期刊文献+

基于SSL技术实现网络通信双向加密

Based on SSL Technology to Achieve Network Communication Bidirectional Encryption
在线阅读 下载PDF
导出
摘要 加密技术对于保障信息安全具有举足轻重的作用。由于无线网络的广泛应用,无法控制攻击者获取信号,但是,可以使用强加密让攻击者无法解析原文。SSL技术就是种很好的加密机制。分析了SSL3.0协议的作用,并以Web通信和FTP通信的双向加密为例,介绍了SSL技术实现方式。 Encryption technology to guarantee the information security has play a decisive role.Because of the wireless network is widely used,we cannot control the attacker gets the signals,however,we can use strong encryption let the attacker cannot resolve.SSL technology is a kind of very good encryption mechanism.Therefore,this paper analyses the role of the SSL3.0 protocol,and Web communication and FTP communication bidirectional encryption by an example is introduced SSL technology realization method.
作者 潘强
出处 《电脑编程技巧与维护》 2012年第16期133-134,136,共3页 Computer Programming Skills & Maintenance
关键词 网络安全 SSL技术 加密 Network security SSL Encryption
作者简介 潘强(1979-),男,硕士,讲师,研究方向,计算机应用与信息安全。
  • 相关文献

参考文献2

二级参考文献17

  • 1王育民,通信网的安全.理论与技术,1999年
  • 2NEEDHAM RM, SCHROEDER MD. Using Encryption for Authentication in Large Networks of Computers[J]. Communication of the ACM, 1978,21(12):993-999.
  • 3DOLEV D, YAO A. On The Security of Public Key Protocols[J]. IEEE Transactions on Information Theory, 1983,29(2):198-208.
  • 4BURROWS M, ABADI M, NEEDHAM R. A Logic of Authentication[J]. ACM Transactions on Computer System, 1990,8(1):18-36.
  • 5GONG L, NEEDHAM R, YAHALOM R. Reasoning about Belief in Cryptographic Protocols[A]. Proceeding of the 1990 IEEE Computer Society Symposium on Research in Security and Privacy[C]. IEEE Computer Society Press, 1990.234-248.
  • 6KAILAR R. Accountability in Electronic Commerce Protocols[J]. IEEE Transactions on Software Engineering, 1996,22(5):313-328.
  • 7LOWE G. Breaking and Fixing the Needham-Schroeder Public-Key Protocol Using FDR[A]. Proceedings of Tools and Algorithms for the Construction and Analysis of Systems, LNCS1055[C], 1996.147-166.
  • 8ARMANDO A, COMPAGNA L, GANTY P. SAT-based Model Checking of Security Protocols Using Planning Graph Analysis[A]. Proceedings of FME2003, LNCS 2805[C]. Springer-Verlag, 2003.
  • 9ABADI M, GORDON A. A Calculus for Cryptographic Protocols: The Spi Calculus[R]. SRC, Palo Alto, California, 1998.
  • 10ABADI M, BLANCHET B. Analyzing Security Protocols with Secrecy Types and Logic Programs[A]. The 29th ACM Symposium on Principles of Programing Languages[C]. Portland, Oregon: ACM Press, 2002.33-44.

共引文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部