期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
交通建设企业网络安全综合防护平台建设与应用 被引量:1
1
作者 查雅行 舒方法 冯森 《信息安全与通信保密》 2023年第11期84-91,共8页
为支撑交通建设企业深度数字化转型升级,落实国资安全监管“横向到边、纵向到底”的战略部署要求,围绕企业集团总部、二级单位及所属工业企业的网络安全建设需求,探索建设企业网络安全综合防护平台,形成覆盖集团总部、二级单位、工业企... 为支撑交通建设企业深度数字化转型升级,落实国资安全监管“横向到边、纵向到底”的战略部署要求,围绕企业集团总部、二级单位及所属工业企业的网络安全建设需求,探索建设企业网络安全综合防护平台,形成覆盖集团总部、二级单位、工业企业等多层级纵深防御堡垒,实现企业网络安全事件的实时监测、预警、通报、分析和处置闭环管控,提升网络安全风险感知能力,保障公司数字化转型发展。 展开更多
关键词 数字化转型 网络安全 态势感知 协同联动 纵深防御
下载PDF
Proof of retrievability based on LDPC codes
2
作者 Bian Jianchao Liu Huixia +2 位作者 Luo Shoushan zha yaxing Li Wei 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2015年第4期17-25,50,共10页
In order to reduce the computational overhead of proof of retrievability(POR) scheme, a new POR scheme based on low-density parity-check(LDPC) codes is proposed, noted as LDPC-POR. In the model of PORs scheme, the... In order to reduce the computational overhead of proof of retrievability(POR) scheme, a new POR scheme based on low-density parity-check(LDPC) codes is proposed, noted as LDPC-POR. In the model of PORs scheme, the client preprocesses the data and sends it to an untrusted server for storage, only keeping some metadata. Then, the client sends a challenge to the server to prove that the data stored at the server has neither been tampered nor deleted. In the setup phase of this scheme, the client uses LDPC code to encode the data, and blinds data with permutation and pseudo-random stream. In the challenge phase, the server generates the proof completely based on exclusive OR(XOR), after that the client makes use of the LDPC code to prove the validity of proof. The theoretical analysis shows that this scheme not only reduces the computational overhead, but also saves storage space compared with the classical scheme. In the meantime security proof is also provided in this paper showing that this scheme is feasible. 展开更多
关键词 POR LDPC PDP cloud storage
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部