首页--工业技术论文--自动化技术、计算机技术论文--计算技术、计算机技术论文--计算机的应用论文--计算机网络论文--一般性问题论文

Design and Implementation of Secure Email Model Based on Building Automation Process

摘要第4-6页
ABSTRACT第6-7页
CHAPTER Ⅰ Introduction第12-17页
    1.1 Introduction第12-13页
    1.2 Paper background第13-14页
    1.3 Thesis innovation第14-15页
    1.4 Structure of the thesis and main works第15-17页
        1.4.1 Structure of the thesis第15-16页
        1.4.2 Main works第16-17页
CHAPTER Ⅱ Electronic mail第17-28页
    2.1 Introduction第17页
    2.2 Definition第17页
    2.3 Email architecture第17-19页
    2.4 Different steps of sending and receiving email第19页
    2.5 Structure and format of an email第19-20页
    2.6 MIME Format (Multipurpose Internet Mail Extensions)第20-22页
    2.7 Some technical concepts第22-23页
    2.8 Protocols and standards第23-27页
        2.8.1 Server SMTP第23-25页
        2.8.2 Servers POP3 and IMAP第25-27页
            2.8.2.1 Server POP第25-26页
            2.8.2.2 Server IMAP第26-27页
    2.9 Conclusion第27-28页
CHAPTER Ⅲ Email security concepts第28-60页
    3.1 Introduction第28页
    3.2 Information theory第28-29页
    3.3 Cryptography history第29-30页
    3.4 Thought and ideas about email security第30页
    3.5 Threats and risks第30-33页
    3.6 Security concepts (Statistics)第33页
    3.7 Cryptography tools and functions第33-34页
        3.7.1 Functions第33-34页
        3.7.2 Tools第34页
    3.8 Data encryption and decryption process第34-35页
    3.9 Cryptography techniques第35-52页
        3.9.1 Cryptography in classical period第35-39页
            3.9.1.1 Caesar system第36页
            3.9.1.2 Vigenere system第36-37页
            3.9.1.3 Playfair system第37-38页
            3.9.1.4 ADFG (V) X system第38页
            3.9.1.5 Enigma machine第38-39页
        3.9.2 Modern cryptography第39-52页
            3.9.2.1 Symmetric-key cryptography第39-43页
                3.9.2.1.1 Stream encryption第40-41页
                3.9.2.1.2 Block encryption第41-43页
                3.9.2.1.3 Advantages and disadvantages第43页
            3.9.2.2 Asymmetric cryptography第43-52页
                3.9.2.2.1 Definition and principle第44-45页
                3.9.2.2.2 Message signature第45-46页
                3.9.2.2.3 Principle of Digital Signature第46-48页
                3.9.2.2.4 Hash algorithm第48-50页
                3.9.2.2.5 Certificates第50-51页
                3.9.2.2.6 Advantages and disadvantages第51-52页
            3.9.2.3 Concept of hybrid encryption第52页
    3.10 Security protocols第52-59页
        3.10.1 Server-side security第53-57页
            3.10.1.1 SSL/TLS Protocol第53-55页
            3.10.1.2 Protocol SSL and electronic mail第55-56页
            3.10.1.3 Protocol HTTPS第56-57页
        3.10.2 Client-side security第57-59页
            3.10.2.1 Pretty Good Privacy (PGP) encryption第57-58页
            3.10.2.2 S/MIME encryption第58页
            3.10.2.3 PGP and S/MIME:common security functions第58页
            3.10.2.4 PGP and S/MIME:Difference第58-59页
    3.11 Conclusion第59-60页
CHAPTER Ⅳ Detailed design and implementation of system modules第60-92页
    4.1 Motivations第60页
    4.2 Building automation process第60-61页
    4.3 The library OpenSSL第61-63页
    4.4 Email user interface第63-67页
        4.4.1 Definition第64-65页
        4.4.2 Batch programming第65-67页
    4.5 Project design第67-68页
    4.6 Project implementation第68-69页
    4.7 Different project modules第69-92页
        4.7.1 Emails management module第70-77页
            4.7.1.1 Postfix第70-74页
            4.7.1.2 Dovecot第74-77页
        4.7.2 Message encryption module第77-84页
            4.7.2.1 Galois Field (28)第77-78页
            4.7.2.2 State第78-79页
            4.7.2.3 Key expansion第79-80页
            4.7.2.4 Rounds number第80页
            4.7.2.5 Algorithms第80-83页
            4.7.2.6 Conclusion第83-84页
        4.7.3 Session key encryption module第84-92页
            4.7.3.1 Key generation第85-86页
            4.7.3.2 Encryption第86-88页
            4.7.3.3 Decryption第88页
            4.7.3.4 RSA algorithm process第88-90页
            4.7.3.5 Risks of attack第90-91页
            4.7.3.6 Conclusion第91-92页
CHAPTER Ⅴ Testing system and performance analysis第92-107页
    5.1 Sending and receiving message testing第92-94页
    5.2 Message encryption testing第94-98页
    5.3 Session key encryption testing第98-101页
    5.4 Secure email system testing第101-107页
CHAPTER Ⅵ Summary and prospects第107-109页
    6.1 Summary第107页
    6.2 Prospects第107-109页
References第109-111页
Acknowledgements第111-112页
List of published academic papers第112页

论文共112页,点击 下载论文
上一篇:支持IPv6的OpenFlow交换模块的设计与实现
下一篇:以信息为中心的传感网缓存机制设计与实现