期刊文献+

双连接文件安全传输的设计与实现 被引量:1

Design and implementation of dual connection secure file transfer
下载PDF
导出
摘要 针对文件传输存在的安全性缺陷,提出了一种基于转发模式的双连接文件安全传输方法。采用转发隔离思想设计了双连接结构,对文件存储服务器和客户端进行隔离,通过文件安全传输协议栈实现数据的全程加密和可靠传输,并讨论和解决了双连接结构的数据传输引起的流量控制问题。实验结果表明,基于转发模式的双连接文件安全传输在确保服务器安全性和数据密文传输的同时,保障了文件传输的速度和效率。 Against file transfer security flaws, a dual connection secure file transfer method is proposed based on forwarding model. A dual connection structure is designed by the ideas of forwarding and isolation, which isolates file storage server and client. Full encryption and reliable data transmission is achieved by secure file transfer protocol stack. And a problem of flow control caused by the dual connection structure is discussed and resolved. The experimental results show that secure file transfer method by dual connection based on forward model not only ensures ciphertext transmission and the security of server, but also ensures the speed and efficiency of file transfer.
出处 《计算机工程与应用》 CSCD 2012年第25期92-97,共6页 Computer Engineering and Applications
基金 国家自然科学基金(No.60803157 No.60821001)
关键词 转发 双连接 安全传输 隔离 forward dual connection secure transfer isolate
  • 相关文献

参考文献5

二级参考文献35

  • 1齐芳,贾维嘉,鲍丰,吴永东,王国军.基于参数优化批处理的TLS协议(英文)[J].软件学报,2007,18(6):1522-1530. 被引量:2
  • 2北京京泰网络科技有限公司.抵御网络攻击的最安全手段[J].信息安全与通信保密,2002,(20).
  • 3John Shapley Gray.UNIX进程间通信[M].北京:电子工业出版社,2001-03
  • 4DOUGLAS E COMER.用TCP/IP进行网际互连[M].第1卷,北京:电子工业出版社,1999-06
  • 5[3]杨沙洲.Posix线程编程指南.http://www-900.ibm.com/developerWorks/cn/linux/thread/posix_threadapi/partl/indcx.shtml
  • 6SUN H M, WU M E, TING W C, et al.Dual RSA and its security analysis[J].IEEE Trans on Information Theory,2007,53(8):2922-2933.
  • 7MAMUN M A, MOTAHSRUL M I, MASHIHURE R S M, et al.Performance evaluation of several efficient RSA variants[J].International Journal of Computer Science and Network Security,2008,8(7):7-11.
  • 8COLLINS T, HOPKINS D, LANGFORD S, et al.Public key cryptographic apparatus and method:US Patent 5,848[P].1997.
  • 9BONEH D, SHACHAM H.Fast variants of RSA[J].Crypto-Bytes ,2002,5(1):1-9.
  • 10WIENER M.Cryptanalysis of short RSA secret exponents[J].IEEE Trans on Information Theory,1990,36(3):553-558.

共引文献29

同被引文献4

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部