学科分类
/ 2
33 个结果
  • 简介:Thisletterpresentsak-partyRSAkeysharingschemeandtherelatedalgorithmsarepresented.ItisshownthatthesharedkeycanbegeneratedinsuchacollaborativewaythattheRSAmodulusispubliclyknownbutnoneofthepartiesisabletodecrypttheencipheredmessageindividually.

  • 标签: RSA 密钥分享 原始检测 密钥产生
  • 简介:ThisstudyconcernssecurityissuesoftheemergingWirelessBodySensorNetwork(WBSN)formedbybiomedicalsensorswornonorimplantedinthehumanbodyformobilehealthcareappli-cations.Anovelauthenticatedsymmetric-keyestablishmentschemeisproposedforWBSN,whichfullyexploitsthephysiologicalfeaturesobtainedbynetworkentitiesviathebodychannelavailableinWBSNbutnototherwirelessnetworks.Theself-definedIntrinsicSharedSecret(ISS)isusedtoreplacethepre-deploymentofsecretsamongnetworkentities,whichthuseliminatescentralizedservicesorau-thoritiesessentialinexistingprotocols,andresolvesthekeytransportprobleminthepuresymmet-ric-keycryptosystemforWBSNaswell.Thesecuritypropertiesoftheproposedschemearedemon-stratedintermsofitsattackcomplexityandthetypesofattacksitcanresist.Besides,theschemecanbeimplementedunderalight-weightwayinWBSNsystems.DuetotheimportanceoftheISSconcept,theanalysisonusingfalseacceptance/falserejectionmethodtoevaluatetheperformanceofISSforitsusageintheschemeisalsodemonstrated.

  • 标签: 医疗体域传感器网络 安全认证 对称密钥建立 生物医学传感器
  • 简介:Recently,ithasbeenseenthattheensembleclassifierisaneffectivewaytoenhancethepredictionperformance.However,itusuallysuffersfromtheproblemofhowtoconstructanappropriateclassifierbasedonasetofcomplexdata,forexample,thedatawithmanydimensionsorhierarchicalattributes.Thisstudyproposesamethodtoconstructeanensembleclassifierbasedonthekeyattributes.Inadditiontoitshigh-performanceonprecisionsharedbycommonensembleclassifiers,thecalculationresultsarehighlyintelligibleandthuseasyforunderstanding.Furthermore,theexperimentalresultsbasedontherealdatacollectedfromChinaMobileshowthatthekey-attributes-basedensembleclassifierhasthegoodperformanceonbothoftheclassifierconstructionandthecustomerchurnprediction.

  • 标签: CUSTOMER churn data mining ENSEMBLE CLASSIFIER
  • 简介:Histogramofcollineargradient-enhancedcoding(HCGEC),arobustkeypointdescriptorformulti-spectralimagematching,isproposed.TheHCGECmainlyencodesroughstructureswithinanimageandsuppressesdetailedtexturalinformation,whichisdesirableinmulti-spectralimagematching.Experimentsontwomulti-spectraldatasetsdemonstratethattheproposeddescriptorcanyieldsignificantlybetterresultsthansomestate-ofthe-artdescriptors.

  • 标签: 图像匹配 多光谱 纹理信息 直方图 数据集 描述符
  • 简介:在信任计算的一个重要函数是保护的存储,它能保护数据和钥匙的无限的数量。在存在为信任站台的信任站台模块(TPM)钥匙装载计划,有是的TPM的一个计算平台它的信任的锚,装载操作的全部的时间与装载目标目标的祖先的数字一样,导致装载有许多祖先的一把TPM钥匙的低效率。改进效率,装载计划的一把基于身份的TPM钥匙被建议。在这个计划,装载操作的时间当任何TPM钥匙被装进TPM时,仅仅是二。因此,要求的时间花费了因为装载一个TPM关键罐头被减少,特别为复杂TPM关键存储层次。由分析正确性,安全,效率和可行性,建议计划有更好理论并且应用程序价值。

  • 标签: 加载方案 计算平台 TPM 存储层次结构 装载方案 时间成本
  • 简介:Timeefficiencyofkeyestablishmentandupdateisoneofthemajorproblemscontributorykeymanagementsstrivetoaddress.Toachievebettertimeefficiencyinkeyestablishment,weproposeaLocation-basedHuffman(L-Huffman)scheme.First,usersareseparatedintoseveralsmallgroupstominimizecommunicationcostwhentheyaredistributedoverlargenetworks.Second,bothuser'scomputationdifferenceandmessagetransmissiondelayaretakenintoconsiderationwhenHuffmancodingisemployedtoformingtheoptimalkeytree.Third,thecombinedweightsinHuffmantreearelocatedinahigherplaceofthekeytreetoreducethevarianceoftheaveragekeygenerationtimeandminimizethelongestkeygenerationtime.SimulationsdemonstratethatL-HuffmanhasmuchbetterperformanceinwideareanetworksandisalittlebetterinlocalareanetworkthanHuffmanscheme.

