Paper Title:
The Research of SSL VPN Authentication Methods Based on C + +
  Abstract

In order to better meet the government, enterprises, schools and other units of information transmission of the security and confidentiality, this paper studies SSL handshake protocol and SSL Record Protocol, authentication technology and PKI technology, based on in-depth study of Web-based Off mode SSL VPN system architecture, gives a more detailed block diagram of the design ideas and design. Finally, a C + + based on the SSL VPN authentication methods, The results of the research staff with the actual VPN network value.

  Info
Periodical
Chapter
Chapter 7: Mechanical & Automation
Edited by
Robin G. Qiu and Yongfeng Ju
Pages
1081-1086
DOI
10.4028/www.scientific.net/AMM.135-136.1081
Citation
Y. Q. Fan, M. Guo, C. Sun, "The Research of SSL VPN Authentication Methods Based on C + +", Applied Mechanics and Materials, Vols. 135-136, pp. 1081-1086, 2012
Online since
October 2011
Export
Price
$32.00
Share

In order to see related information, you need to Login.

In order to see related information, you need to Login.

Authors: Yan Shen Chen, De Zhi Han
Chapter 12: Computer-Aided Design, Manufacturing and Engineering
Abstract:To solve the data security issue in intranet massive storage system, a Multi-Protocol Secure File System ( for short MPSFS) is designed....
4704
Authors: Zhen Zhong Wang, Yao Wang
Chapter 6: Communication and Network
Abstract:In view of the actual application of the status quo of the current digital campus universities, a unified campus authentication systems and...
1086
  | Authors: Chuan Xie
Chapter 4: Network and Internet Technology, Multimedia Engineering
Abstract:The application of LAN in enterprises has become wider and wider, it brings efficiency and convenience to management and production, but at...
843
Authors: Li Ping Du, Ying Li, Guan Ning Xu, Fei Duan
Chapter 15: Information Security Technology
Abstract:The rapid development of internet of things puts forward urgent needs for security. The security system must be studied to adapt to the...
3125
Authors: Wei Liu, Jing Zhong, Jun Lin
Chapter 8: Software, Communication and Computer Applications in Industry and Engineering
Abstract:By analyzing and extending 802.1X protocol, this paper proposes a scheme of secure terminal access on the internet of things. The scheme...
1818