期刊文献+
共找到4篇文章
< 1 >
每页显示 20 50 100
应用开源OpenNMS实现网络监控和报警
1
作者 谢旖欣 李子川 李飞宇 《计算机系统应用》 2019年第7期72-78,共7页
本文主要介绍湖南省疾控中心利用开源的企业级网络管理平台OpenNMS实现对数据中心的网络设备、服务器、应用实时监控.特别是在经费有限,并且还缺少短信网关、私有邮件服务器的情况下,以最少代价实现及时发现网络瓶颈和故障报警.HP Data ... 本文主要介绍湖南省疾控中心利用开源的企业级网络管理平台OpenNMS实现对数据中心的网络设备、服务器、应用实时监控.特别是在经费有限,并且还缺少短信网关、私有邮件服务器的情况下,以最少代价实现及时发现网络瓶颈和故障报警.HP Data Protector(以下简称DP)是惠普公司提供的一款备份软件,本文同时也介绍了HPDP的报告和报警功能的使用,并且以HPDP报警为例演示OpenNMS邮件报警功能. 展开更多
关键词 开源软件 OpenNMS 网络监控 HP Data Protector(HPDP) 邮件报警
下载PDF
Cryptanalysis of a chaos-based cryptosystem with an embedded adaptive arithmetic coder 被引量:2
2
作者 王兴元 谢旖欣 《Chinese Physics B》 SCIE EI CAS CSCD 2011年第8期97-105,共9页
In this paper, we analyse a new chaos-based cryptosystem with an embedded adaptive arithmetic coder, which was proposed by Li Heng-Jian and Zhang J S (Li H J and Zhang J S 2010 Chin. Phys. B 19 050508). Although thi... In this paper, we analyse a new chaos-based cryptosystem with an embedded adaptive arithmetic coder, which was proposed by Li Heng-Jian and Zhang J S (Li H J and Zhang J S 2010 Chin. Phys. B 19 050508). Although this new method has a better compression performance than its original version, it is found that there are some problems with its security and decryption processes. In this paper, it is shown how to obtain a great deal of plain text from the cipher text without prior knowledge of the secret key. After discussing the security and decryption problems of the Li Heng-Jian et al. algorithm, we propose an improved chaos-based cryptosystem with an embedded adaptive arithmetic coder that is more secure. 展开更多
关键词 CHAOS CRYPTOGRAPHY compression arithmetic coding
下载PDF
Cryptanalysis of an ergodic chaotic encryption algorithm 被引量:1
3
作者 王兴元 谢旖欣 秦学 《Chinese Physics B》 SCIE EI CAS CSCD 2012年第4期159-165,共7页
In this paper, we present the results for the security and the possible attacks on a new symmetric key encryption algorithm based on the ergodicity property of a logistic map. After analysis, we use mathematical induc... In this paper, we present the results for the security and the possible attacks on a new symmetric key encryption algorithm based on the ergodicity property of a logistic map. After analysis, we use mathematical induction to prove that the algorithm can be attacked by a chosen plaintext attack successfully and give an example to show how to attack it. According to the cryptanalysis of the originM Mgorithm, we improve the originM Mgorithm, and make a brief cryptanalysis. Compared with the original algorithm, the improved algorithm is able to resist a chosen plaintext attack and retain a considerable number of advantages of the original algorithm such as eneryption speed, sensitive dependence on the key, strong anti-attack capability, and so on. 展开更多
关键词 CHAOS CRYPTANALYSIS ENCRYPTION block-cipher
下载PDF
Pseudo-Random Sequences Generated by a Class of One-Dimensional Smooth Map
4
作者 王兴元 秦学 谢旖欣 《Chinese Physics Letters》 SCIE CAS CSCD 2011年第8期20-23,共4页
We extend a class of a one-dimensional smooth map.We make sure that for each desired interval of the parameter the map’s Lyapunov exponent is positive.Then we propose a novel parameter perturbation method based on th... We extend a class of a one-dimensional smooth map.We make sure that for each desired interval of the parameter the map’s Lyapunov exponent is positive.Then we propose a novel parameter perturbation method based on the good property of the extended one-dimensional smooth map.We perturb the parameter𝑟in each iteration by the real number xi generated by the iteration.The auto-correlation function and NIST statistical test suite are taken to illustrate the method’s randomness finally.We provide an application of this method in image encryption.Experiments show that the pseudo-random sequences are suitable for this application. 展开更多
关键词 PARAMETER ITERATION method
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部