Indexed by:
Abstract:
In order to realize a trusted private network, firstly, trusted computing technologies are utilized. Then with the use of combined public key algorithm (CPK), the trust chain from trustworthy terminal can be led into private networks, and the USB Key technique is used to overcome the weakness of CPK. Finally, with the cryptogram management and security management as the center, a comprehensive secure defensive system is constructed, and a trusted network model is established to realize security, authenticity, controllability and reliability of private networks.
Keyword:
Reprint Author's Address:
Email:
Source :
Journal of Beijing University of Technology
ISSN: 0254-0037
Year: 2006
Issue: 11
Volume: 32
Page: 1032-1036
Cited Count:
WoS CC Cited Count: 0
SCOPUS Cited Count:
ESI Highly Cited Papers on the List: 0 Unfold All
WanFang Cited Count:
Chinese Cited Count:
30 Days PV: 12
Affiliated Colleges: