Please wait a minute...
New Technology of Library and Information Service  2003, Vol. 19 Issue (4): 78-80    DOI: 10.11925/infotech.1003-3513.2003.04.26
Current Issue | Archive | Adv Search |
The Network s Encryption and Authentication Technique
Jiang Jihong
(Library of Qingdao University, Qingdao 266071, China)
Download: PDF (0 KB)  
Export: BibTeX | EndNote (RIS)      

In view of the threats in the present network, this article discusses the network s encryption and authentication technique and necessary cryptogram technique.

Key wordsNetwork security      Cryptogram arithmetic      Encryption      Authentication      Digital signature     
Received: 05 March 2003      Published: 25 August 2003


Corresponding Authors: Jiang Jihong   
About author:: Jiang Jihong

Cite this article:

Jiang Jihong. The Network s Encryption and Authentication Technique. New Technology of Library and Information Service, 2003, 19(4): 78-80.

URL:     OR







[1] Guang Zhu, Mining Feng. Content Authentication for Video Resources of Libraries, Museums and Archives with Semi-fragile Watermarking[J]. 数据分析与知识发现, 2016, 32(12): 76-84.
[2] Gu Jiawei, Wang Shengqing, Zhao Danqun, Chen Wenguang. A Centralized Identity Authentication in the Cloud Service of Public Culture Digital Resources[J]. 现代图书情报技术, 2015, 31(2): 64-71.
[3] Ye Jian, Li Dan, Yan Xiaodi, Li Juan, Wei Qingshan, Han Meng, Xiao Xiaobo. Research and Implementation of Library WLAN Unified Authentication System[J]. 现代图书情报技术, 2012, 28(7): 121-126.
[4] Li Xin, Liu Dan. A Practice of Uniform Identity Authentication Against Multiple Authentication Sources Based on LDAP ——A Case Analysis of East China Normal University Library[J]. 现代图书情报技术, 2011, 27(4): 89-93.
[5] Wang Zexian. Design and Implementation of Unified User Authentication for VPN and ILAS III[J]. 现代图书情报技术, 2011, 27(12): 79-83.
[6] Zhu Guang, Yang Yongyue. Design of the Reading System for Card Identity Authentication Based on Image Recognition[J]. 现代图书情报技术, 2010, 26(12): 81-85.
[7] Shi Hongjuan,Li Chaoyang. The Application of Active Directory in University Libraries’ Network Security ——Taking Library of Renmin University of China as an Example[J]. 现代图书情报技术, 2009, 25(6): 85-88.
[8] Jin Dawei,Zhou Ning,Chen Yongyue. Digital Water Marking for Digital Anti-forgery Applied Research[J]. 现代图书情报技术, 2007, 2(6): 24-28.
[9] Miao Yuanzhao. Discussion on Security Monitor to the Computer Network System of the College Digitalization Library Based on Open Source Software[J]. 现代图书情报技术, 2007, 2(6): 91-95.
[10] Ye Jian,Shao Jing,Yan Xiaodi . Application of WLAN Security and Network Management  Technology in University Library[J]. 现代图书情报技术, 2006, 1(7): 85-88.
[11] Xue Ji,Ma Ziwei . The Analysis and Implementation of the Relative Theory and Technology in the Information Portal of Digital Library[J]. 现代图书情报技术, 2006, 1(6): 6-10.
[12] Yang Fayi,Zhang Jingchang . Study on High Performance Video Encryption Algorithm[J]. 现代图书情报技术, 2006, 1(3): 47-50.
[13] Huang Jizheng. Design and Implement of Radius Server Using in VPN Authentication in Linux Environment[J]. 现代图书情报技术, 2005, 21(7): 22-24.
[14] Qi Aihua,Liu Youhua,Liu Yusong. The Characteristic and Application Mode of XML Encryption[J]. 现代图书情报技术, 2005, 21(5): 73-75.
[15] Hu Zhizhou. Creation for Firewall of the Library Network Using Iptables[J]. 现代图书情报技术, 2005, 21(4): 34-36.
  Copyright © 2016 Data Analysis and Knowledge Discovery   Tel/Fax:(010)82626611-6626,82624938