Description: 论文标题:组播安全机制的研究与设计
作者:于福海
作者专业:计算机技术
导师姓名:原萍
授予学位:硕士
授予单位:东北大学
授予学位时间:20050701
论文页数:1-61
文摘语种:中文文摘
分类号:TP393.08
关键词:组播通信 安全机制 源认证 组密钥管理
摘要:本文结合课题实际特点,以组播安全为主题,对310网(全军局域网)中的组播提供安全保障进行了系统的研究。
对组播安全的基础理论与方法进行了分析与研究,抽取出了对称加密、非对称加密、单向散列函数、数字签名等安全原语,进而对组播安全系统的基础——PKI技术进行了探讨。
在对相关组播技术与协议的分析过程中,讨论了组播通信和组播协议的过程、特点和安全缺陷,并以此为根据,设计了一个组播源认证、授权和密钥管理中心,并提供了一个兼顾可扩展性、可重用性、可移植性的函数库,为组播过程中组成员身份的认证、组密钥管理、组播传输密钥的受控分发提供了方法。
与此同时,将所提出的组播安全机制解决方案与其他一些常见的安全解决方案在适应的环境、协议、特点等若干方面进行了比较,为组播安全解决方案的选取、确立作了进一步说明。另外,还讨论了有关网络监控、安全值量化等问题,推动了研究的深入开展。-thesis entitled : multicast security mechanism for the research and design of the author : The author in Fuhai professional : Computer Technology instructor name : The original Ping conferring a degree : a master's degree granting units : Northeastern University conferred degrees : 20050701 page thesis :1-61 Potpourri languages : Chinese Digest Key words : Jiangmen Keywords : Multicast Source Authentication security mechanism Group Key Management Abstract : Based on practical issues characteristics of a multicast security as the main theme, 310 network (LAN PLA) multicast to provide security for the systems. Multicast security to the basic theory and methods of analysis and research, taking a symmetric encryption, asymmetric encryption, One-way hash functions, digital signatures and ot Platform: |
Size: 4685691 |
Author:成东 |
Hits:
Description: 毕业设计论文-反病毒的
随着网络技术的不断发展,出现了大量的基于网络的服务,网络安全问题也就变得越来越重要。ACL即访问控制列表,它是工作在OSI参考模型三层以上设备,通过对数据包中的第三、四层中的包头信息按照给定的规则进行分析,判断是否转发该数据包。基于ACL的网络病毒的过滤技术在一定程度上可以比较好的保护局域网用户免遭外界病毒的干扰,是一种比较好的中小型局域网网络安全控制技术。
本设计重点从计算机网络病毒的出现、基本特征以及发展现状的角度出发,比较深入的研究了相关网络安全技术,深入分析了当前几种严重影响网络性能的网络病毒,结合ACL的工作原理,制定了相应的访问控制规则列表,并且通过模拟实验,对ACL的可行性进行了相应的测试。
-Design graduate thesis - with the anti-virus network technology continues to develop, a lot of Web-based services, network security issues have become increasingly important. ACL or access control lists, it is work in the OSI Reference Model for three more equipment, the data packet through the third, four of Baotou information according to the rules, to determine whether the transmitted data packets. Based on ACL network virus filtering technology will be able to better protect users from the outside world LAN virus interference is a relatively good small and medium-sized LAN security control technologies. The design focus from the computer network virus with the basic features of the status quo of the development perspective, more in-depth studies to the relevant network security technol Platform: |
Size: 127955 |
Author:thocr |
Hits:
Description: 论文标题:组播安全机制的研究与设计
作者:于福海
作者专业:计算机技术
导师姓名:原萍
授予学位:硕士
授予单位:东北大学
授予学位时间:20050701
论文页数:1-61
文摘语种:中文文摘
分类号:TP393.08
关键词:组播通信 安全机制 源认证 组密钥管理
摘要:本文结合课题实际特点,以组播安全为主题,对310网(全军局域网)中的组播提供安全保障进行了系统的研究。
对组播安全的基础理论与方法进行了分析与研究,抽取出了对称加密、非对称加密、单向散列函数、数字签名等安全原语,进而对组播安全系统的基础——PKI技术进行了探讨。
在对相关组播技术与协议的分析过程中,讨论了组播通信和组播协议的过程、特点和安全缺陷,并以此为根据,设计了一个组播源认证、授权和密钥管理中心,并提供了一个兼顾可扩展性、可重用性、可移植性的函数库,为组播过程中组成员身份的认证、组密钥管理、组播传输密钥的受控分发提供了方法。
与此同时,将所提出的组播安全机制解决方案与其他一些常见的安全解决方案在适应的环境、协议、特点等若干方面进行了比较,为组播安全解决方案的选取、确立作了进一步说明。另外,还讨论了有关网络监控、安全值量化等问题,推动了研究的深入开展。-thesis entitled : multicast security mechanism for the research and design of the author : The author in Fuhai professional : Computer Technology instructor name : The original Ping conferring a degree : a master's degree granting units : Northeastern University conferred degrees : 20050701 page thesis :1-61 Potpourri languages : Chinese Digest Key words : Jiangmen Keywords : Multicast Source Authentication security mechanism Group Key Management Abstract : Based on practical issues characteristics of a multicast security as the main theme, 310 network (LAN PLA) multicast to provide security for the systems. Multicast security to the basic theory and methods of analysis and research, taking a symmetric encryption, asymmetric encryption, One-way hash functions, digital signatures and ot Platform: |
Size: 4685824 |
Author:成东 |
Hits:
Description: 毕业设计论文-反病毒的
随着网络技术的不断发展,出现了大量的基于网络的服务,网络安全问题也就变得越来越重要。ACL即访问控制列表,它是工作在OSI参考模型三层以上设备,通过对数据包中的第三、四层中的包头信息按照给定的规则进行分析,判断是否转发该数据包。基于ACL的网络病毒的过滤技术在一定程度上可以比较好的保护局域网用户免遭外界病毒的干扰,是一种比较好的中小型局域网网络安全控制技术。
本设计重点从计算机网络病毒的出现、基本特征以及发展现状的角度出发,比较深入的研究了相关网络安全技术,深入分析了当前几种严重影响网络性能的网络病毒,结合ACL的工作原理,制定了相应的访问控制规则列表,并且通过模拟实验,对ACL的可行性进行了相应的测试。
