学科分类
/ 25
500 个结果
  • 简介:Thisletterpresentsak-partyRSAkeysharingschemeandtherelatedalgorithmsarepresented.ItisshownthatthesharedkeycanbegeneratedinsuchacollaborativewaythattheRSAmodulusispubliclyknownbutnoneofthepartiesisabletodecrypttheencipheredmessageindividually.

  • 标签: RSA 密钥分享 原始检测 密钥产生
  • 简介:ThisstudyconcernssecurityissuesoftheemergingWirelessBodySensorNetwork(WBSN)formedbybiomedicalsensorswornonorimplantedinthehumanbodyformobilehealthcareappli-cations.Anovelauthenticatedsymmetric-keyestablishmentschemeisproposedforWBSN,whichfullyexploitsthephysiologicalfeaturesobtainedbynetworkentitiesviathebodychannelavailableinWBSNbutnototherwirelessnetworks.Theself-definedIntrinsicSharedSecret(ISS)isusedtoreplacethepre-deploymentofsecretsamongnetworkentities,whichthuseliminatescentralizedservicesorau-thoritiesessentialinexistingprotocols,andresolvesthekeytransportprobleminthepuresymmet-ric-keycryptosystemforWBSNaswell.Thesecuritypropertiesoftheproposedschemearedemon-stratedintermsofitsattackcomplexityandthetypesofattacksitcanresist.Besides,theschemecanbeimplementedunderalight-weightwayinWBSNsystems.DuetotheimportanceoftheISSconcept,theanalysisonusingfalseacceptance/falserejectionmethodtoevaluatetheperformanceofISSforitsusageintheschemeisalsodemonstrated.

  • 标签: 医疗体域传感器网络 安全认证 对称密钥建立 生物医学传感器
  • 简介:Recently,ithasbeenseenthattheensembleclassifierisaneffectivewaytoenhancethepredictionperformance.However,itusuallysuffersfromtheproblemofhowtoconstructanappropriateclassifierbasedonasetofcomplexdata,forexample,thedatawithmanydimensionsorhierarchicalattributes.Thisstudyproposesamethodtoconstructeanensembleclassifierbasedonthekeyattributes.Inadditiontoitshigh-performanceonprecisionsharedbycommonensembleclassifiers,thecalculationresultsarehighlyintelligibleandthuseasyforunderstanding.Furthermore,theexperimentalresultsbasedontherealdatacollectedfromChinaMobileshowthatthekey-attributes-basedensembleclassifierhasthegoodperformanceonbothoftheclassifierconstructionandthecustomerchurnprediction.

  • 标签: CUSTOMER churn data mining ENSEMBLE CLASSIFIER
  • 简介:Histogramofcollineargradient-enhancedcoding(HCGEC),arobustkeypointdescriptorformulti-spectralimagematching,isproposed.TheHCGECmainlyencodesroughstructureswithinanimageandsuppressesdetailedtexturalinformation,whichisdesirableinmulti-spectralimagematching.Experimentsontwomulti-spectraldatasetsdemonstratethattheproposeddescriptorcanyieldsignificantlybetterresultsthansomestate-ofthe-artdescriptors.

  • 标签: 图像匹配 多光谱 纹理信息 直方图 数据集 描述符
  • 简介:在信任计算的一个重要函数是保护的存储,它能保护数据和钥匙的无限的数量。在存在为信任站台的信任站台模块(TPM)钥匙装载计划,有是的TPM的一个计算平台它的信任的锚,装载操作的全部的时间与装载目标目标的祖先的数字一样,导致装载有许多祖先的一把TPM钥匙的低效率。改进效率,装载计划的一把基于身份的TPM钥匙被建议。在这个计划,装载操作的时间当任何TPM钥匙被装进TPM时,仅仅是二。因此,要求的时间花费了因为装载一个TPM关键罐头被减少,特别为复杂TPM关键存储层次。由分析正确性,安全,效率和可行性,建议计划有更好理论并且应用程序价值。

  • 标签: 加载方案 计算平台 TPM 存储层次结构 装载方案 时间成本
  • 简介:Timeefficiencyofkeyestablishmentandupdateisoneofthemajorproblemscontributorykeymanagementsstrivetoaddress.Toachievebettertimeefficiencyinkeyestablishment,weproposeaLocation-basedHuffman(L-Huffman)scheme.First,usersareseparatedintoseveralsmallgroupstominimizecommunicationcostwhentheyaredistributedoverlargenetworks.Second,bothuser'scomputationdifferenceandmessagetransmissiondelayaretakenintoconsiderationwhenHuffmancodingisemployedtoformingtheoptimalkeytree.Third,thecombinedweightsinHuffmantreearelocatedinahigherplaceofthekeytreetoreducethevarianceoftheaveragekeygenerationtimeandminimizethelongestkeygenerationtime.SimulationsdemonstratethatL-HuffmanhasmuchbetterperformanceinwideareanetworksandisalittlebetterinlocalareanetworkthanHuffmanscheme.

