学科分类
/ 2
38 个结果
  • 简介:Thisletterpresentsak-partyRSAkeysharingschemeandtherelatedalgorithmsarepresented.ItisshownthatthesharedkeycanbegeneratedinsuchacollaborativewaythattheRSAmodulusispubliclyknownbutnoneofthepartiesisabletodecrypttheencipheredmessageindividually.

  • 标签: RSA 密钥分享 原始检测 密钥产生
  • 简介:ThisstudyconcernssecurityissuesoftheemergingWirelessBodySensorNetwork(WBSN)formedbybiomedicalsensorswornonorimplantedinthehumanbodyformobilehealthcareappli-cations.Anovelauthenticatedsymmetric-keyestablishmentschemeisproposedforWBSN,whichfullyexploitsthephysiologicalfeaturesobtainedbynetworkentitiesviathebodychannelavailableinWBSNbutnototherwirelessnetworks.Theself-definedIntrinsicSharedSecret(ISS)isusedtoreplacethepre-deploymentofsecretsamongnetworkentities,whichthuseliminatescentralizedservicesorau-thoritiesessentialinexistingprotocols,andresolvesthekeytransportprobleminthepuresymmet-ric-keycryptosystemforWBSNaswell.Thesecuritypropertiesoftheproposedschemearedemon-stratedintermsofitsattackcomplexityandthetypesofattacksitcanresist.Besides,theschemecanbeimplementedunderalight-weightwayinWBSNsystems.DuetotheimportanceoftheISSconcept,theanalysisonusingfalseacceptance/falserejectionmethodtoevaluatetheperformanceofISSforitsusageintheschemeisalsodemonstrated.

  • 标签: 医疗体域传感器网络 安全认证 对称密钥建立 生物医学传感器
  • 简介:Recently,ithasbeenseenthattheensembleclassifierisaneffectivewaytoenhancethepredictionperformance.However,itusuallysuffersfromtheproblemofhowtoconstructanappropriateclassifierbasedonasetofcomplexdata,forexample,thedatawithmanydimensionsorhierarchicalattributes.Thisstudyproposesamethodtoconstructeanensembleclassifierbasedonthekeyattributes.Inadditiontoitshigh-performanceonprecisionsharedbycommonensembleclassifiers,thecalculationresultsarehighlyintelligibleandthuseasyforunderstanding.Furthermore,theexperimentalresultsbasedontherealdatacollectedfromChinaMobileshowthatthekey-attributes-basedensembleclassifierhasthegoodperformanceonbothoftheclassifierconstructionandthecustomerchurnprediction.

  • 标签: CUSTOMER churn data mining ENSEMBLE CLASSIFIER
  • 简介:Histogramofcollineargradient-enhancedcoding(HCGEC),arobustkeypointdescriptorformulti-spectralimagematching,isproposed.TheHCGECmainlyencodesroughstructureswithinanimageandsuppressesdetailedtexturalinformation,whichisdesirableinmulti-spectralimagematching.Experimentsontwomulti-spectraldatasetsdemonstratethattheproposeddescriptorcanyieldsignificantlybetterresultsthansomestate-ofthe-artdescriptors.

  • 标签: 图像匹配 多光谱 纹理信息 直方图 数据集 描述符
  • 简介:在信任计算的一个重要函数是保护的存储,它能保护数据和钥匙的无限的数量。在存在为信任站台的信任站台模块(TPM)钥匙装载计划,有是的TPM的一个计算平台它的信任的锚,装载操作的全部的时间与装载目标目标的祖先的数字一样,导致装载有许多祖先的一把TPM钥匙的低效率。改进效率,装载计划的一把基于身份的TPM钥匙被建议。在这个计划,装载操作的时间当任何TPM钥匙被装进TPM时,仅仅是二。因此,要求的时间花费了因为装载一个TPM关键罐头被减少,特别为复杂TPM关键存储层次。由分析正确性,安全,效率和可行性,建议计划有更好理论并且应用程序价值。

  • 标签: 加载方案 计算平台 TPM 存储层次结构 装载方案 时间成本
  • 简介:Timeefficiencyofkeyestablishmentandupdateisoneofthemajorproblemscontributorykeymanagementsstrivetoaddress.Toachievebettertimeefficiencyinkeyestablishment,weproposeaLocation-basedHuffman(L-Huffman)scheme.First,usersareseparatedintoseveralsmallgroupstominimizecommunicationcostwhentheyaredistributedoverlargenetworks.Second,bothuser'scomputationdifferenceandmessagetransmissiondelayaretakenintoconsiderationwhenHuffmancodingisemployedtoformingtheoptimalkeytree.Third,thecombinedweightsinHuffmantreearelocatedinahigherplaceofthekeytreetoreducethevarianceoftheaveragekeygenerationtimeandminimizethelongestkeygenerationtime.SimulationsdemonstratethatL-HuffmanhasmuchbetterperformanceinwideareanetworksandisalittlebetterinlocalareanetworkthanHuffmanscheme.