-Design graduate thesis- with the anti-virus network technology continues to develop, a lot of Web-based services, network security issues have become increasingly important. ACL or access control lists, it is work in the OSI Reference Model for three more equipment, the data packet through the third, four of Baotou information according to the rules, to determine whether the transmitted data packets. Based on ACL network virus filtering technology will be able to better protect users from the outside world LAN virus interference is a relatively good small and medium-sized LAN security control technologies. The design focus from the computer network virus with the basic features of the status quo of the development perspective, more in-depth studies to the relevant network security technol Platform: |
Size: 128000 |
Author:thocr |
Hits:
Description: (繁体中文版)台湾出品不得多得的关于spa dpa 旁道攻击rsa算法的精彩论文。相对国内的一些翻译性质的、粗制滥造的论文,简直是一个天上一个地下。-As information technology has developed rapidly, it provides more convenient life for people. As the result, the security has become the main concern. Recently, user id and password are major methods to protect private information. However, the short password can be broken by hackers. Too long is not easy to memorize. Network traffic-analyzing tool provides the function to gain the user id and password while doing transaction via network. Therefore, low cost Smart Card including user name identification and cryptosystem algorithm has become new trend of
modern society.
The first object of this thesis is to present the design and implementati- on of a 512-bit RSA cryptosystem by using 8051 microcontroller. In RSA cryptosystem algorithm, modular exponentiation is the essential arithmetic operation. However, 8051 microcontroller does not provide the modular exponentiation. In order to complete RSA cryptosystem, this thesis has mentioned that using L-algorithm to transfer to modular mult Platform: |
Size: 524288 |
Author:wang carl |
Hits:
Description: 在社会信息化的推动下,作为其核心的数字化技术已步入研究开发阶段。为了实现粮库的温湿度自动检测,提高粮库储粮的安全性是粮库管理实现自动化、智能化。我们提出基于ZigBee多点粮库温湿度检测的方案。为此论文开展于无线传感器网络技术的温湿度数据采集系统的研制工作。ZigBee无线传感器网络是一种新兴的传输技术,将其应用于室内温度和湿度的采集,进而构成无线温湿度采集系统。论文介绍了无线传感器网络系统的体系结构及关键技术。-In society, driven by information technology, as part of its core digital technology has entered a stage of research and development. Depot in order to achieve automatic detection of the temperature and humidity to enhance the security of grain storage grain depot management is automated, intelligent. ZigBee Based on our multi-point detection of grain temperature and humidity program. Carried out for this thesis in the wireless sensor network technology, temperature and humidity data acquisition system development. ZigBee wireless sensor networks is a new transmission technology, will be applied to the indoor temperature and humidity of the collection, which constitutes a collection system of wireless temperature and humidity. This paper introduces wireless sensor network system architecture and key technologies. Platform: |
Size: 2048 |
Author:hithdjsj |
Hits:
Description: 在社会信息化的推动下,作为其核心的数字化技术已步入研究开发阶段。为了实现粮库的温湿度自动检测,提高粮库储粮的安全性是粮库管理实现自动化、智能化。我们提出基于ZigBee多点粮库温湿度检测的方案。为此论文开展于无线传感器网络技术的温湿度数据采集系统的研制工作。ZigBee无线传感器网络是一种新兴的传输技术,将其应用于室内温度和湿度的采集,进而构成无线温湿度采集系统。论文介绍了无线传感器网络系统的体系结构及关键技术。-In society, driven by information technology, as part of its core digital technology has entered a stage of research and development. Depot in order to achieve automatic detection of the temperature and humidity to enhance the security of grain storage grain depot management is automated, intelligent. ZigBee Based on our multi-point detection of grain temperature and humidity program. Carried out for this thesis in the wireless sensor network technology, temperature and humidity data acquisition system development. ZigBee wireless sensor networks is a new transmission technology, will be applied to the indoor temperature and humidity of the collection, which constitutes a collection system of wireless temperature and humidity. This paper introduces wireless sensor network system architecture and key technologies. Platform: |
Size: 149504 |
Author:hithdjsj |
Hits:
Description: 本论文主要研究了使用LIBNIDS网络安全开发包对邮件客户端收发的邮件的还原。邮件客户端收发邮件时涉及到的协议是SMTP协议和POP3协议。利用LIBNIDS网络安全开发包对邮件的数据包进行捕获,实现了邮件发件人、收件人、抄送人、收发日期、邮件主题、邮件内容和邮件的附件名称信息的提取。-This thesis mainly focused on the restoration for the e-mail client to send or receive e-mails using the development package of network security LIBNIDS. E-mail client to send and received e-mails related to SMTP and POP3 protocol. Making use of LIBNIDS to capture the packets of e-mails, it’s achieved the restoration of main information in e-mails, including the sender, recipient, carbon copy (cc), date, subject, content and attachment name. Platform: |
Size: 269312 |
Author:王劲 |
Hits: