期刊文献+
共找到1,049篇文章
< 1 2 53 >
每页显示 20 50 100
Principles of Network Security Protocols Based on Dynamic Address Space Randomization 被引量:1
1
作者 Vladimir Krylov Kirill Kravtsov 《通讯和计算机(中英文版)》 2016年第2期77-89,共13页
关键词 网络安全协议 地址空间 随机化 网络安全解决方案 原理 软件解决方案 网络节点 网络地址
在线阅读 下载PDF
Application of mobile scanning agent in the network security
2
作者 闵君 冯珊 +1 位作者 唐超 梅纲 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2004年第3期371-376,共6页
To enhance the security of network systems, puts forward a kind of software agent is put forward, which has the induction ability of network frameworks and the ability of behavior independence. It is mobile scanning a... To enhance the security of network systems, puts forward a kind of software agent is put forward, which has the induction ability of network frameworks and the ability of behavior independence. It is mobile scanning agent. More attentions is paid to expound how to design and realize mobile scanning agent. Besides, it is also explained the programs of mobile scanning agent system. In the end, it expects mobile scanning agent. 展开更多
关键词 AGENT network security IMMUNITY agent transfer protocol
在线阅读 下载PDF
ATM安全协议分析
3
作者 薛丽敏 《舰船电子工程》 2009年第4期133-136,共4页
利用ATM做为下一代因特网传送骨干已成为技术发展之趋势,因此,ATM的安全问题日显突出。文章从ATM的网络安全的目标入手,对ATM安全协议的内容从用户平面安全服务和控制平面安全服务作了分析和研究。
关键词 atm atm安全协议 用户平面安全服务 控制平面安全服务
在线阅读 下载PDF
一种端到端ATM网络安全通信系统的设计与实现 被引量:2
4
作者 王亚弟 郭渊博 《计算机工程与应用》 CSCD 北大核心 2002年第2期150-152,共3页
文章提出了一种端到端的ATM网络安全通信系统,介绍了其端系统的设计方案,讨论了系统中各种安全服务的设置,并阐述了系统中各功能部件的实现。
关键词 atm网络 端到端安全通信系统 分组交换 计算机网络
在线阅读 下载PDF
ATM管理信息网快速构建路由算法研究 被引量:1
5
作者 刘增辉 《无线电通信技术》 2007年第1期49-51,64,共4页
ATM管理信息网是机动组网的最优先业务,不仅要适应网络拓扑的频繁变化,而且要尽可能低地占用传输资源。基于网络开通的预先规划,在研究RIP、OSPF路由协议的基础上提出了基于ATM组播实现的快速收敛路由算法,该算法通过环路检测机制防止... ATM管理信息网是机动组网的最优先业务,不仅要适应网络拓扑的频繁变化,而且要尽可能低地占用传输资源。基于网络开通的预先规划,在研究RIP、OSPF路由协议的基础上提出了基于ATM组播实现的快速收敛路由算法,该算法通过环路检测机制防止组播风暴发生,路由交互信息由一个ATM信元封装完成,占用极低的传输带宽,通过专用信息格式、入网认证等机制进行了安全设计。该算法适合通信节点不超过20的组网应用,具有很强的抗毁顽存能力。 展开更多
关键词 atm管理信息网 路由快速收敛 atm组播 环路预防 网络安全
在线阅读 下载PDF
ATM网络安全
6
作者 田畅 郑少仁 《电信科学》 北大核心 2000年第7期9-13,共5页
本文根据ATM论坛有关ATM安全的相关标准 ,分析了ATM网络中安全性需求及安全机制实现的有关问题。针对ATMUNI和NNI信令的特点 ,研究了安全协议和加密算法的选择及实现的有关问题 ,并对ATM网络安全标准化中存在的问题及进一步的研究方向... 本文根据ATM论坛有关ATM安全的相关标准 ,分析了ATM网络中安全性需求及安全机制实现的有关问题。针对ATMUNI和NNI信令的特点 ,研究了安全协议和加密算法的选择及实现的有关问题 ,并对ATM网络安全标准化中存在的问题及进一步的研究方向做了一简短的讨论。 展开更多
关键词 atm 网络安全 安全协议 通信网
在线阅读 下载PDF
ATM安全技术 被引量:2
7
作者 李振邦 《通信技术》 1997年第4期17-23,共7页
首先介绍在不安全ATM网上进行安全通信的技术,而后介绍使ATM网络变成安全网络的技术,最后对进一步提高ATM网络安全性提出几点建议。
关键词 atm 网络安全 标准化 通信网 B-ISDN
原文传递
ATM网络安全通信系统中安全通道的设计与实现
8
作者 郭渊博 王亚弟 《计算机应用研究》 CSCD 北大核心 2002年第2期126-127,142,共3页
介绍了一种ATM网络安全通信系统中安全通道的设计思想 ,给出了一种ATM环境中的安全通道协议 。
关键词 atm网络 安全通信系统 安全通道 设计
在线阅读 下载PDF
ATM网络自愈恢复椭圆搜索
9
作者 李式巨 梅柳波 戴文琪 《通信学报》 EI CSCD 北大核心 1998年第12期71-76,共6页
本文在分析ATM网络自愈恢复搜索基础上,提出一种减少无用搜索消息范围的椭圆搜索算法。并对自愈恢复过程进行计算机模拟,结果表明:椭圆搜索比单向搜索和双向搜索的无用搜索消息范围小,影响的节点数少,范围大小可以合理设置。所... 本文在分析ATM网络自愈恢复搜索基础上,提出一种减少无用搜索消息范围的椭圆搜索算法。并对自愈恢复过程进行计算机模拟,结果表明:椭圆搜索比单向搜索和双向搜索的无用搜索消息范围小,影响的节点数少,范围大小可以合理设置。所花费的代价是:必须在每个节点中建立一个最小搜索范围表。 展开更多
关键词 atm网络 自愈 搜索
在线阅读 下载PDF
ATM网络安全技术
10
作者 贾旭光 陆鹏 《信息安全与通信保密》 1999年第1期36-40,共5页
指出了ATM网络存在的安全威胁,讨论了ATM网络的数据加密技术、完整性服务等ATM网络安全技术。在基于将ATM的安全层置于AAL层和ATM层之间的观点上,本论文设计了一个数字签名结构和密钥交换协议,该协议作为呼叫建立过程的一部分,嵌于现存... 指出了ATM网络存在的安全威胁,讨论了ATM网络的数据加密技术、完整性服务等ATM网络安全技术。在基于将ATM的安全层置于AAL层和ATM层之间的观点上,本论文设计了一个数字签名结构和密钥交换协议,该协议作为呼叫建立过程的一部分,嵌于现存的ATM信今协议中。这些安全技术可透明地加入到B—ISDN的协议参考模型中,无需改变现存的协议标准。 展开更多
