Malware Defense Using Network Security Authentication

Author(s):  
J.V. Antrosio ◽  
E.W. Fulp
2011 ◽  
Vol 267 ◽  
pp. 831-836
Author(s):  
Wen Shan Wei ◽  
Xian Xiao Meng ◽  
Hai Hua Li

Discuss the network security of distance education, analyze the digital signature technology of network security authentication in distance education and explore the application of sequential digital multi-signature and broadcasting digital multi-signature based on the ElGamal algorithm and the discrete logarithm in the management system of distance education network security.


2013 ◽  
Vol 336-338 ◽  
pp. 1892-1897
Author(s):  
Li Zhou ◽  
Fang Yong Tan

It’s important to insure wireless network authentication security. Via model checking tool SPIN modeling 802.1x EAP-TLS authentication protocol, communication parts are defined with model checking language PROMELA, security properties are expressed by LTL formula, and the model is verified. With the attack track given by SPIN, the security vulnerabilities caused by the improper configuration is pointed out, meanwhile the new tunnel authentication protocol is proposed to reduce the occurrence of attack and to improve the agreement.


2014 ◽  
Vol 9 (2) ◽  
Author(s):  
Ling Xing ◽  
Ling Jiang ◽  
Guohai Yang ◽  
Bin Wen

2011 ◽  
Vol 3 (1) ◽  
pp. 52-54 ◽  
Author(s):  
N. Amsaveni N. Amsaveni ◽  
◽  
R. Vasanthi R. Vasanthi

Sign in / Sign up

Export Citation Format

Share Document