Research on Network Security and Identity Authentication

Article Preview

Abstract:

With the rapid development of computer networks and the popularity of network applications, network security has been people's increasing attention. Network security is an important issue under Network environment, authentication technology plays a very important role for network application security. Through the study of reason perish analysis and system design, providing efficient and practical solutions for network security applications system. The purpose of this paper is to research on authentication mechanisms and authentication protocols, analysis characteristics and application environments of the network authentication system, develop the VIKEY online dynamic two-factor password authentication system.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 926-930)

Pages:

2046-2049

Citation:

Online since:

May 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] W. Stallings. Network Security Essentials : Applications and Standards. Prentice-Hall. Inc , (2000).

Google Scholar

[2] Chang Yu Cheng, Kamaruzzaman Seman, Jasmy Yunus. Authentication Public Terminals with Smart. IEEE Trans on Communications, (2000).

Google Scholar

[3] S. M. Bellovin, M. Merritt. Limitations of the Kerberos In Proceedings of the Winter 1991 Usenix Conference authentication system. January (1991).

Google Scholar

[4] C. Rigney, S. Willens, A. Rubens, W. Simpson. Remote Authentication Dial In User Service (RAIDIUS). RFC2865. IETF Network Working Group, (2000).

DOI: 10.17487/rfc2865

Google Scholar

[5] CT. Gaskell, M. Looi. Integrating Smart Cards into Authentication Systems. Advances in Cryptology-EUROCRYPT'1995 Proceedings , Berlin : Spring Verlag, 1995: 271~281.

Google Scholar