关键词 atm安全 安全服务 数据加密 密钥管理 密钥交换 atm 安全层 安全信令 安全协议
原文传递
一种新型ATM网络信息安全系统
11
作者 张丽杰 崔国兰 吴韶波 《太原科技》 2000年第1期30-31,共2页
针对ATM网络中的安全威胁,利用密码学的方法来解决网络信息传输的安全性问题。提出一种新型的基于IDEA和RSA的混合加密方式来保证网络用户信息安全,兼有传统密码体制与公开密钥体制的优点。
关键词 atm 网络安全 IDEA算法 RSA算法 信息安全系统
在线阅读 下载PDF
ATM网络安全系统实现中的关键技术
12
作者 张晓菲 王亚弟 《计算机工程》 CAS CSCD 北大核心 1999年第S1期67-69,共3页
详细介绍了ATM网络安全系统实现中安全服务协商和安全数据交换阶段的两项关键技术一安全信令和密码同步。提出了一种基于ATM局域网的安全信分协商方案,其改进方案适用于安全强度要求较高的广域网。此外,在分析信无丢失对密码系统影响... 详细介绍了ATM网络安全系统实现中安全服务协商和安全数据交换阶段的两项关键技术一安全信令和密码同步。提出了一种基于ATM局域网的安全信分协商方案,其改进方案适用于安全强度要求较高的广域网。此外,在分析信无丢失对密码系统影响的基础上,提出了一种基于同步令牌的密码同步解决方案,针对不同业务类型,分述了同步分牌的插入及结构。 展开更多
关键词 atm网络 安全信令 同步令牌
在线阅读 下载PDF
ATM层、AAL层之间的ATM网络安全技术
13
作者 贾旭光 范忠礼 《南京邮电学院学报》 1999年第1期53-56,共4页
指出了ATM网络存在的安全威胁,讨论了ATM网络的数据加密技术、完整性服务等ATM网络安全技术的实现和管理。设计了一个数字签名结构和密钥交换协议,该协议作为呼叫建立程序的一部分,嵌于现存的ATM的信令协议中。这些安全... 指出了ATM网络存在的安全威胁,讨论了ATM网络的数据加密技术、完整性服务等ATM网络安全技术的实现和管理。设计了一个数字签名结构和密钥交换协议,该协议作为呼叫建立程序的一部分,嵌于现存的ATM的信令协议中。这些安全技术可透明地加入BISDN的协议参考模型,无须改变现存的协议标准。 展开更多
关键词 网络安全 数据加密 安全协议 atm网络
在线阅读 下载PDF
ATM安全简述
14
作者 蔡建楠 周俊茂 《电信快报》 2002年第12期39-42,共4页
文章根据ATM论坛中有关ATM安全的相关标准,简述ATM用户面和控制面的安全服务原理以及连接的建立,并对ATM网络安全中存在的威胁进行分析。
关键词 atm 网络安全 安全协议 服务质量 会话密钥
在线阅读 下载PDF
Deep Auto-Encoder Based Intelligent and Secure Time Synchronization Protocol(iSTSP)for Security-Critical Time-Sensitive WSNs
15
作者 Ramadan Abdul-Rashid Mohd Amiruddin Abd Rahman Abdulaziz Yagoub Barnawi 《Computer Modeling in Engineering & Sciences》 2025年第9期3213-3250,共38页
Accurate time synchronization is fundamental to the correct and efficient operation of Wireless Sensor Networks(WSNs),especially in security-critical,time-sensitive applications.However,most existing protocols degrade... Accurate time synchronization is fundamental to the correct and efficient operation of Wireless Sensor Networks(WSNs),especially in security-critical,time-sensitive applications.However,most existing protocols degrade substantially under malicious interference.We introduce iSTSP,an Intelligent and Secure Time Synchronization Protocol that implements a four-stage defense pipeline to ensure robust,precise synchronization even in hostile environments:(1)trust preprocessing that filters node participation using behavioral trust scoring;(2)anomaly isolation employing a lightweight autoencoder to detect and excise malicious nodes in real time;(3)reliability-weighted consensus that prioritizes high-trust nodes during time aggregation;and(4)convergence-optimized synchronization that dynamically adjusts parameters using theoretical stability bounds.We provide rigorous convergence analysis including a closed-form expression for convergence time,and validate the protocol through both simulations and realworld experiments on a controlled 16-node testbed.Under Sybil attacks with five malicious nodes within this testbed,iSTSP maintains synchronization error increases under 12%and achieves a rapid convergence.Compared to state-ofthe-art protocols like TPSN,SE-FTSP,and MMAR-CTS,iSTSP offers 60%faster detection,broader threat coverage,and more than 7 times lower synchronization error,with a modest 9.3%energy overhead over 8 h.We argue this is an acceptable trade-off for mission-critical deployments requiring guaranteed security.These findings demonstrate iSTSP’s potential as a reliable solution for secure WSN synchronization and motivate future work on large-scale IoT deployments and integration with energy-efficient communication protocols. 展开更多
