期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
Design and Implementation of USB Key System Based on Dual-Factor Identity Authentication Protocol
1
作者 Jianxin Wang Zifan Xu +2 位作者 Xiangze Chang chaoen xiao Lei Zhang 《Journal of Electronic Research and Application》 2024年第5期161-167,共7页
With the increasing demand for information security,traditional single-factor authentication technology can no longer meet security requirements.To this end,this paper proposes a Universal Serial Bus(USB)Key hardware ... With the increasing demand for information security,traditional single-factor authentication technology can no longer meet security requirements.To this end,this paper proposes a Universal Serial Bus(USB)Key hardware and software system based on a two-factor authentication protocol,aiming to improve the security and reliability of authentication.This paper first analyzes the current status and technical principles of USB Key-related research domestically and internationally and designs a two-factor authentication protocol that combines impact/response authentication and static password authentication.The system consists of a host computer and a USB Key device.The host computer interacts with the USB Key through a graphical user interface.The Secure Hash Algorithm 1(SHA-1)and MySQL database are used to implement the authentication function.Experimental results show that the designed two-factor authentication protocol can effectively prevent replay attacks and information tampering,and improve the security of authentication.If the corresponding USB Key is not inserted,the system will prompt that the device is not found.Once the USB Key is inserted,user identity is confirmed through two-factor verification,which includes impact/response authentication and static password authentication. 展开更多
关键词 Information security USB Key Impact/response authentication Static password authentication
下载PDF
ChatGPT:The New Trend of Smart Education
2
作者 Jianxin Wang Hongke Xu +4 位作者 Yuzheng Zheng chaoen xiao Lei Zhang Hanlin Chen Xin Chen 《Journal of Contemporary Educational Research》 2023年第12期35-46,共12页
In response to the limitations of the traditional education and teaching model,this article proposes a smart education model based on ChatGPT.The model actively breaks the constraint of time and space and the design p... In response to the limitations of the traditional education and teaching model,this article proposes a smart education model based on ChatGPT.The model actively breaks the constraint of time and space and the design patterns of traditional education,providing smart education services including personalized learning,smart tutoring and evaluation,educational content creation support,and education big data analysis.Through constructing an open and inclusive learning space and creating flexible and diverse educational models,ChatGPT can help to meet students’individuality and overall development,as well as assist teachers in keeping up with the students’learning performance and developmental requirements in real-time.This provides an important basis for optimizing teaching content,offering personalized and accurate cultivation,and planning the development path of students. 展开更多
关键词 ChatGPT Smart education Personalized learning Education big data analysis
下载PDF
A Hardware Trojan Detection Method Based on the Electromagnetic Leakage 被引量:1
3
作者 Lei Zhang Youheng Dong +2 位作者 Jianxin Wang chaoen xiao Ding Ding 《China Communications》 SCIE CSCD 2019年第12期100-110,共11页
Hardware Trojan(HT) refers to a special module intentionally implanted into a chip or an electronic system. The module can be exploited by the attacker to achieve destructive functions. Unfortunately the HT is difficu... Hardware Trojan(HT) refers to a special module intentionally implanted into a chip or an electronic system. The module can be exploited by the attacker to achieve destructive functions. Unfortunately the HT is difficult to detecte due to its minimal resource occupation. In order to achieve an accurate detection with high efficiency, a HT detection method based on the electromagnetic leakage of the chip is proposed in this paper. At first, the dimensionality reduction and the feature extraction of the electromagnetic leakage signals in each group(template chip, Trojan-free chip and target chip) were realized by principal component analysis(PCA). Then, the Mahalanobis distances between the template group and the other groups were calculated. Finally, the differences between the Mahalanobis distances and the threshold were compared to determine whether the HT had been implanted into the target chip. In addition, the concept of the HT Detection Quality(HTDQ) was proposed to analyze and compare the performance of different detection methods. Our experiment results indicate that the accuracy of this detection method is 91.93%, and the time consumption is 0.042s in average, which shows a high HTDQ compared with three other methods. 展开更多
关键词 hardware trojan detection side channel analysis electromagnetic leakage principal component analysis Mahalanobis distance detection quality
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部