首页--工业技术论文--自动化技术、计算机技术论文--计算技术、计算机技术论文--一般性问题论文--安全保密论文

Protection of Information in Distance Learning System for Exclusive Access

摘要第4-5页
Abstract第5页
1 INTRODUCTION第8-13页
    1.1 Details of the study第8-10页
    1.2 Objectives of the study第10-11页
    1.3 Practical value第11页
    1.4 Testing work第11-13页
2 ESTABLISHMENT OF PROTECTION FOR SOFTWARE PACKAGE,THE EXAMPLEOF DISTANCE LEARNING第13-32页
    2.1 Information security faced by automated systems of distance learning第13-14页
    2.2 A review of publications on the subject第14-25页
    2.3 The tasks assigned to the protection system第25-28页
    2.4 Choosing a class of system requirements of protection第28-30页
    2.5 Findings第30-32页
3 SUGGESTED METHODS OF CREATION OF INFORMATION INTEGRABLESYSTEMS第32-44页
    3.1 Selecting objects for protection第32-35页
    3.2 Data Encryption第35-41页
        3.2.1 Some general information第35-37页
        3.2.2 Asymmetric cryptosystems第37-38页
        3.2.3 El-Gamal cryptosystem第38-39页
        3.2.4 Cryptosystem Rivest-Shamir-Eydelmana第39-40页
        3.2.5 Cryptosystems based on elliptic curves第40页
        3.2.6 Adapted asymmetric encryption method第40-41页
    3.3 The advantages of using polymorphic encryption algorithms第41-43页
    3.4 The functionality of the system of protection第43-44页
4 IMPLEMENTATION OF PROTECTION第44-64页
    4.1 Choice of development tools and organizations第44-47页
        4.1.1 Brief description of the programming language C++第44-45页
        4.1.2 Brief description of the environment Visual C++第45-46页
        4.1.3 Brief description of the ATL第46-47页
        4.1.4 Brief description of the ZLIB library第47页
    4.2 Polymorphic generator encryption algorithms第47-61页
        4.2.1 General principles of polymorphic encryption and decryption第47-50页
        4.2.2 Virtual machine to perform polymorphic algorithms第50-54页
        4.2.3 Polymorphic code generator第54-59页
        4.2.4 The uniqueness of the generated polymorphic algorithm and its complexity analysis第59-61页
    4.3 Features of the implementation of the security module第61-62页
    4.4 Protection of executable files第62-64页
KEY FINDINGS AND RESULTS第64-65页
THANKS第65-66页
REFERENCES第66-68页
攻读学位期间的研究成果第68页

论文共68页,点击 下载论文
上一篇:河南省地市级文学期刊转企改制发展路径探究
下一篇:车牌定位及识别技术