Design and Realization of Digital Signature System

2012 ◽  
Vol 562-564 ◽  
pp. 872-875
Author(s):  
Xin Cui ◽  
Li Jiang

The crux of safety communication of computer network lies in the accuracy of data transmission and the security of confidential data. Information security is the premise and foundation of all communication based on computer network. Business online becomes much more risky. Security technologies, such as authentication, encryption, must be implemented to ensure the security of the transactions. Digital signature technology plays an irreplaceable role in the fields of identification and authentication, data integrity, anti-repudiation and so on, which has a very wide range of application in e-commerce and e-government. The radical methods and traits of digital signature are introduced. The approach of digital signature based on Java is presented, and its rationality, effectively and feasibility are reasoned, the test results achieved the expected goals and ensured the confidentiality, integrity, and non-repudiation of the information. This solution can be widely used in digital campus, enterprise nets, etc, and has a good application prospect.

2020 ◽  
pp. 6-11
Author(s):  
Alexey Babenko ◽  
Yuliya Gushchina

Information systems and technologies are the main means of increasing people’s productivity and efficiency. And today, along with the tasks of effective processing and transmission of information, the most important task is to ensure the information security of enterprises. According to the global study by InfoWatch, the number of information leaks is growing every year. The largest number of data leaks were recorded in high-tech companies, educational institutions, government agencies and banks. Most often, network traffic is a threat. This threat consists in the interception of data over the network, the purpose of which is to obtain confidential data, passwords, corporate secrets, addresses of network computers, etc. There is a need to create hardware and software tools to protect network resources. Therefore, creating a tool for detecting unauthorized traffic is relevant. The authors consider the problem of information security in the enterprise computer network and carry out the analysis of unauthorized traffic in order to identify its signs. The researchers analyze methods for detecting unauthorized traffic to select the best one and present a developed formalized model for detecting unauthorized traffic.


Author(s):  
O. Semenenko ◽  
Y. Dobrovolsky ◽  
V. Koverga ◽  
O. Sechenev

Evolution of security technologies shows that only the concept of an integrated approach to information security can provide modern information security requirements. A comprehensive approach means the complex development of all the necessary methods and means of information protection. Today, the information exchange and information systems in the Ministry of Defense of Ukraine have certain means and approaches to the destruction of information, but each of them has different estimates of the effectiveness of their use, as well as different cost of their purchase and use. Therefore, the main purpose of the article is to carry out a comprehensive analysis of means of destroying confidential information of methods of its destruction in order to formulate practical recommendations for choosing the most effective and economically feasible for the Ministry of Defense of Ukraine. The perfection of methods and means of destroying information from magnetic media is an important element of modern information security. The results of the analysis carried out in the article are the disclosure of the main features of modern devices for the elimination of magnetic records, as well as the ability to formulate a list of basic requirements for modern devices for the destruction of information from magnetic media. Today, technical means of information security, in particular, the elimination of information on magnetic media, are constantly being improved, absorbing the latest advances in modern security technologies. Their model range, which takes into account the diversity of customer requirements, such as the type of energy supply, the level of mobility, reliability and operating conditions, expands. All this determines the relevance of research topics in this direction in the future.


2013 ◽  
Vol 39 (10) ◽  
pp. 1623
Author(s):  
Yun ZHANG ◽  
Zheng-Guo XU ◽  
Wen-Hai WANG ◽  
Jian-Gang LU ◽  
You-Xian SUN

Author(s):  
Toshimi Kobayashi ◽  
Toru Izaki ◽  
Junichi Kusumoto ◽  
Akihiro Kanaya

The small punch creep (SPC) test is possible to predict residual creep life at a high accuracy. But, the results of SPC tests cannot be compared with uniaxial creep or internal pressure creep results directly. In this report, the relationship between SPC test results and uniaxial creep test results in ASME A335 P11 (1.25Cr-0.5Mo Steel) was studied. The obtained relationship between SPC load and equivalent uniaxial creep stress formed a simple linear equation under the wide range of test temperature and test period. Then, the SPC results can be compared with uniaxial results by converting SPC loads to the equivalent uniaxial creep stresses. The relationship between SPC test results and internal pressure creep tests results was also studied. The internal creep life of as-received P11 pipe was almost same as SPC result when the hoop stress was converted to the SPC load. The creep lives of internal pressure creep influenced materials also showed good correspondence with SPC results. Therefore SPC can estimate the residual life of internal pressure creep influenced materials.


2013 ◽  
Vol 433-435 ◽  
pp. 1720-1723
Author(s):  
Jun Ruan ◽  
Pan Zhang ◽  
Hong Bi Ding

With the rapid development of computer network technology, global information has become mega-trend of modern social development. But due to all kinds of defects existing in the network itself and variety and openness of network interconnection form, network security has become the focus of social attention. So in this paper, a lot of current advanced network security technologies and products are used in order to make network security, which is under the general principles of network security situation.


2000 ◽  
Vol 37 (3) ◽  
pp. 712-722 ◽  
Author(s):  
A Sridharan ◽  
H B Nagaraj

Correlating engineering properties with index properties has assumed greater significance in the recent past in the field of geotechnical engineering. Although attempts have been made in the past to correlate compressibility with various index properties individually, all the properties affecting compressibility behaviour have not been considered together in any single study to examine which index property of the soil correlates best with compressibility behaviour, especially within a set of test results. In the present study, 10 soils covering a sufficiently wide range of liquid limit, plastic limit, and shrinkage limit were selected and conventional consolidation tests were carried out starting with their initial water contents almost equal to their respective liquid limits. The compressibility behaviour is vastly different for pairs of soils having nearly the same liquid limit, but different plasticity characteristics. The relationship between void ratio and consolidation pressure is more closely related to the shrinkage index (shrinkage index = liquid limit - shrinkage limit) than to the plasticity index. Wide variations are seen with the liquid limit. For the soils investigated, the compression index relates better with the shrinkage index than with the plasticity index or liquid limit.Key words: Atterberg limits, classification, clays, compressibility, laboratory tests.


1970 ◽  
Vol 185 (1) ◽  
pp. 407-424 ◽  
Author(s):  
H. R. M. Craig ◽  
H. J. A. Cox

A comprehensive method of estimating the performance of axial flow steam and gas turbines is presented, based on analysis of linear cascade tests on blading, on a number of turbine test results, and on air tests of model casings. The validity of the use of such data is briefly considered. Data are presented to allow performance estimation of actual machines over a wide range of Reynolds number, Mach number, aspect ratio and other relevant variables. The use of the method in connection with three-dimensional methods of flow estimation is considered, and data presented showing encouraging agreement between estimates and available test results. Finally ‘carpets’ are presented showing the trends in efficiencies that are attainable in turbines designed over a wide range of loading, axial velocity/blade speed ratio, Reynolds number and aspect ratio.


Sign in / Sign up

Export Citation Format

Share Document