  • 标签: 位置感知 霍夫曼 密钥 HUFFMAN编码 HUFFMAN树 时间效率
  • 简介:Thisarticleisfocusedonanalyzingthekeytechnologiesofnewmaliciouscodeandcorrespondingdefensivemeasuresinthelarge-scalecommunicationnetworks.Basedondescriptionoftheconceptsanddevelopmentofthemaliciouscode,thearticleintroducestheanti-analysistechnology,splittingandinsertingtechnology,hidingtechnology,polymorphvirustechnology,andautoproductiontechnologyofthemaliciouscodetrendswithintelligence,diversityandintegration.Followingthat,itsummarizesthesecurityvulnerabilitiesofcommunicationnetworksfromfourrelatedlayersaspects,accordingtothemechanismsofmaliciouscodeinthecommunicationnetworks.Finally,itproposesrapidresponsedispositionofmaliciouscodeattacksfromfourcorrelatedsteps:buildingupthenetworknodemonitoringsystem,suspiciouscodefeatureautomationanalysisandextraction,rapidactivemaliciouscoderesponsetechniqueforunknownmaliciouscode,andmaliciouscodeattackimmunitytechnique.Asaresult,itactivelydefensesagainsttheunknownmaliciouscodeattacksandenhancesthesecurityperformanceofcommunicationnetworks.

  • 标签: 反分析技术 恶意代码 通信网络 防御措施 汽车生产技术 自动化分析
  • 简介:Certificatelessencryptionattractsalotofattentionsofarbyeliminatingthekeyescrowprobleminidentity-basedencryptionandpublickeycertificatesinthetraditionalpublickeycryptography.Byconsideringthethreatfromthekeyexposure,itisdesirabletoincorporatetheideaofkey-insulatedcryptosystemintothecertificatelessencryption.Inthispaper,wehavedesignedanefficientcertificatelesskeyinsulatedencryption(CL-KIE)schemetoachievethisgoal.Byourapproach,thecomputationalperformanceofourschemehasbeenimprovedsignificantlyintermsofreductiononrunningtimeandstorage.WealsogavethesecurityproofofthenewCL-KIEschemeagainstthechosenplaintextattacks(CPAs)intherandomoracle,consideringtheassumptionofthecomputationalDiffie-Hellman(CDH)problem.

  • 标签: CERTIFICATELESS cryptography keyinsulated pairing-free random oracle
  • 简介:Nowadays,thepassword-basedremoteuserauthenticationmechanismusingsmartcardisoneofthesimplestandconvenientauthenticationwaystoensuresecurecommunicationsoverthepublicnetworkenvironments.Recently,Liuetal.proposedanefficientandsecuresmartcardbasedpasswordauthenticationscheme.However,wefindthatLiuetal.’sschemeisvulnerabletotheoff-linepasswordguessingattackanduserimpersonationattack.Furthermore,italsocannotprovideuseranonymity.Inthispaper,wecryptanalyzeLiuetal.’sschemeandproposeasecurityenhanceduserauthenticationschemetoovercometheaforementionedproblems.Especially,inordertopreservetheuseranonymityandpreventtheguessingattack,weusethedynamicidentitytechnique.Theanalysisshowsthattheproposedschemeismoresecureandefficientthanotherrelatedauthenticationschemes.

  • 标签: AUTHENTICATION OFF-LINE PASSWORD guessing ATTACK smart
  • 简介:Withouttheassumptionthattheprivatekeysarekeptsecureperfectly,cryptographicprimitivescannotbedeployedintheinsecureenvironmentswherethekeyleakageisinevitable.Inordertoreducethedamagecausedbythekeyexposureintheidentity-based(ID-based)signaturescenariosefficiently,weproposeanID-basedkey-insulatedsignatureschemeinthispaper,whicheliminatestheexpensivebilinearpairingoperations.Comparedwiththepreviouswork,ourschememinimizesthecomputationcostwithoutanyextracost.Underthediscretelogarithm(DL)assumption,asecurityproofofourschemeintherandomoraclemodelhasalsobeengiven.

