期刊文献+

基于.NET的分布式系统用户密码加密方案设计 被引量:1

User Password Encrypting Scheme Design for Distributed System Based on .NET Technology
在线阅读 下载PDF
导出
摘要 根据ASP平台的安全需求,分析了分布式系统用户密码加密方案.在微软.NET技术基础上,设计了一种密码加密方案,使系统用户的密码在传送、数据库保存等过程中得到有效保护.即使密码信息被非法获得,非法用户也无法侵入系统运行. According to the security requirements of ASP platform, the user password encrypting scheme of distributed system is analyzed. On the base of Microsoft . NET technology, a password encrypt scheme with quite high security level is proposed. This scheme integrates several encrypting technologies, which protect the password in transmission and saving in database efficiently. Eventhough the password information is gotten without permission, the illegal user can not enter the system.
出处 《信阳师范学院学报(自然科学版)》 CAS 北大核心 2007年第2期241-244,共4页 Journal of Xinyang Normal University(Natural Science Edition)
基金 河南省科技攻关项目(0524220074)
关键词 .NET ASP HASH . NET ASP(apllication service provider) HASH
  • 相关文献

参考文献6

二级参考文献13

  • 1徐江峰,尚晋,胡静.基于连续混沌系统和Hash函数的图像加密算法[J].计算机应用,2004,24(12):61-63. 被引量:12
  • 2余建斌.黑客的攻击手段及攻击对策[M].北京:人民邮电出版社,1998..
  • 3Bruce:Schneier.应用密码学[M].北京:机械工业出版社,2000..
  • 4oan Daemen, Vincent Rijmen. AES Proposal: Rijndael [EB/OL]. http://csrc.nist.gov/CryptoToolkit/aes/rijndael/Rijndael-ammended.pdf, ?D?99-09-28.
  • 5Rudkin S,Grace A,Whybray M W. Real-time applications on the Internet ?D?5BJ]. BT Technol J, 1997,15(2): 209-225.
  • 6Terry Escamilla [美] 吴焱等译.入侵者检测[M].北京:电子工业出版社,1999.3.
  • 7Matthews R. On the derivation of a Chaotic Encryption algorithm[J]. Cryptologia, 1989, XIII(1) : 29- 42.
  • 8LorenzEN.混沌的本质[M].北京,气象出版社,1997..
  • 9Martin del Rey A. A Novel Cryptosystem for Binary Images[J]. Studies in Informatics and Control, 2004,13 (1):5-14.
  • 10Fridrich F. Symmetric ciphers based on two-dimmesional chaotic maps[J]. International Journal of Bifurcation and Chaos, 1998,8 (6) :1259-1 284.

共引文献11

同被引文献9

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部