  • 标签: 位置感知 霍夫曼 密钥 HUFFMAN编码 HUFFMAN树 时间效率
  • 简介:Thisarticleisfocusedonanalyzingthekeytechnologiesofnewmaliciouscodeandcorrespondingdefensivemeasuresinthelarge-scalecommunicationnetworks.Basedondescriptionoftheconceptsanddevelopmentofthemaliciouscode,thearticleintroducestheanti-analysistechnology,splittingandinsertingtechnology,hidingtechnology,polymorphvirustechnology,andautoproductiontechnologyofthemaliciouscodetrendswithintelligence,diversityandintegration.Followingthat,itsummarizesthesecurityvulnerabilitiesofcommunicationnetworksfromfourrelatedlayersaspects,accordingtothemechanismsofmaliciouscodeinthecommunicationnetworks.Finally,itproposesrapidresponsedispositionofmaliciouscodeattacksfromfourcorrelatedsteps:buildingupthenetworknodemonitoringsystem,suspiciouscodefeatureautomationanalysisandextraction,rapidactivemaliciouscoderesponsetechniqueforunknownmaliciouscode,andmaliciouscodeattackimmunitytechnique.Asaresult,itactivelydefensesagainsttheunknownmaliciouscodeattacksandenhancesthesecurityperformanceofcommunicationnetworks.

  • 标签: 反分析技术 恶意代码 通信网络 防御措施 汽车生产技术 自动化分析
  • 简介:Certificatelessencryptionattractsalotofattentionsofarbyeliminatingthekeyescrowprobleminidentity-basedencryptionandpublickeycertificatesinthetraditionalpublickeycryptography.Byconsideringthethreatfromthekeyexposure,itisdesirabletoincorporatetheideaofkey-insulatedcryptosystemintothecertificatelessencryption.Inthispaper,wehavedesignedanefficientcertificatelesskeyinsulatedencryption(CL-KIE)schemetoachievethisgoal.Byourapproach,thecomputationalperformanceofourschemehasbeenimprovedsignificantlyintermsofreductiononrunningtimeandstorage.WealsogavethesecurityproofofthenewCL-KIEschemeagainstthechosenplaintextattacks(CPAs)intherandomoracle,consideringtheassumptionofthecomputationalDiffie-Hellman(CDH)problem.

  • 标签: CERTIFICATELESS cryptography keyinsulated pairing-free random oracle
  • 简介:Nowadays,thepassword-basedremoteuserauthenticationmechanismusingsmartcardisoneofthesimplestandconvenientauthenticationwaystoensuresecurecommunicationsoverthepublicnetworkenvironments.Recently,Liuetal.proposedanefficientandsecuresmartcardbasedpasswordauthenticationscheme.However,wefindthatLiuetal.’sschemeisvulnerabletotheoff-linepasswordguessingattackanduserimpersonationattack.Furthermore,italsocannotprovideuseranonymity.Inthispaper,wecryptanalyzeLiuetal.’sschemeandproposeasecurityenhanceduserauthenticationschemetoovercometheaforementionedproblems.Especially,inordertopreservetheuseranonymityandpreventtheguessingattack,weusethedynamicidentitytechnique.Theanalysisshowsthattheproposedschemeismoresecureandefficientthanotherrelatedauthenticationschemes.

  • 标签: AUTHENTICATION OFF-LINE PASSWORD guessing ATTACK smart
  • 简介:Withouttheassumptionthattheprivatekeysarekeptsecureperfectly,cryptographicprimitivescannotbedeployedintheinsecureenvironmentswherethekeyleakageisinevitable.Inordertoreducethedamagecausedbythekeyexposureintheidentity-based(ID-based)signaturescenariosefficiently,weproposeanID-basedkey-insulatedsignatureschemeinthispaper,whicheliminatestheexpensivebilinearpairingoperations.Comparedwiththepreviouswork,ourschememinimizesthecomputationcostwithoutanyextracost.Underthediscretelogarithm(DL)assumption,asecurityproofofourschemeintherandomoraclemodelhasalsobeengiven.

  • 标签: 双线性配对 签名方案 密钥 免费 随机预言模型 安全性
  • 简介:Intheair-waterquantumkeydistribution(QKD),theirregularseasurfacehassomeinfluenceonthephotonpolariza-tionstate.Thewindisconsideredasthemainfactorcausingtheirregularity,sothemodelofirregularseasurfacebasedonthewindspeedisadopted.Therelationshipsofthequantumbiterrorratewiththewindspeedandtheinitialincidentanglearesimulated.Therefore,themaximumsecuretransmissiondepthofQKDisconfirmed,andthelimita-tionofthewindspeedandtheinitialincidentangleisdetermined.Thesimulationresultsshowthatwhenthewindspeedandtheinitialincidentangleincrease,theperformanceofQKDwillfalldown.Undertheintercept-resendattackcondition,themaximumsafetransmissiondepthofQKDisupto105m.Torealizesafecommunicationsinthesafedivingdepthofsubmarines(100m),theinitialincidentangleisrequestedtobenotexceeding26~,andwiththeinitialincidentan~leincreased,thelimitationofwindspeedisdecreased.

