政大機構典藏-National Chengchi University Institutional Repository(NCCUR):Item 140.119/48978
English  |  正體中文  |  简体中文  |  Post-Print筆數 : 27 |  全文笔数/总笔数 : 113318/144297 (79%)
造访人次 : 50982582      在线人数 : 762
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
搜寻范围 查询小技巧:
  • 您可在西文检索词汇前后加上"双引号",以获取较精准的检索结果
  • 若欲以作者姓名搜寻,建议至进阶搜寻限定作者字段,可获得较完整数据
  • 进阶搜寻
    政大機構典藏 > 商學院 > 資訊管理學系 > 學位論文 >  Item 140.119/48978


    请使用永久网址来引用或连结此文件: https://nccur.lib.nccu.edu.tw/handle/140.119/48978


    题名: 同步選擇派翠網路在虛擬私人網路上的應用
    Application of Synchronized Choice Petri Nets to Virtual Private Networks
    作者: 李滎澤
    Ying-tse Lee
    贡献者: 趙玉
    李滎澤
    Ying-tse Lee
    关键词: Synchronized Choice Petri Nets
    Dynamic Key Exchange
    One Time Pads
    Virtual Private Networks
    日期: 2002
    上传时间: 2010-12-08 01:54:39 (UTC+8)
    摘要:   The Synchronize Choice Petri net, a subclass of Petri nets that is constructed based on special structural objects, can improve analytical power to make solving the behavioral problems of Petri nets practically possible. The fact that proving liveness and verifying reachability of a Synchronize Choice Petri net are feasible may lead to several applications. This thesis contributes to one of the applications: building a dynamic key exchange mechanism embedded in Virtual Private Network products by applying Synchronize Choice Petri nets.
      Based on modern symmetric-key algorithms, such as DES, the dynamic key exchange mechanism enables two communicating sides to use the changing keys to encrypt or decrypt messages correctly without requiring any key transmission during the communication session after the initiation. A proper use of the mechanism is to be integrated with Virtual Private Network products to make the information transmitting between two peers more confidential.
    參考文獻: [Brown 1999] Steven Brown, Implementing Virtual Private Networks, McGraw-Hill, 1999.
    [Burnett 2000] Steve Burnett, Crypto Blunders, RSA Security, Inc., 2000.
    [Burnett and Paine 2001] Steve Burnett and Stephen Paine, RSA Security’s Official Guide to Cryptography, McGraw-Hill, 2001.
    [Chao and Nicdao 2001] Daniel Y. Chao and Jose A. Nicdao, Liveness for Synchronized Choice Petri Nets, The Computer Journal, Vol. 44, No. 2, 2001, pp124 — 136.
    [Desel and Reisig 1998] Jörg Desel and Wolfgang Reisig, Place/Transition Petri Nets, Lectures on Petri Nets I: Basic Models — Advances in Petri nets, Lecture Notes in Computer Science, Vol. 1491, 1998, pp122 — 173.
    [Ellison and Schneier 2000] Carl Ellison and Bruce Schneier, Ten Risks of PKI: What You’re not Being Told about Public Key Infrastructure, Computer Security Journal, Vol. 16, No. 1, 2000.
    [Elmasri and Navathe 2000] Ramez Elmasri and Shamkant B. Navathe, Fundamentals of Database Systems, third edition, Addison-Wesley, 2000.
    [Ferguson and Schneier 2002] Niels Ferguson and Bruce Schneier, A Cryptographic Evaluation of IPsec, Counterpane Internet Security, Inc., http://www.counterpane.com, 2002.
    [Lipton 1976] Lipton, R.J., The Reachability Problem Requires Exponential Space, New Haven, CT, Yale University, Dept. of Computer Science, Res. Rep. 62, 1976.
    [Nicdao 2000] Jose A. Nicdao, Fundamental Structures in Petri Nets, Master Thesis, National Cheng Chi University, Taipei, Taiwan, 2000.
    [Peterson 1981] James L. Peterson, Petri Net Theory and the Modeling of Systems, Prentice-Hall, 1981.
    [Rozenberg and Engelfriet 1998] Grzegorz Rozenberg and Joost Engelfriet, Elementary Net Systems, Lectures on Petri Nets I: Basic Models — Advances in Petri nets, Lecture Notes in Computer Science, Vol. 1491, 1998, pp12 — 121.
    [Schneier 1998] Bruce Schneier, Security Pitfalls in Cryptography, Counterpane Systems, 1998.
    [Stallings 1999] William Stallings, Cryptography and Network Security — Principles and Practice, second edition, Prentice-Hall, 1999.
    [Tanenbaum 1996] Andrew S. Tanenbaum, Computer Networks, third edition, Prentice-Hall, 1996.
    [Yuan and Strayer 2001] Ruixi Yuan and W. Timothy Strayer, Virtual Private Networks — Technologies and Solutions, Addison-Wesley, 2001.
    [Wiener 1990] Wiener M., Cryptanalysis of Short RSA Secret Exponents, IEEE Transactions on Information Theory, vol. IT-36, 1990.
    描述: 碩士
    國立政治大學
    資訊管理研究所
    89356016
    91
    資料來源: http://thesis.lib.nccu.edu.tw/record/#A2010000115
    数据类型: thesis
    显示于类别:[資訊管理學系] 學位論文

    文件中的档案:

    档案 大小格式浏览次数
    index.html0KbHTML2261检视/开启


    在政大典藏中所有的数据项都受到原著作权保护.


    社群 sharing

    著作權政策宣告 Copyright Announcement
    1.本網站之數位內容為國立政治大學所收錄之機構典藏,無償提供學術研究與公眾教育等公益性使用,惟仍請適度,合理使用本網站之內容,以尊重著作權人之權益。商業上之利用,則請先取得著作權人之授權。
    The digital content of this website is part of National Chengchi University Institutional Repository. It provides free access to academic research and public education for non-commercial use. Please utilize it in a proper and reasonable manner and respect the rights of copyright owners. For commercial use, please obtain authorization from the copyright owner in advance.

    2.本網站之製作,已盡力防止侵害著作權人之權益,如仍發現本網站之數位內容有侵害著作權人權益情事者,請權利人通知本網站維護人員(nccur@nccu.edu.tw),維護人員將立即採取移除該數位著作等補救措施。
    NCCU Institutional Repository is made to protect the interests of copyright owners. If you believe that any material on the website infringes copyright, please contact our staff(nccur@nccu.edu.tw). We will remove the work from the repository and investigate your claim.
    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - 回馈