封面
声明
Dedication
英文摘要
中文摘要
目录
List of Figures
List of Tables
CHAPTER I: INTRODUCTION
1.1 Backgrounds and Significance
1.2 Status of Online Transaction Technology
1.3 Thesis Content
1.4 Thesis Outline
CHAPTER II:RELATED RESEARCHES AND WORKS
2.1 Security Protocol Analysis
2.2 Basic Authentication Technology
2.2.4 Cloud Environment Technology
2.4 Summary
CHAPTER III: ENHENCED SECURITY PROTOCOL
3.1 Research on PKI security
3.2 Kerberos protocol in cloud
3.3 Improved Kerberos Protocol Evaluation using BAN Logic
3.4 Improved Protocol Performance and Efficiency Analysis
3.5 Chapter Summary
CHAPTER VI:IMPROVED PROTOCOLS DESIGN AND IMPLEMENTATION
4.1 Design Preview
4.2 Improved authentication system design
4.3 Module Design and implementation
4.4 User request for Certificate and Implementation
4.5 System Testing and Evaluation
4.6 Summary
CHAPTER V: CONCLUSION
参考文献
致谢