期刊文献+
共找到6篇文章
< 1 >
每页显示 20 50 100
High Security Identity Tags Using Spiral Resonators
1
作者 Anju Pradeep S.Mridula P.Mohanan 《Computers, Materials & Continua》 SCIE EI 2016年第6期187-197,共11页
A highly compact chipless tag based on Frequency coding technique using Spiral Resonators is proposed in this paper.Spirals are well known metamaterial structures and thus capable of sharp resonance,and hence Spiral R... A highly compact chipless tag based on Frequency coding technique using Spiral Resonators is proposed in this paper.Spirals are well known metamaterial structures and thus capable of sharp resonance,and hence Spiral Resonators can serve as a good candidate for RF Identity Tags.The bit capacity of the proposed tag is 10 bits per sqcm.The prototype of the tag is fabricated on a low-cost substrate of dielectric constant 4.4 and loss tangent 0.02.The overall dimension of tag is 15.4 x 3 x 1.6mm3.Two methods for reading the tags are also discussed in this paper.Scope for bit enhancement is also provided. 展开更多
关键词 high security tag METAMATERIAL spiral resonator reader antenna
下载PDF
Design of secure operating systems with high security levels 被引量:5
2
作者 QING SiHan1,2 & SHEN ChangXiang3 1 Institute of Software, Chinese Academy of Sciences, Beijing 100080, China 2 School of Software and Microelectronics, Peking University, Beijing 102600, China 3 Institute of Computing Technology, Navy, Beijing 100841, China 《Science in China(Series F)》 2007年第3期399-418,共20页
Numerous Internet security incidents have shown that support from secure operating systems is paramount to fighting threats posed by modern computing environments. Based on the requirements of the relevant national an... Numerous Internet security incidents have shown that support from secure operating systems is paramount to fighting threats posed by modern computing environments. Based on the requirements of the relevant national and international standards and criteria, in combination with our experience in the design and development of the ANSHENG v4.0 secure operating system with high security level (hereafter simply referred to as ANSHENG OS), this paper addresses the following key issues in the design of secure operating systems with high security levels: security architecture, security policy models, and covert channel analysis. The design principles of security architecture and three basic security models: confidentiality, integrity, and privilege control models are discussed, respectively. Three novel security models and new security architecture are proposed. The prominent features of these proposals, as well as their applications to the ANSHENG OS, are elaborated. Cover channel analysis (CCA) is a well-known hard problem in the design of secure operating systems with high security levels since to date it lacks a sound theoretical basis and systematic analysis approach. In order to resolve the fundamental difficulties of CCA, we have set up a sound theoretical basis for completeness of covert channel identification and have proposed a unified framework for covert channel identification and an efficient backward tracking search method. The successful application of our new proposals to the ANSHENG OS has shown that it can help ease and speedup the entire CCA process. 展开更多
关键词 secure operating systems with high security levels ARCHITECTURE security model covert channel analysis
原文传递
A hybrid biometric identification framework for high security applications 被引量:1
3
作者 Xuzhou LI Yilong YIN +2 位作者 Yanbin NING Gongping YANG Lei PAN 《Frontiers of Computer Science》 SCIE EI CSCD 2015年第3期392-401,共10页
Research on biometrics for high security applica- tions has not attracted as much attention as civilian or foren- sic applications. Limited research and deficient analysis so far has led to a lack of general solutions... Research on biometrics for high security applica- tions has not attracted as much attention as civilian or foren- sic applications. Limited research and deficient analysis so far has led to a lack of general solutions and leaves this as a challenging issue. This work provides a systematic analy- sis and identification of the problems to be solved in order to meet the performance requirements for high security applica- tions, a double low problem. A hybrid ensemble framework is proposed to solve this problem. Setting an adequately high threshold for each matcher can guarantee a zero false accep- tance rate (FAR) and then use the hybrid ensemble framework makes the false reject rate (FRR) as low as possible. Three ex- periments are performed to verify the effectiveness and gener- alization of the framework. First, two fingerprint verification algorithms are fused. In this test only 10.55% of fingerprints are falsely rejected with zero false acceptance rate, this is sig- nificantly lower than other state of the art methods. Second, in face verification, the framework also results in a large re- duction in incorrect classification. Finally, assessing the per- formance of the framework on a combination of face and gait verification using a heterogeneous database show this frame- work can achieve both 0% false rejection and 0% false accep- tance simultaneously. 展开更多
关键词 biometric verification hybrid ensemble frame-work high security applications
原文传递
New capacity steadily commissioned, security management highly strengthened
4
《Electricity》 1998年第3期5-5,共1页
关键词 New capacity steadily commissioned security management highly strengthened
下载PDF
Secured Data Transmission Using Modified LEHS Algorithm in Wireless Sensor Network
5
作者 C. Bennila Thangammal D. Praveena P. Rangarajan 《Circuits and Systems》 2016年第8期1190-1198,共9页
In the ancient block Hill cipher, the cipher text is obtained by multiplying the blocks of the plain text with the key matrix. To strengthen the keymatrix, a double guard Hill cipher was proposed with two key matrices... In the ancient block Hill cipher, the cipher text is obtained by multiplying the blocks of the plain text with the key matrix. To strengthen the keymatrix, a double guard Hill cipher was proposed with two key matrices, a private key matrix and its modified key matrix along with permutation. In the ancient block Hill cipher, the cipher text is obtained by multiplying the blocks of the plain text with the key matrix. To strengthen the key matrix, a double guard Hill cipher was proposed with two key matrices, a private key matrix and its modified key matrix along with permutation. In this paper a novel modification is performed to the double guard Hill cipher in order to reduce the number of calculation to obtain the cipher text by using non-square matrices. This modified double guard Hill cipher uses a non-square matrix of order (p × q) as its private keymatrix. 展开更多
关键词 ENCRYPTION DECRYPTION Non-Square Matrices Low Energy high Secured Data Transmission
下载PDF
Single-Cycle Bit Permutations with MOMR Execution
6
作者 李佩露 杨骁 史志杰 《Journal of Computer Science & Technology》 SCIE EI CSCD 2005年第5期577-585,共9页
Secure computing paradigms impose new architectural challenges for general-purpose processors. Cryptographic processing is needed for secure communications, storage, and computations. We identify two categories of ope... Secure computing paradigms impose new architectural challenges for general-purpose processors. Cryptographic processing is needed for secure communications, storage, and computations. We identify two categories of operations in symmetric-key and public-key cryptographic algorithms that are not common in previous general-purpose workloads: advanced bit operations within a word and multi-word operations. We define MOMR (Multiple Operands Multiple Results) execution or datarich execution as a unified solution to both challenges. It allows arbitrary n-bit permutations to be achieved in one or two cycles, rather than O(n) cycles as in existing RISC processors. It also enables significant acceleration of multiword multiplications needed by public-key ciphers. We propose two implementations of MOMR: one employs only hardware changes while the other uses Instruction Set Architecture (ISA) support. We show that MOMR execution leverages available resources in typical multi-issue processors with minimal additional cost. Multi-issue processors enhanced with MOMR units provide additional speedup over standard multi-issue processors with the same datapath. MOMR is a general architectural solution for word-oriented processor architectures to incorporate datarich operations. 展开更多
关键词 PERMUTATION bit permutations CRYPTOGRAPHY cryptographic acceleration security multi-word operation datarich execution MOMR instruction set architecture ISA PROCESSOR high performance secure computing
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部