  • 标签: 双线性配对 签名方案 密钥 免费 随机预言模型 安全性
  • 简介:随着我国有线电视的发展,各地有线电视台、站的用户也得到了迅速增加.但是有线电视收费难却成为一个比较突出的问题.为保证收视费的及时收缴,在有线电视系统中使用加解扰技术,是一个比较实用的方法.本刊记者就有关加解扰的问题专访了无锡路通电子技术有限公司技术负责人.

  • 标签: 前端射频 群加群解 中国 有线电视 加解扰技术
  • 简介:Intheair-waterquantumkeydistribution(QKD),theirregularseasurfacehassomeinfluenceonthephotonpolariza-tionstate.Thewindisconsideredasthemainfactorcausingtheirregularity,sothemodelofirregularseasurfacebasedonthewindspeedisadopted.Therelationshipsofthequantumbiterrorratewiththewindspeedandtheinitialincidentanglearesimulated.Therefore,themaximumsecuretransmissiondepthofQKDisconfirmed,andthelimita-tionofthewindspeedandtheinitialincidentangleisdetermined.Thesimulationresultsshowthatwhenthewindspeedandtheinitialincidentangleincrease,theperformanceofQKDwillfalldown.Undertheintercept-resendattackcondition,themaximumsafetransmissiondepthofQKDisupto105m.Torealizesafecommunicationsinthesafedivingdepthofsubmarines(100m),theinitialincidentangleisrequestedtobenotexceeding26~,andwiththeinitialincidentan~leincreased,thelimitationofwindspeedisdecreased.

  • 标签: IRREGULAR sea surface quantum key distri-aution
  • 简介:Withparametricdown-conversionsources(PDCSs),thenonorthogonaldecoystateprotocolbasedononevacuumandtwoweakdecoystatesispresented.ThedetectioneventsonBob'ssidearedividedintotwogroupsdependingonwhetherAlicegetsatriggerornot:triggeredcomponentsandnontriggeredcomponents.Thetriggeredcomponentsareusedtoestimatethefractionsanderrorratesofsingle-photonandtwo-photonpulses,andthenthefinalsecurekeyrateisdeduced.Besides,bothtriggeredandnontriggeredcomponentsareusedtodeduceamoreaccuratevalueofthekeygenerationrate.Thesimulationofthefinalkeygenerationrateovertransmissiondistanceshowsthatthefirstmethodcanobtainakeygenerationrateclosetothetheoreticallimitoftheinfinitedecoystateprotocol,whilethesecondmethodisbetter.

  • 标签: 量子密钥分发 参量下转换 非正交 诱骗 真空状态 安全密钥
  • 简介:为了在无线传感器网络(WSN)完成安全通讯,在有有限计算能力的传感器节点随机在敌对领土上被散布的地方,各种各样的关键分发前策划(KPS)被建议了。在这份报纸,新KPS在有限的地上基于symplectic几何学被建议。在一个symplectic空格的固定维的subspace代表一个节点,所有1-dimensionalsubspaces表示钥匙和每个节点分享了钥匙。但是这天真的印射不保证一个好网络得到跳回。因此,它被建议二个节点不得不计算一把pairwise钥匙的提高的KPS,仅当他们分享至少q普通钥匙。这条途径对节点俘获攻击提高跳回。与解决方案的存在相比,结果证明那条新途径更加提高网络可伸缩性,并且完成好连接和好全面性能。

  • 标签: 分发前计划 symplectic 几何学 WSN
  • 简介:中国互联网络信息中心(CNNIC)发布的《第37次中国互联网络发展状况统计报告》显示,截至2015年12月,中国网民规模达6.88亿,全年共计新增网民3951万人。互联网普及率为50.3%,较2014年底提升了2.4个百分点。其中,中国手机网民规模达6.20亿,较2014年底增加6303万人。网民中使用手机上网人群占比由2014年的85.8%提升至90.1%。农村网民占比28.4%,规模达1.95亿,

  • 标签: 中国互联网络信息中心 手机上网 统计报告 网民
  • 简介:通过对Canny算法进行改进,提出了一种基于量子行为的微粒优化算法的边缘提取算法。改进算法对噪声抑制效果明显,能够删除伪边缘,得到精确的边缘。实验结果表明,该算法在保证实时性的同时,具有很好的检测精度和准确度。

  • 标签: 边缘检测 CANNY算子 微粒群优化 图像处理