Learn More
In order to improve the data security over network and provide more effective data protection product, this paper introduces a network data protection system based on combined symmetric key. The system takes into account four main aspects in data protection, including identity authentication, encryption transmission, access controls and encryption storage.(More)
The secret key based security scheme is proposed for achieving secure online banking. Encryption equipments are adopted at certification servers and client terminals. A secure certification protocol is established by using secret key encryption, combined secret key and smart card techniques. The one-time secret key generated automatically according to the(More)
In order to achieve secure authentication, an asynchronous challenge-response authentication solution is proposed. SD key, encryption cards or encryption machine provide encryption service. Hash function, symmetric algorithm and combined secret key method are adopted while authenticating. The authentication security is guaranteed due to the properties of(More)
Listeria monocytogenes exhibits symbiotic codependence with the dominant commensal bacteria, which may help it avoid being removed or inactivated by disinfectants in local environments. In this study, we investigated L. monocytogenes-positive biofilms at food production facilities, and the dominant bacterial species of the biofilms were identified to(More)
To ensure the Legality of access nodes in WSNs, a lightweight authentication protocol based on identity is proposed. In the protocol, key pools with node identity are prestored on both side of the authentication. By special authentication token generation algorithm and key pool, a onetime authentication code containing identity information is produced to(More)
In order to protect the security of information transmitted in WSN, a lightweight digital signature scheme based on symmetric cryptographic algorithm is proposed. In the scheme, a combined secret key generation algorithm is used to generate one-time signature secret key, while hardware encryption devices is deployed to manage symmetric secret keys and(More)