相似文献/References:
[1]田志英 廖晓群 赵安新.校园网认证计费系统的研究与实现[J].计算机技术与发展,2010,(05):202.
TIAN Zhi-ying,LIAO Xiao-qun,ZHAO An-xin.Research and Implementation of Campus Network Authentication and Accounting System[J].Computer Technology and Development,2010,(01):202.
[2]万久士 李翔 林祥.基于JSSh实现身份认证网站信息采集[J].计算机技术与发展,2009,(10):156.
WAN Jiu-shi,LI Xiang,LIN Xiang.Information Collection of Website which Achieve Identity Authentication Based on JSSh[J].Computer Technology and Development,2009,(01):156.
[3]贺锋 王汝传.一种基于PKI的P2P身份认证技术[J].计算机技术与发展,2009,(10):181.
HE Feng,WANG Ru-chuan.A Peer- to- Peer Identity Authentication Technology Based on PKI[J].Computer Technology and Development,2009,(01):181.
[4]吕武玲 黎忠文.SIP中基于身份认证的安全机制研究[J].计算机技术与发展,2009,(02):158.
LU Wu-ling,LI Zhong-wen.Research on Identity- Based Authentication in SIP[J].Computer Technology and Development,2009,(01):158.
[5]孙印杰 陈智芳 王敏 洪力.基于指纹和数字水印的网络身份认证系统研究[J].计算机技术与发展,2008,(04):147.
SUN Yin-jie,CHEN Zhi-fang,WANG Min,et al.Research of Authentication System Based on Fingerprint and Digital Watermarking[J].Computer Technology and Development,2008,(01):147.
[6]黄叶珏 陈勤.Web网站统一口令认证系统的设计与实现[J].计算机技术与发展,2007,(06):163.
HUANG Ye-jue,CHEN Qin.Design and Implementation of Web Site Universal Password Authentication System[J].Computer Technology and Development,2007,(01):163.
[7]徐小平 尹颖禹.基于数字签名的身份认证模型的一种方案[J].计算机技术与发展,2006,(02):220.
XU Xiao-ping,YIN Ying-yu.A Model Scheme for Identity Verification Based on Digital Signature[J].Computer Technology and Development,2006,(01):220.
[8]范宏生 叶震 侯保花.基于公钥密码体制的Kerberos协议的改进[J].计算机技术与发展,2006,(04):224.
FAN Hong-sheng,YE Zhen,HOU Bao-hua.Improvement of Kerberos Protocol Based on Public Key Cryptosystem[J].Computer Technology and Development,2006,(01):224.
[9]刘建明 贺占庄.硬盘加密和身份认证的硬件实现[J].计算机技术与发展,2006,(06):139.
LIU Jian-ming,HE Zhan-zhuang.A Hardware Design of Harddisk Encryption and Identification[J].Computer Technology and Development,2006,(01):139.
[10]张球河 李也白 王宇鸽 尹天明.电子政务资源安全管理的研究与应用[J].计算机技术与发展,2006,(09):222.
ZHANG Qiu-he,LI Ye-bai,WANG Yu-ge,et al.Research and Application of E- Government Resource Security Management[J].Computer Technology and Development,2006,(01):222.