  • 标签: 位置感知 霍夫曼 密钥 HUFFMAN编码 HUFFMAN树 时间效率
  • 简介:Thisarticleisfocusedonanalyzingthekeytechnologiesofnewmaliciouscodeandcorrespondingdefensivemeasuresinthelarge-scalecommunicationnetworks.Basedondescriptionoftheconceptsanddevelopmentofthemaliciouscode,thearticleintroducestheanti-analysistechnology,splittingandinsertingtechnology,hidingtechnology,polymorphvirustechnology,andautoproductiontechnologyofthemaliciouscodetrendswithintelligence,diversityandintegration.Followingthat,itsummarizesthesecurityvulnerabilitiesofcommunicationnetworksfromfourrelatedlayersaspects,accordingtothemechanismsofmaliciouscodeinthecommunicationnetworks.Finally,itproposesrapidresponsedispositionofmaliciouscodeattacksfromfourcorrelatedsteps:buildingupthenetworknodemonitoringsystem,suspiciouscodefeatureautomationanalysisandextraction,rapidactivemaliciouscoderesponsetechniqueforunknownmaliciouscode,andmaliciouscodeattackimmunitytechnique.Asaresult,itactivelydefensesagainsttheunknownmaliciouscodeattacksandenhancesthesecurityperformanceofcommunicationnetworks.

  • 标签: 反分析技术 恶意代码 通信网络 防御措施 汽车生产技术 自动化分析
  • 简介:Certificatelessencryptionattractsalotofattentionsofarbyeliminatingthekeyescrowprobleminidentity-basedencryptionandpublickeycertificatesinthetraditionalpublickeycryptography.Byconsideringthethreatfromthekeyexposure,itisdesirabletoincorporatetheideaofkey-insulatedcryptosystemintothecertificatelessencryption.Inthispaper,wehavedesignedanefficientcertificatelesskeyinsulatedencryption(CL-KIE)schemetoachievethisgoal.Byourapproach,thecomputationalperformanceofourschemehasbeenimprovedsignificantlyintermsofreductiononrunningtimeandstorage.WealsogavethesecurityproofofthenewCL-KIEschemeagainstthechosenplaintextattacks(CPAs)intherandomoracle,consideringtheassumptionofthecomputationalDiffie-Hellman(CDH)problem.

  • 标签: CERTIFICATELESS cryptography keyinsulated pairing-free random oracle
  • 简介:现代生活的数字电器中都有一个核心元件控制其它部件工作,那就是CPU,也就是微控制器:但凡数字电器都离不了CPU,就连微不足道的风扇,现在也植入了CPU,用红外线控制其档位。比起以前的手动控制方便很多,这就是CPU的作用。CPU相当于人的大脑,发布各种命令,控制全身的每一个关节,由此可见CPU的工作量很大,凡事必“亲临处理”,其负担过重,那么寿命就会缩短。

  • 标签: CPU 微控制器 数字电器 红外线控制 现代生活 手动控制
  • 简介:Nowadays,thepassword-basedremoteuserauthenticationmechanismusingsmartcardisoneofthesimplestandconvenientauthenticationwaystoensuresecurecommunicationsoverthepublicnetworkenvironments.Recently,Liuetal.proposedanefficientandsecuresmartcardbasedpasswordauthenticationscheme.However,wefindthatLiuetal.’sschemeisvulnerabletotheoff-linepasswordguessingattackanduserimpersonationattack.Furthermore,italsocannotprovideuseranonymity.Inthispaper,wecryptanalyzeLiuetal.’sschemeandproposeasecurityenhanceduserauthenticationschemetoovercometheaforementionedproblems.Especially,inordertopreservetheuseranonymityandpreventtheguessingattack,weusethedynamicidentitytechnique.Theanalysisshowsthattheproposedschemeismoresecureandefficientthanotherrelatedauthenticationschemes.

  • 标签: AUTHENTICATION OFF-LINE PASSWORD guessing ATTACK smart
  • 简介:Withouttheassumptionthattheprivatekeysarekeptsecureperfectly,cryptographicprimitivescannotbedeployedintheinsecureenvironmentswherethekeyleakageisinevitable.Inordertoreducethedamagecausedbythekeyexposureintheidentity-based(ID-based)signaturescenariosefficiently,weproposeanID-basedkey-insulatedsignatureschemeinthispaper,whicheliminatestheexpensivebilinearpairingoperations.Comparedwiththepreviouswork,ourschememinimizesthecomputationcostwithoutanyextracost.Underthediscretelogarithm(DL)assumption,asecurityproofofourschemeintherandomoraclemodelhasalsobeengiven.