关键词 Time-sensitive wireless sensor networks(TS-WSNs) secure time synchronization protocol trust-based authentication autoencoder model deep learning malicious node detection Internet of Things energyefficient communication protocols
在线阅读 下载PDF
Performance Evaluation of an Internet Protocol Security (IPSec) Based Multiprotocol Label Switching (MPLS) Virtual Private Network 被引量:3
16
作者 Conrad K. Simatimbe Smart Charles Lubobya 《Journal of Computer and Communications》 2020年第9期100-108,共9页
This paper evaluates the performance of Internet Protocol Security (IPSec) based Multiprotocol Label Switching (MPLS) virtual private network (VPN) in a small to medium sized organization. The demand for security in d... This paper evaluates the performance of Internet Protocol Security (IPSec) based Multiprotocol Label Switching (MPLS) virtual private network (VPN) in a small to medium sized organization. The demand for security in data networks has been increasing owing to the high cyber attacks and potential risks associated with networks spread over distant geographical locations. The MPLS networks ride on the public network backbone that is porous and highly susceptible to attacks and so the need for reliable security mechanisms to be part of the deployment plan. The evaluation criteria concentrated on Voice over Internet Protocol (VoIP) and Video conferencing with keen interest in jitter, end to end delivery and general data flow. This study used both structured questionnaire and observation methods. The structured questionnaire was administered to a group of 70 VPN users in a company. This provided the study with precise responses. The observation method was used in data simulations using OPNET Version 14.5 Simulation software. The results show that the IPSec features increase the size of data packets by approximately 9.98% translating into approximately 90.02% effectiveness. The tests showed that the performance metrics are all well within the recommended standards. The IPSec Based MPLS Virtual private network is more stable and secure than one without IPSec. 展开更多
关键词 Multiprotocol Label Switching Internet protocol security Virtual Private network Video Conferencing Voice over Internet protocol JITTER End to End Delay
在线阅读 下载PDF
Discussion on data-security of space-earth integrated network and analysis ofspace communications protocol standards
17
作者 LiZehui LiuYong SunJin 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2005年第2期290-294,共5页
The architecture and protocols of Internet can't work well in space environments. To form a reliable and safe space network, characteristics of space communication network one discusse, brief synthesis is performe... The architecture and protocols of Internet can't work well in space environments. To form a reliable and safe space network, characteristics of space communication network one discusse, brief synthesis is performed for consultative committee for space data system (CCSDS) space communications protocol standards (SCPS), and a model accounting for data security problem of space-earth integrated network is provided. 展开更多
关键词 space network protocol security.
