AbstractAs for the various risks for internet transaction, the paper puts forward a CA system model based on PKI and introduces the concrete methods under the environment of Linux so as to realize the network ID authentication and handle the network security problem. Different from commercial CA, this system structure is based on open source code, especially fits for small and medium self-established campus network CA authentication system
Session Initiation Protocol (SIP), an easy and simple Internet application layer protocol used to es...
Background X.509 is an ITU standard for a public key infrastructure (PKI), which specifies, among ot...
In this report, a couple of security improvement methods for TCP/IP network systems have been introd...
AbstractAs for the various risks for internet transaction, the paper puts forward a CA system model ...
With the wide applications of Internet, it has gradually impacted and changed the life styles and bu...
This paper describes a security system for authorization in open networks. Authorization means autho...
The PKI framework is a widely used network identity verification framework. Users will register thei...
In recent years, with the rapid development of computers, the university educational administration ...
With the development of campus network, many kinds of applications based on campus network get a rap...
With the rapid development of Internet +, the dependence on wireless networks and wireless terminals...
With the development of Public Key Infrastructure (PKI), there implements lots of identity managemen...
Cooperative Intelligent Transport Systems (C-ITS) enable vehicles and infrastructure to exchange inf...
This paper describes a flexible and general purpose PKI platform providing an easily interoperable s...
Creating a secure connection on the Internet is made possible through the usage of certificates, bin...
The demo is a proof of concept of an entity authentication solution defined in [1] that permits node...
Session Initiation Protocol (SIP), an easy and simple Internet application layer protocol used to es...
Background X.509 is an ITU standard for a public key infrastructure (PKI), which specifies, among ot...
In this report, a couple of security improvement methods for TCP/IP network systems have been introd...
AbstractAs for the various risks for internet transaction, the paper puts forward a CA system model ...
With the wide applications of Internet, it has gradually impacted and changed the life styles and bu...
This paper describes a security system for authorization in open networks. Authorization means autho...
The PKI framework is a widely used network identity verification framework. Users will register thei...
In recent years, with the rapid development of computers, the university educational administration ...
With the development of campus network, many kinds of applications based on campus network get a rap...
With the rapid development of Internet +, the dependence on wireless networks and wireless terminals...
With the development of Public Key Infrastructure (PKI), there implements lots of identity managemen...
Cooperative Intelligent Transport Systems (C-ITS) enable vehicles and infrastructure to exchange inf...
This paper describes a flexible and general purpose PKI platform providing an easily interoperable s...
Creating a secure connection on the Internet is made possible through the usage of certificates, bin...
The demo is a proof of concept of an entity authentication solution defined in [1] that permits node...
Session Initiation Protocol (SIP), an easy and simple Internet application layer protocol used to es...
Background X.509 is an ITU standard for a public key infrastructure (PKI), which specifies, among ot...
In this report, a couple of security improvement methods for TCP/IP network systems have been introd...