期刊文献+

时滞相关Logistic函数浮点数据模糊加密稀疏集构造 被引量:1

Sparse Set Structure of Floating-point Data Fuzzy Encryption Based on Delay Dependent Logistic Function
下载PDF
导出
摘要 提出一种基于时滞相关Logistic函数线性调频采样的浮点数据模糊加密算法优化技术,给出时滞相关Logistic函数及相关定义,研究了浮点数据的模糊编码算法,设计实时交互网络的浮点数据模糊加密方案,实现密钥稀疏集构造,采用基于稀疏矩阵的存储格式下的时滞相关Logistic函数浮点数据加密运算,构造密钥稀疏集,优化了算法性能。仿真结果表明,算法数据加密和解密性能较好,具有较高的数据吞吐量,能实现对大数据库的数据加密,提高了密文的不可预测性。 A sample Logistic function linear frequency based on the delay of floating-point data encryption algorithm for fuzzy optimization techniques is proposed, given the delay dependent Logistic function and definition of fuzzy coding algorithm, floating-point data, floating-point data design of real-time interactive network fuzzy encryption scheme is obtained.Realize the key sparse set structure, using encryption delay dependent Logistic function point data storage format based on the sparse matrix, key sparse sets are constructed, the performance of the algorithm is optimized. The simulation results show that, the algorithm of data encryption and decryption performance is good, the data throughput is higher, it can realize the data encryption of database, the cipher text is unpredictable.
作者 李晓靖
出处 《科技通报》 北大核心 2015年第2期98-100,共3页 Bulletin of Science and Technology
关键词 Logistic函数 模糊加密 浮点数据 稀疏集 Logistic function fuzzy encryption floating-point data sparse sets
  • 相关文献

参考文献6

二级参考文献25

  • 1AHN L V, BLUN M, HOPPER N J, et al. CAPTCHA: using hard AI problems for security[C]//Lecture Notes in Computer Science, vol 2656. [S.l.] :Springer-Verlag, 2003:646-653.
  • 2KANDULA S, KATABI D, JACOB M, et al. Botz-4-Sale: surviving organized DDoS attacks that mimic flash crowds[C]//Proc of the 2nd Symposium on Networked Systems Design and Implementation. 2005:287-300.
  • 3RANJAN S, SWAMINATHAN R, UYSAL M, et al. DDoS-resilient scheduling to counter application layer attacks under imperfect detection[C]//Proc of the 25th IEEE International Conference on Computer Communications. Barcelona:IEEE Press, 2006:1-13.
  • 4YATAGAI T, ISOHARA T, SASASE I. Detection of HTTP-GET flood attack based on analysis of page access behaviour[C]//Proc of IEEE Pacific Rim Conference on Communications, Computers and Signal Processing. Victoria: IEEE Press, 2007:232-235.
  • 5WALFISH M, VUTUKURU M, BALAKRISHNAN H, et al. DDoS defense by offense[C]//Proc of Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications. New York:ACM Press, 2006:303-314.
  • 6OIKONOMOU G, MIRKOVIC J. Modeling human behaviour for defense against flash-crowd attacks[C]//Proc of IEEE International Conference on Communications.Dresden: IEEE Press, 2009:1-6.
  • 7TracesavailableintheInternettrafficarchive[EB/OL].http://ita.ee.lbl.gov/html/traces.html.
  • 8Sara Baase Alien Van Gelger,COMPUTERALGORITHMS Introduction to Design and Analysis(Third Edition)[M].高等教育出版社:影印版,2001,7.
  • 9王晓东计算机算法设计与分析[M].北京:电子工业出版社,2001,1.
  • 10Arnold,Gosling,Holmes著,虞万荣等译,Java编程语言[M].北京:中国电力出版社,2003,12.

共引文献34

同被引文献12

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部