在线阅读 下载PDF
A Partially Non-Cryptographic Security Routing Protocol in Mobile Ad Hoc Networks
18
作者 CHEN Jing CUI Guohua 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1781-1784,共4页
In this paper, we propose a partially non-cryptographic security routing protocol (PNCSR) that protects both routing and data forwarding operations through the same reactive approach. PNCSR only apply public-key cry... In this paper, we propose a partially non-cryptographic security routing protocol (PNCSR) that protects both routing and data forwarding operations through the same reactive approach. PNCSR only apply public-key cryptographic system in managing token, but it doesn't utilize any cryptographic primitives on the routing messages. In PNCSR, each node is fair. Local neighboring nodes collaboratively monitor each other and sustain each other. It also uses a novel credit strategy which additively increases the token lifetime each time a node renews its token. We also analyze the storage, computation, and communication overhead of PNCSR, and provide a simple yet meaningful overhead comparison. Finally, the simulation results show the effectiveness of PNCSR in various situations. 展开更多
关键词 ad hoc network security routing protocol partially non-cryptographic
在线阅读 下载PDF
Enhancement in Ad hoc on Demand Distance Vector (AODV) Routing Protocol Security 被引量:2
19
作者 王翠荣 杨孝宗 高远 《Journal of Donghua University(English Edition)》 EI CAS 2005年第3期18-22,共5页
Ad-hoc networking has mainly been associated with military battlefield networks. Security has received considerably less attention and the issue needs to be addressed before any successful applications will appear. Du... Ad-hoc networking has mainly been associated with military battlefield networks. Security has received considerably less attention and the issue needs to be addressed before any successful applications will appear. Due to the insecure nature of the wireless link and their dynamically changing topology, wireless ad-hoc networks require a careful and security-oriented approach for designing routing protocols. In this paper, an AODV-based secure routing protocol- ENAODV is presented. A speed-optimized digital signature algorithm is integrated into the routing protocol. The protocol algorithm is implemented with NS-2. The security of the protocol is analyzed. The simulating results show that the performances of ENAODV protocol, such as average node energy consumption, packet delay and packet delivery is nearly the same as standard AODV protocol. 展开更多
关键词 act-hoc network secure routing protocol Blowfish Cryptography digital signature
在线阅读 下载PDF
Security and privacy threats in RFID traceability network 被引量:1
20
作者 Chu Chao-Hsien 《Journal of Southeast University(English Edition)》 EI CAS 2008年第S1期132-135,共4页
To address security and privacy issues in radio frequency identification (RFID) traceability networks, a multi-layer privacy and security framework is proposed, which includes four facets: a security model, a communic... To address security and privacy issues in radio frequency identification (RFID) traceability networks, a multi-layer privacy and security framework is proposed, which includes four facets: a security model, a communication protocol, access permission and privacy preservation. According to the security requirements that are needed in an RFID system, a security model that incorporates security requirements that include privacy of tag data, privacy of ownership, and availability of tag identity is introduced. Using this model, a secure communication protocol that can be used for anti-counterfeiting, automatic identification and privacy preservation is then developed. In order to manage the number of parties, data records of items, and complicated transitions of access permissions in an item-level traceability context, a well-designed access control protocol is proposed to parties that can prove the physical possession of an item;meanwhile, to address the privacy issues during data sharing in an RFID network, a vision of database systems that take responsibility for the privacy of the data they manage is also presented. 展开更多
关键词 traceability network radio frequency identification (RFID) security protocol privacy protection strategy
在线阅读 下载PDF
上一页 1 2 53 下一页 到第
使用帮助 返回顶部