首页 | 本学科首页   官方微博 | 高级检索  
     

基于混沌理论的网络安全技术
引用本文:张亮. 基于混沌理论的网络安全技术[J]. 计算机应用与软件, 2004, 21(6): 109-111
作者姓名:张亮
作者单位:江苏警官学院,南京,210012
摘    要:基于混沌理论的网络安全技术采用一次性口令的双因素企业级网络访问认证,重点是网络口令确认,结合服务器端、其它安全授权等。系统工作于客户机/服务器模式,主要由“认证服务器”和“电子令牌”组成。具有身份鉴别、安全审定、非法登录报警等功能,是传统网络安全产品强有力的助手、是网络安全的重要工具。

关 键 词:混沌理论  网络安全  加密算法  接口技术

NETWORK SECURITY TECHNIQUES BASED ON THEORY OF CHAOS
Zhang Liang. NETWORK SECURITY TECHNIQUES BASED ON THEORY OF CHAOS[J]. Computer Applications and Software, 2004, 21(6): 109-111
Authors:Zhang Liang
Abstract:Two factor enterprise level authentication of network access via one time password is applied in the net security techniques based on theory of chaos.The key point is authentication of the network password with the server and other security authorization.The system works with client/server mode.It includes authentication server and electronic token.It has the functions including identity identification,security authentication and alarm on illegal log in.It could act as a powerful assistant of traditional network security products as well as a crucial tool in network security.
Keywords:Theory of chaos Network security Encryption algorithm Interface technique
本文献已被 CNKI 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号