Please wait a minute...
New Technology of Library and Information Service  2003, Vol. 19 Issue (4): 78-80    DOI: 10.11925/infotech.1003-3513.2003.04.26
Current Issue | Archive | Adv Search |
The Network s Encryption and Authentication Technique
Jiang Jihong
(Library of Qingdao University, Qingdao 266071, China)
Download: PDF (0 KB)  
Export: BibTeX | EndNote (RIS)      
Abstract  

In view of the threats in the present network, this article discusses the network s encryption and authentication technique and necessary cryptogram technique.

Key wordsNetwork security      Cryptogram arithmetic      Encryption      Authentication      Digital signature     
Received: 05 March 2003      Published: 25 August 2003
ZTFLH: 

TP393.08

 
Corresponding Authors: Jiang Jihong   
About author:: Jiang Jihong

Cite this article:

Jiang Jihong. The Network s Encryption and Authentication Technique. New Technology of Library and Information Service, 2003, 19(4): 78-80.

URL:

http://manu44.magtech.com.cn/Jwk_infotech_wk3/EN/10.11925/infotech.1003-3513.2003.04.26     OR     http://manu44.magtech.com.cn/Jwk_infotech_wk3/EN/Y2003/V19/I4/78


[1]王育民、刘建伟.通信网的安全——理论与技术.西安:西安电子科技大学出版社,1999

[2]卢开澄.计算机密码学——计算机网络中的数据保密与安全.北京:清华大学出版社,1998

[3]杨波.网络安全理论与应用.北京:电子工业出版社,2002

[4]祁明等.电子商务实用教程.北京:高等教育出版社,2000

[5]张红旗等.信息网络安全.北京:清华大学出版社,2002

[6]邱建霞.安全电子邮件.现代图书情报技术,2000,(5)

[1] Guang Zhu, Mining Feng. Content Authentication for Video Resources of Libraries, Museums and Archives with Semi-fragile Watermarking[J]. 数据分析与知识发现, 2016, 32(12): 76-84.
[2] Gu Jiawei, Wang Shengqing, Zhao Danqun, Chen Wenguang. A Centralized Identity Authentication in the Cloud Service of Public Culture Digital Resources[J]. 现代图书情报技术, 2015, 31(2): 64-71.
[3] Ye Jian, Li Dan, Yan Xiaodi, Li Juan, Wei Qingshan, Han Meng, Xiao Xiaobo. Research and Implementation of Library WLAN Unified Authentication System[J]. 现代图书情报技术, 2012, 28(7): 121-126.
[4] Li Xin, Liu Dan. A Practice of Uniform Identity Authentication Against Multiple Authentication Sources Based on LDAP ——A Case Analysis of East China Normal University Library[J]. 现代图书情报技术, 2011, 27(4): 89-93.
[5] Wang Zexian. Design and Implementation of Unified User Authentication for VPN and ILAS III[J]. 现代图书情报技术, 2011, 27(12): 79-83.
[6] Zhu Guang, Yang Yongyue. Design of the Reading System for Card Identity Authentication Based on Image Recognition[J]. 现代图书情报技术, 2010, 26(12): 81-85.
[7] Shi Hongjuan,Li Chaoyang. The Application of Active Directory in University Libraries’ Network Security ——Taking Library of Renmin University of China as an Example[J]. 现代图书情报技术, 2009, 25(6): 85-88.
[8] Jin Dawei,Zhou Ning,Chen Yongyue. Digital Water Marking for Digital Anti-forgery Applied Research[J]. 现代图书情报技术, 2007, 2(6): 24-28.
[9] Miao Yuanzhao. Discussion on Security Monitor to the Computer Network System of the College Digitalization Library Based on Open Source Software[J]. 现代图书情报技术, 2007, 2(6): 91-95.
[10] Ye Jian,Shao Jing,Yan Xiaodi . Application of WLAN Security and Network Management  Technology in University Library[J]. 现代图书情报技术, 2006, 1(7): 85-88.
[11] Xue Ji,Ma Ziwei . The Analysis and Implementation of the Relative Theory and Technology in the Information Portal of Digital Library[J]. 现代图书情报技术, 2006, 1(6): 6-10.
[12] Yang Fayi,Zhang Jingchang . Study on High Performance Video Encryption Algorithm[J]. 现代图书情报技术, 2006, 1(3): 47-50.
[13] Huang Jizheng. Design and Implement of Radius Server Using in VPN Authentication in Linux Environment[J]. 现代图书情报技术, 2005, 21(7): 22-24.
[14] Qi Aihua,Liu Youhua,Liu Yusong. The Characteristic and Application Mode of XML Encryption[J]. 现代图书情报技术, 2005, 21(5): 73-75.
[15] Hu Zhizhou. Creation for Firewall of the Library Network Using Iptables[J]. 现代图书情报技术, 2005, 21(4): 34-36.
  Copyright © 2016 Data Analysis and Knowledge Discovery   Tel/Fax:(010)82626611-6626,82624938   E-mail:jishu@mail.las.ac.cn