By Topic

A new trustworthy access scheme based on short signature and implementation on Network Processor

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Xiu-juan Du ; Network Inf. Center, Qinghai Normal Univ., Xining, China ; Zhi-gang Jin

The paper analyzes the security of conventional network access authentication technology and provides a novel IP address pair based short signature technology which strengthens the security of authentication and control. Conforming to TNC architecture, the paper extends the endpoint access domination to MPLS backbone by IP address pair based short signature technology and depicts a new trustworthy network access scheme and realizes it on Network Processor. The scheme enriches the integrity measure of security client and administrator's security policy with ARP virus, fraud DHCP server, address spoofing of IP and MAC, thus enhances the safety and initiative defense ability of enterprise and public networks, and reduces the cost of enterprise for security deployments greatly while achieving the SP's excellent Return-on-Investment.

Published in:

Computer Application and System Modeling (ICCASM), 2010 International Conference on  (Volume:8 )

Date of Conference:

22-24 Oct. 2010