期刊文献+

生成与查询螺旋矩阵的在线算法研究

Research on online algorithm for generating and querying spiral matrix
下载PDF
导出
摘要 螺旋矩阵是一种特殊的二维矩阵,因其自身规律性可应用于加密等算法中。文章从螺旋矩阵的概念开始,介绍并分析传统离线算法与其在性能上的不足;其次,提出并推导一种适用于生成与查询操作的在线算法;最后,通过实验对比,展示在线算法较传统离线算法在性能上的优势。以此丰富在线算法的理论内容,对相关研究者有所帮助。 Spiral matrix is a special two-dimensional matrix, which can be applied to encryption and other algorithms because of its own regularity. Starting with the concept of spiral matrix, we introduce and analyze the performance shortcomings of the traditional offline algorithm, and then propose and derive an online algorithm suitable for generation and query operation. Finally, the performance advantages of online algorithm compared with traditional offline algorithm are shown. It is hoped to enrich the theoretical content of the online algorithm and be helpful to relevant researchers.
作者 彭海洋 Peng Haiyang(Henan Institute of Animal Husbandry and Economics,Zhengzhou 475000,China)
出处 《无线互联科技》 2022年第15期143-146,共4页 Wireless Internet Technology
关键词 螺旋矩阵 在线算法 算法优化 helical matrix online algorithm algorithm optimization
  • 相关文献

参考文献2

二级参考文献15

  • 1廖振松,金海,李赤松,邹德清.自动信任协商及其发展趋势[J].软件学报,2006,17(9):1933-1948. 被引量:52
  • 2潘大志,张世禄.螺旋矩阵算法设计与实现[J].电脑开发与应用,2007,20(6):40-41. 被引量:1
  • 3严蔚敏;吴伟民.数据结构:C语言版[M]北京:清华大学出版社,2007.
  • 4CORMENTH;殷建平.算法导论[M]北京:机械工业出版社,2013.
  • 5WINSBOROUGH W H, SEAMONS K E, JONES V E. Automated trust negotiation [C]// DISCEX'00: Proceedings of the 2000 DARPA Information Survivability Conference and Exposition. Piscataway: IEEE, 2000: 88-102.
  • 6YU T, WINSLETT M. A unified scheme for resource protection in automated trust negotiation [C]// Proceedings of the 2003 IEEE Symposium on Security and Privacy. Piscataway: IEEE, 2003: 110-122.
  • 7SEAMONS K E, WINSLETT M, YU T. Limiting the disclosure of access control policies during automated trust negotiation [C]// Proceedings of the 2001 Network and Distributed System Security Symposium. Berkeley: USENIX Association, 2001: 25-32.
  • 8SEAMONS K E, WINSLETT M, YU T, et al. Protecting privacy during on-line trust negotiation [C]// Proceedings of the Second International Workshop on Privacy Enhancing Technologies, LNCS 2482. Berlin: Springer, 2003: 129-143.
  • 9IRWIN K, YU T. Preventing attribute information leakage in automated trust negotiation [C]// Proceedings of the 12th ACM Conference on Computer and Communications Security. New York: ACM, 2002: 36-45.
  • 10LIU B, LU H. An ontology-based trust negotiation framework in advanced communications and computing environments [J]. Journal of Internet Technology, 2009, 10(5): 559-564.

共引文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部