The Research and Implementation of Expert Identity Authentication Technology in the Science and Technology Awarding Review System

Article Preview

Abstract:

In the process of scientific and technical awarding review each phase involves a lot of sensitive information. In order to embody the fairness and impartiality of review process, the safety protection of sensitive data is particularly important. This paper starts from the identity authentication, designs and implement second check technology. Practice proves that the use of these techniques greatly enhance the security and stability of the system.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 430-432)

Pages:

1682-1685

Citation:

Online since:

January 2012

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2012 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Liu Richu, Research and Implementation of Uniform Identity Authentication based on SOA, Net Security Technologies and Application. 2011, 5(1), pp.74-76.

Google Scholar

[2] WANG Yue, Design and realization of information security access control system based on PKI technology, Computer Engineering and Design. 2011, 32(4), pp.1249-1251.

Google Scholar

[3] HUANG Jun, RSA Algorithm-based Concentrated Identity Authentication Model Research, Network & Computer Security. 2010, (11), pp.1-3.

Google Scholar

[4] HUANG Yong-Sheng, Fusion of Open Source and Role Based Access Control, Computer Systems& Applications. 2010, (10), pp.108-111.

Google Scholar

[5] SHU Jian, Improvement of ID-based authenticated key exchange protocol, Application Research of Computers. 2010, (1), pp.218-219.

Google Scholar