Research on Network Security and Identity Authentication
Authors
Jin Meng, Jing Zhao, Ming-shun Xing, Tie Ma, Hai-yan Zhao
Corresponding Author
Jin Meng
Available Online April 2016.
- DOI
- 10.2991/ameii-16.2016.57How to use a DOI?
- Keywords
- Authentication, Authentication Protocol, USB Key, VIKEY
- Abstract
With the rapid development of computer networks and the popularity of network applications, network security has been people's increasing attention. Network security is an important issue under Network environment, and authentication technology plays a very important role for network application security. Through the study of reason perish analysis and system design, providing efficient and practical solutions for network security applications system. The purpose of this paper is to research on authentication mechanisms and authentication protocols, analysis characteristics and application environments of the network authentication system, which develop the VIKEY online dynamic two-factor password authentication system.
- Copyright
- © 2016, the Authors. Published by Atlantis Press.
- Open Access
- This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).
Cite this article
TY - CONF AU - Jin Meng AU - Jing Zhao AU - Ming-shun Xing AU - Tie Ma AU - Hai-yan Zhao PY - 2016/04 DA - 2016/04 TI - Research on Network Security and Identity Authentication BT - Proceedings of the 2nd International Conference on Advances in Mechanical Engineering and Industrial Informatics (AMEII 2016) PB - Atlantis Press SP - 280 EP - 283 SN - 2352-5401 UR - https://doi.org/10.2991/ameii-16.2016.57 DO - 10.2991/ameii-16.2016.57 ID - Meng2016/04 ER -