North China Electric Power University, Baoding 071003, China);Application of PKI to Information Network Security for Electric Power Systems[J];Electric Power Science and Engineering;2003-03
3 Lian Shiguo Sun Jinsheng Wang Zhiquan (Department of Automation, Nanjing University of Science and Technology, Nanjing 210094, China);Secure multimedia transmission based on authentication and encryption technologies[J];Journal of Southeast University (Natural Science Edition);2004-S1
4 Zhao Yibin, Niu Shaozhang, Li Zhijiang, Yang Yixian (Information Security Center, Beijing University of Posts and Telecommunications,Beijing 100876);Discussion on the Security of Short Message System[J];Telecommunications Science;2002-12
5 CHEN Fei-zhou, WANG Qian, ZHU Qing-sheng (College of Computer, Chongqing Universty, Chongqing 400030,China);Structure and Application of SPKI Certificate[J];Journal of Chongqing University(Natural Science Edition);2004-07
6 CHANG Zhijun, LIU Shizhong, LIU Xin(Public Security Bureau of Zhengzhou, Zhengzhou 450001, China);The study of Zhengzhou police affire mobile system[J];Henan Science;2003-06
7 Li Yajie Wu Qiufeng Yuan Meng (Automation Department, Tsinghua University, Beijing 100084);PKI: Fundamental of Secure Electronic Commerce[J];Computer Engineering and Applications;2001-10
8 Mao Handong Zhang Weiming(Department of Management Science and Engineering,National University of Defense Technology,Changsha410073);A Single Sign-On System Based on Web Service[J];Computer Engineering and Applications;2004-24
9 Su Dafeng1 Xie Dongqing1,2 1(College of Computer and Communication,Hunan University,Changsha 410082)2(Laboratory of Computer Science,Institute of Software,Chinese Academic of Science,Beijing 100080);An Identity-Based Signature Scheme without a Trusted Party[J];Computer Engineering and Applications;2006-01
10 Xu Qian1 Zhang Futai1 Liu Zhigao1,2 Huang Xinyi11(School of Mathematics and Computer Science,Nanjing Normal University,Nanjing 210097)2(College of Vocational Technology,Anhui University of Technology,Ma'anshan,Anhui 243002);Certificateless Ring Signature Scheme[J];Computer Engineering and Applications;2006-02
【Secondary Citations】
Chinese Journal Full-text Database 3 Hits
1 He Yongming Xu Liang(Southeast University,Nanjing 210096);Remote Interconnection for LANs through ISDN[J];TELECOMMUNICATIONS SCIENCE;1998-03
2 Bi Houjie(Nanjing Institute of Posts & Telecommunications,Nanjing 210003);Video Conference (Series Ⅲ)——Video Conference in Our Country[J];TELECOMMUNICATIONS SCIENCE;1998-03
3 Bi Houjie(Nanjing Institute of Posts & Telecommunications,Nanjing 210003);Video Conference(Series Ⅳ)——Desktop Video Conference and Videophone[J];TELECOMMUNICATIONS SCIENCE;1998-04
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved