scispace - formally typeset
P

Pan Qiuyue

Researcher at Beijing University of Technology

Publications -  5
Citations -  21

Pan Qiuyue is an academic researcher from Beijing University of Technology. The author has contributed to research in topics: Spanning Tree Protocol & Authentication. The author has an hindex of 3, co-authored 5 publications receiving 20 citations.

Papers
More filters
Patent

Authentication method for access of trusted network devices to trusted network

TL;DR: In this article, the authors proposed an authentication method for access of trusted network devices to a trusted network, where a filter is started at a port to only allow for passage of authentication frames of the method when a trusted device, provided with an addressing mechanism for the authentication frames, accesses the trusted network.
Patent

A method for detecting abnormities and attacks of an OSPF protocol in a trusted router

TL;DR: In this article, a method for detecting abnormities and attacks aiming at an OSPF protocol in a trusted router belongs to the field of information safety, where dynamic measurement is carried out on the router through the utilization of a TPM module embedded in the router and an internal dynamic measurement module to prevent the router from invasion from an operating system level, so that system configuration and even protocol codes are prevented from being tampered after the invasion.
Journal ArticleDOI

Study on Cloud Security Based on Trust Spanning Tree Protocol

TL;DR: Experiment shows that the trusted protocol can achieve security goals and effectively avoid STP attacks with a lower computation overhead and good convergence performance.
Patent

Attack detection method of spanning tree protocol based on credible switchboard

TL;DR: In this article, an attack detection method of a spanning tree protocol based on a credible switchboard is presented, in which an interior monitoring module is utilized to conduct monitoring for an attack behavior which is generated by the switchboard, an exterior protection module is employed to conduct detecting for the attack threat from the exterior of the switch board, and therefore, full attach detection of the span tree protocol is achieved.
Proceedings ArticleDOI

Trust-Based Security for the Spanning Tree Protocol

TL;DR: Experiment shows that the trusted protocol can achieve security goals and effectively avoid STP attacks with a lower computation overhead and good convergence performance.