期刊文献+
共找到4篇文章
< 1 >
每页显示 20 50 100
Enhanced Delegation Based Authentication Protocol for Secure Roaming Service with Synchronization
1
作者 Hsing-Bai Chen Yung-Hsiang Lai +1 位作者 Kuei-Wan Chen Wei-Bin Lee 《Journal of Electronic Science and Technology》 CAS 2011年第4期345-351,共7页
Portable communication systems can provide mobile users with global roaming services. Recently, Youn and Lim proposed a delegation-based authentication protocol which achieves unlinkability for secure roaming services... Portable communication systems can provide mobile users with global roaming services. Recently, Youn and Lim proposed a delegation-based authentication protocol which achieves unlinkability for secure roaming services. This paper indicates that there are two drawbacks in Youn and Lim's protocol: 1) the synchronization problem will lead to a fail in on-line authentication; and 2) the exhaustive search puts a heavy burden on the off-line authentication process. Moreover, based on Youn and Lim's protocol, a remedy is proposed to address these problems. It is worthwhile to note that the proposed remedy not only keeps the original advantages but also enhances the security and performance. 展开更多
关键词 AUTHENTICATION DELEGATION portal communication systems SYNCHRONIZATION unlinkability.
下载PDF
基于符号执行的Unlink攻击检测方法 被引量:4
2
作者 黄宁 黄曙光 梁智超 《华南理工大学学报(自然科学版)》 EI CAS CSCD 北大核心 2018年第8期81-87,共7页
Unlink攻击是一种Linux平台下面向堆溢出漏洞的攻击方式.已有的缓冲区溢出漏洞攻击检测技术通过检查程序控制流状态来确定程序漏洞触发点,并生成测试用例.但由于堆溢出数据很少直接导致程序控制流劫持以及相关保护机制的限制,已有的检... Unlink攻击是一种Linux平台下面向堆溢出漏洞的攻击方式.已有的缓冲区溢出漏洞攻击检测技术通过检查程序控制流状态来确定程序漏洞触发点,并生成测试用例.但由于堆溢出数据很少直接导致程序控制流劫持以及相关保护机制的限制,已有的检测技术很难判断程序是否满足堆溢出攻击条件.为了提高程序的安全性,实现对Unlink攻击的检测,文中通过对已有Unlink攻击实例的分析,总结了Unlink攻击特征,建立了Unlink攻击检测模型,并根据该模型提出了Unlink攻击检测方法.该方法使用污点分析实现了对程序输入数据以及敏感操作的监控;使用符号执行技术构建程序污点变量传播的路径约束以及触发Unlink攻击的数据约束;通过对上述约束的求解,判断程序堆溢出漏洞是否满足Unlink攻击触发条件,并生成测试用例.实验结果表明,该方法能有效地实现针对Unlink攻击的检测. 展开更多
关键词 堆溢出漏洞 缓冲区溢出 Unlink攻击 符号执行 污点分析
下载PDF
A lightweight and efficient raw data collection scheme for IoT systems
3
作者 Yixuan Huang Yining Liu +1 位作者 Jingcheng Song Weizhi Meng 《Journal of Information and Intelligence》 2024年第3期209-223,共15页
With the prevalence of Internet of Things(loT)devices,data collection has the potential to improve people's lives and create a significant value.However,it also exposes sensitive information,which leads to privacy... With the prevalence of Internet of Things(loT)devices,data collection has the potential to improve people's lives and create a significant value.However,it also exposes sensitive information,which leads to privacy risks.An approach called N-source anonymity has been used for privacy preservation in raw data collection,but most of the existing schemes do not have a balanced efficiency and robustness.In this work,a lightweight and efficient raw data collection scheme is proposed.The proposed scheme can not only collect data from the original users but also protect their privacy.Besides,the proposed scheme can resist user poisoning attacks,and the use of the reward method can motivate users to actively provide data.Analysis and simulation indicate that the proposed scheme is safe against poison attacks.Additionally,the proposed scheme has better performance in terms of computation and communication overhead compared to existing methods.High efficiency and appropriate incentive mechanisms indicate that the scheme is practical for IoT systems. 展开更多
关键词 Data privacy Raw data collection loT systems unlinkability
原文传递
Mather Sets for Superlinear Dulling Equations 被引量:5
4
作者 裴明亮 《Science China Mathematics》 SCIE 1993年第5期524-537,共14页
In this paper, we apply Aubry-Mather theory developed in recent years about monotone twist mappings to the study of the superlinear Duffing equation+g(x)=p(t), (0)where p(t)∈C^0(R) is periodic with period 1 and g(x) ... In this paper, we apply Aubry-Mather theory developed in recent years about monotone twist mappings to the study of the superlinear Duffing equation+g(x)=p(t), (0)where p(t)∈C^0(R) is periodic with period 1 and g(x) satisfies the superlinearity condition Consequently, this gives descriptions of the global dynamical behavior, particularly periodic solutions and quasi-periodic solutions of a wide class of Eq. (0), not requiring high order smoothness assumption. 展开更多
关键词 DUFFING equation Aubry-Mather theory Mather set unlinked PERIODIC SOLUTIONS QUASI-PERIODIC solutions.
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部