Paper Title:
Digital Signature Technology Research of Distance Education Network Security Authentication
  Abstract

Discuss the network security of distance education, analyze the digital signature technology of network security authentication in distance education and explore the application of sequential digital multi-signature and broadcasting digital multi-signature based on the ElGamal algorithm and the discrete logarithm in the management system of distance education network security.

  Info
Periodical
Edited by
Yanwen Wu
Pages
831-836
DOI
10.4028/www.scientific.net/AMR.267.831
Citation
W. S. Wei, X. X. Meng, H. H. Li, "Digital Signature Technology Research of Distance Education Network Security Authentication", Advanced Materials Research, Vol. 267, pp. 831-836, 2011
Online since
June 2011
Export
Price
$35.00
Share

In order to see related information, you need to Login.

In order to see related information, you need to Login.

Authors: Grace C.W. Ting, Bok Min Goi, S. W. Lee
Abstract:H.264/AVC is a widespread standard for high definition video (HD) for example DVD and HD videos on the internet. To prevent unauthorized...
552
Authors: Ying Li Wei, Tian Huang Chen
Chapter 1: CAD/CAM
Abstract:Security of messaging middleware is the key issue to ensure the integrity of news transmission. By analyzing the defects on safety of current...
39
Authors: Jia Liu, Yu Li Shen
Chapter 6: Communication and Network
Abstract:In this paper, a wireless local area network (WLAN) authentication scheme is proposed to both enhance the security and the working efficiency...
1113
Authors: Yu Guang Yang, Hai Ping Chai
Chapter 1: Computing, Industrial Engineering and Technology
Abstract:In most existing authentication schemes users are authenticated by the server one by one which results in lower efficiency of authentication...
20
Authors: Li Ping Du, Ying Li, Guan Ning Xu, Fei Duan
Chapter 15: Information Security Technology
Abstract:The rapid development of internet of things puts forward urgent needs for security. The security system must be studied to adapt to the...
3125