  • 标签: IRREGULAR sea surface quantum key distri-aution
  • 简介:Withparametricdown-conversionsources(PDCSs),thenonorthogonaldecoystateprotocolbasedononevacuumandtwoweakdecoystatesispresented.ThedetectioneventsonBob'ssidearedividedintotwogroupsdependingonwhetherAlicegetsatriggerornot:triggeredcomponentsandnontriggeredcomponents.Thetriggeredcomponentsareusedtoestimatethefractionsanderrorratesofsingle-photonandtwo-photonpulses,andthenthefinalsecurekeyrateisdeduced.Besides,bothtriggeredandnontriggeredcomponentsareusedtodeduceamoreaccuratevalueofthekeygenerationrate.Thesimulationofthefinalkeygenerationrateovertransmissiondistanceshowsthatthefirstmethodcanobtainakeygenerationrateclosetothetheoreticallimitoftheinfinitedecoystateprotocol,whilethesecondmethodisbetter.

  • 标签: 量子密钥分发 参量下转换 非正交 诱骗 真空状态 安全密钥
  • 简介:通信使人们的沟通更加紧密,移动通信的飞速发展使得人们的通信手段越来越简单快捷。缓存技术的引入可以减少移动通信网络的回传时间,加快用户业务的响应时间,被认为是一项很有前途的技术。本文从移动通信的网络架构出发,探索如何将缓存技术引入到移动通信的设计方案,从而提高当前网络的性能。本文将研究重点放在D2D模式下的缓存方案、接入网的缓存结构以及基于缓存的资源调度模式上面。这些方案可以很好地减小网络回传开销,增大网络资源利用率,极大地提高移动通信网络性能。

  • 标签: 移动通信 缓存网络 D2D 回传
  • 简介:为了在无线传感器网络(WSN)完成安全通讯,在有有限计算能力的传感器节点随机在敌对领土上被散布的地方,各种各样的关键分发前策划(KPS)被建议了。在这份报纸,新KPS在有限的地上基于symplectic几何学被建议。在一个symplectic空格的固定维的subspace代表一个节点,所有1-dimensionalsubspaces表示钥匙和每个节点分享了钥匙。但是这天真的印射不保证一个好网络得到跳回。因此,它被建议二个节点不得不计算一把pairwise钥匙的提高的KPS,仅当他们分享至少q普通钥匙。这条途径对节点俘获攻击提高跳回。与解决方案的存在相比,结果证明那条新途径更加提高网络可伸缩性,并且完成好连接和好全面性能。

  • 标签: 分发前计划 symplectic 几何学 WSN
  • 简介:随着固定与移动通信的融合成为通信行业的未来发展趋势之一,基于IMS的网络融合方案已成为近年来的热点话题之一。IMS的一大特点是能够为用户提供丰富的业务。本文首先介绍了IMS的基本概念和网络架构,然后提出了IMS网络业务的特点。并列出了几个IMS上典型的应用

  • 标签: IMS SIP 业务
  • 简介:随着现代通信技术的发展.光通信已经无可替代的成为现代通信的主体.光通信渗透着整个通信领域各个角落.大到电信运营商.小到企业内部局域网。光网络以其长距离.高带宽.高保密性.正一步一步占据通信领域不可推翻的地位。万兆以太网.以及超长距离主干网和多业务光纤平台是未来光网络的发展趋势。

  • 标签: 光网络 光通信 多业务 光纤 现代通信技术 保密性
  • 简介:随着生产力推动高科技的进一步快速发展,网络时间同步越来越在通信、深空探测。国防等高精尖技术应用领域得到广泛的应用。本文从互联网、全球导航系统,美国战场通信网及我国通信网等多个角度,对国内外网络时间同步的应用现状进行了研究,并对我国网络时间同步的应用前景进行了展望。

  • 标签: 网络时间同步 NTP PTP 通信网
  • 简介:摘要:现如今,我国已经进入互联网时代,在计算机网络规模逐渐扩大与网络系统设计愈加复杂的过程中,人们愈发地重视网络安全防护体系的建设,并积极探索网络管理技术的应用,因为这是确保整个网络高效、安全运行的重要条件。本文将基于计算机系统在网络环境下所面临的风险与威胁分析,简要分析安全防护体系中的网络管理技术应用和该技术今后的发展趋势。

  • 标签: 网络管理 安全防护体系 网络管理技术 应用
  • 简介:无锡电视台网络字幕管理系统概况及功能特点无锡电视台网络字幕系统与无锡新传媒中心播出系统直接关联.是一个基于数据库的三维包装自动播出系统,采用全网络化架构,将网络字幕与实时三维在线包装相结合,具有强大的三维字幕创作功能。这套网络字幕系统的播出效果、操作方便性、系统稳定性均十分出色,是播出系统不可或缺的重要组成部分。(1)网络字幕系统与单机及传统字幕系统的区别(表)

  • 标签: 网络字幕机 制播分离 预编单 播出安全