  • 标签: 双线性配对 签名方案 密钥 免费 随机预言模型 安全性
  • 简介:Intheair-waterquantumkeydistribution(QKD),theirregularseasurfacehassomeinfluenceonthephotonpolariza-tionstate.Thewindisconsideredasthemainfactorcausingtheirregularity,sothemodelofirregularseasurfacebasedonthewindspeedisadopted.Therelationshipsofthequantumbiterrorratewiththewindspeedandtheinitialincidentanglearesimulated.Therefore,themaximumsecuretransmissiondepthofQKDisconfirmed,andthelimita-tionofthewindspeedandtheinitialincidentangleisdetermined.Thesimulationresultsshowthatwhenthewindspeedandtheinitialincidentangleincrease,theperformanceofQKDwillfalldown.Undertheintercept-resendattackcondition,themaximumsafetransmissiondepthofQKDisupto105m.Torealizesafecommunicationsinthesafedivingdepthofsubmarines(100m),theinitialincidentangleisrequestedtobenotexceeding26~,andwiththeinitialincidentan~leincreased,thelimitationofwindspeedisdecreased.

  • 标签: IRREGULAR sea surface quantum key distri-aution
  • 简介:Withparametricdown-conversionsources(PDCSs),thenonorthogonaldecoystateprotocolbasedononevacuumandtwoweakdecoystatesispresented.ThedetectioneventsonBob'ssidearedividedintotwogroupsdependingonwhetherAlicegetsatriggerornot:triggeredcomponentsandnontriggeredcomponents.Thetriggeredcomponentsareusedtoestimatethefractionsanderrorratesofsingle-photonandtwo-photonpulses,andthenthefinalsecurekeyrateisdeduced.Besides,bothtriggeredandnontriggeredcomponentsareusedtodeduceamoreaccuratevalueofthekeygenerationrate.Thesimulationofthefinalkeygenerationrateovertransmissiondistanceshowsthatthefirstmethodcanobtainakeygenerationrateclosetothetheoreticallimitoftheinfinitedecoystateprotocol,whilethesecondmethodisbetter.

  • 标签: 量子密钥分发 参量下转换 非正交 诱骗 真空状态 安全密钥
  • 简介:第一期《手机维修中的常用技巧》已提到检修手机的常用技巧,通过不同的检修方法,分析判断出故障发生的部位,根据故障的类型,进行排除。这里接着讲故障的分类与判断技巧。

  • 标签: 手机 元器件 电源块 逻辑电路 逻辑芯片 故障分类
  • 简介:经过多年市场培育后,中国的知识管理逐步迎来收获的季节.联想实施知识管理,政府开始关注知识管理应用,都标志着市场开始进一步活跃.据调查,目前国内比较大的知识管理系统提供商年销售额可以达到5000万以上.根据我们的判断,2004年对于中国知识管理而言是成熟的前夜,目前为较佳进入时机.

  • 标签: 知识管理系统 市场培育 中国知识 进入时机 提供商 年销售额
  • 简介:为了在无线传感器网络(WSN)完成安全通讯,在有有限计算能力的传感器节点随机在敌对领土上被散布的地方,各种各样的关键分发前策划(KPS)被建议了。在这份报纸,新KPS在有限的地上基于symplectic几何学被建议。在一个symplectic空格的固定维的subspace代表一个节点,所有1-dimensionalsubspaces表示钥匙和每个节点分享了钥匙。但是这天真的印射不保证一个好网络得到跳回。因此,它被建议二个节点不得不计算一把pairwise钥匙的提高的KPS,仅当他们分享至少q普通钥匙。这条途径对节点俘获攻击提高跳回。与解决方案的存在相比,结果证明那条新途径更加提高网络可伸缩性,并且完成好连接和好全面性能。

  • 标签: 分发前计划 symplectic 几何学 WSN
  • 简介:只需优盘教你如何全面快速验本本各种病毒时至今日也可算是百花齐放了,搞得人心惶惶,一旦发现自己的电脑有点异常就认定是病毒在作怪,到处找杀毒软件,一个不行,再来一个,总之似乎不找蓟“元凶”誓不罢休一样,结果病毒软件是用了一个又一个,或许为此人民币是用了一张又一张,还是未见“元凶”的踪影,其实这未必就是病毒在作怪。

  • 标签: 病毒软件 电脑 杀毒软件 人民币 优盘
  • 简介:石英晶体振荡器是高精度和高稳定度的振荡器,是许多精确时钟,及通信类电子产品的核心。在手机电路中它用于稳定时间频率发生器,时间频率发生器为通信系统提供载波和导频信号。它亦为数据处理设备产生时间信号,以及为其它特定的系统提供基准信号。

  • 标签: 手机 时间频率发生器 石英晶体振荡器 工作特性 万用表
  • 简介:各种病毒时至今日也可算是百花齐放了,搞得人心惶惶,一旦发现自己的电脑有点异常就认定是病毒在作怪,到处找杀毒软件,一个不行,再来一个,总之似乎不找到“元凶”誓不罢休一样,结果病毒软件是用了一个又一个,或许为此人民币是用了一张又一张,还是未见“元凶乃的踪影,其实这未必就是病毒在作怪。

  • 标签: 病毒软件 电脑 杀毒软件 人民币