期刊文献+
共找到19,953篇文章
< 1 2 250 >
每页显示 20 50 100
Covalent Bond Based Android Malware Detection Using Permission and System Call Pairs
1
作者 Rahul Gupta Kapil Sharma R.K.Garg 《Computers, Materials & Continua》 SCIE EI 2024年第3期4283-4301,共19页
The prevalence of smartphones is deeply embedded in modern society,impacting various aspects of our lives.Their versatility and functionalities have fundamentally changed how we communicate,work,seek entertainment,and... The prevalence of smartphones is deeply embedded in modern society,impacting various aspects of our lives.Their versatility and functionalities have fundamentally changed how we communicate,work,seek entertainment,and access information.Among the many smartphones available,those operating on the Android platform dominate,being the most widely used type.This widespread adoption of the Android OS has significantly contributed to increased malware attacks targeting the Android ecosystem in recent years.Therefore,there is an urgent need to develop new methods for detecting Android malware.The literature contains numerous works related to Android malware detection.As far as our understanding extends,we are the first ones to identify dangerous combinations of permissions and system calls to uncover malicious behavior in Android applications.We introduce a novel methodology that pairs permissions and system calls to distinguish between benign and malicious samples.This approach combines the advantages of static and dynamic analysis,offering a more comprehensive understanding of an application’s behavior.We establish covalent bonds between permissions and system calls to assess their combined impact.We introduce a novel technique to determine these pairs’Covalent Bond Strength Score.Each pair is assigned two scores,one for malicious behavior and another for benign behavior.These scores serve as the basis for classifying applications as benign or malicious.By correlating permissions with system calls,the study enables a detailed examination of how an app utilizes its requested permissions,aiding in differentiating legitimate and potentially harmful actions.This comprehensive analysis provides a robust framework for Android malware detection,marking a significant contribution to the field.The results of our experiments demonstrate a remarkable overall accuracy of 97.5%,surpassing various state-of-the-art detection techniques proposed in the current literature. 展开更多
关键词 ANDROID MALWARE android security hybrid analysis permission and system call pairs
下载PDF
The Role of Certificates and Labels for Cocoa in the Face of Climate Change: A Scientific Review
2
作者 Charles Hans Opoku 《American Journal of Climate Change》 2024年第2期281-313,共33页
Climate change threatens cocoa quality, raising concerns regarding sustainable premium cocoa production. Evaluating the effectiveness of certification standards is imperative to address this concern effectively. A mul... Climate change threatens cocoa quality, raising concerns regarding sustainable premium cocoa production. Evaluating the effectiveness of certification standards is imperative to address this concern effectively. A multi-stage method was employed for a systematic review of 39 peer-reviewed articles to highlight the impacts of climate change on the biophysical environment of cocoa and its implications for adapting Geographical Indications (GIs). Additionally, a comprehensive review was conducted on climate-relevant standards of certificates in Ecuador, Indonesia, and Ghana. The findings of this study provide practical insights into possible difficulties that cocoa-producing countries may encounter in maintaining the distinctive flavours and quality trademarks of cocoa in the face of changing climate. Moreover, the findings emphasize the need for producer countries to prioritize viable adaptation and product differentiation strategies that meet sustainable marketing standards to protect GIs or place-based intellectual property. Furthermore, the findings indicate certificates require effective multi-level climate change management and environmental-social-governance principles that promote scientifically proven mitigation strategies, such as increasing soil organic carbon, zero deforestation, and reducing emissions while striving to leverage local adaptation policies to reduce location-specific vulnerability. Finally, certificates can accelerate the expansion, intensification, and redistribution of sustainable production for gains that outweigh the inconveniences caused by climate change. 展开更多
关键词 ADAPTATION Biophysical Environment Climate Change Cocoa certificates Environmental Social Governance MITIGATION Geographical Indications
下载PDF
Discussion on the Integration of“Post,Course,Competition,Certificate”:Taking the Internet of Things Application Technology Courses in Higher Vocational Colleges as an Example
3
作者 Dongmei He 《Journal of Contemporary Educational Research》 2024年第9期25-31,共7页
This article explores the development of the Internet of Things(IoT)application technology course in higher vocational colleges under the background of“post,course,competition,certificate.”It first emphasizes the im... This article explores the development of the Internet of Things(IoT)application technology course in higher vocational colleges under the background of“post,course,competition,certificate.”It first emphasizes the importance of IoT talent training and course construction in higher vocational colleges and deeply analyzes the core concept of“post,course,competition,certificate”integration.In view of the problems faced in the course construction of IoT application technology in higher vocational colleges and the practical experience of Tianjin Vocational College of Mechanics and Electricity,the implementation strategy of the course construction of IoT application technology in higher vocational colleges is elaborated in detail based on the integrated concept of“post,course,competition,certificate.” 展开更多
关键词 Post course competition certificate Course construction Integration of industry and education
下载PDF
The Model of“Post,Course,Competition,Certificate”Integrated Education for Electronic Information Engineering Technology Major in Higher Vocational Colleges
4
作者 Qinqin Jing Yun Liu Xinyu Zheng 《Journal of Contemporary Educational Research》 2024年第5期223-229,共7页
The core education function of higher vocational colleges is to train technical talents with high quality,so as to meet the needs of talents in the development stage of our society.Under the guidance of talent trainin... The core education function of higher vocational colleges is to train technical talents with high quality,so as to meet the needs of talents in the development stage of our society.Under the guidance of talent training,higher vocational colleges need to pay attention to establishing an all-round and three-dimensional education model,and promote innovation of higher vocational education on the basis of this.It is also a way to promote the innovation of higher vocational education to vigorously promote the construction of“post,course,competition,certificate”mode in the construction of education mode.Through the construction of“post,course,competition,certificate”mode,the education mode of higher vocational colleges is gradually improved,so as to strengthen the effectiveness of talent training in higher vocational colleges.Therefore,in this paper,the author puts forward some suggestions to promote the construction of the integrated education mode of the electronic information engineering technology major in higher vocational colleges,so as to help improve the talent training level of higher vocational colleges. 展开更多
关键词 Higher vocational education Electronic information engineering technology major “Post course competition certificate Integrated education model
下载PDF
Evolutionary game-based optimization of green certificate-carbon emission right-electricity joint market for thermal-wind-photovoltaic power system 被引量:2
5
作者 Ran Wang Yanhe Li Bingtuan Gao 《Global Energy Interconnection》 EI CAS CSCD 2023年第1期92-102,共11页
With the increasing proportion of renewable energy in the power market,the demands on government financial subsidies are gradually increasing.Thus,a joint green certificate-carbon emission right-electricity multi-mark... With the increasing proportion of renewable energy in the power market,the demands on government financial subsidies are gradually increasing.Thus,a joint green certificate-carbon emission right-electricity multi-market trading process is proposed to study the market-based strategy for renewable energy.Considering the commodity characteristics of green certificates and carbon emission rights,the dynamic cost models of green certificates and carbon rights are constructed based on the Rubinstein game and ladder pricing models.Furthermore,considering the irrational bidding behavior of energy suppliers in the actual electricity market,an evolutionary game based multi-market bidding optimization model is presented.Subsequently,it is solved using a composite differential evolutionary algorithm.Finally,the case study results reveal that the proposed model can increase profits and the consumption rate of renewable energy and reduce carbon emission. 展开更多
关键词 Electricity market Carbon emission right Green certificate Evolutionary game
下载PDF
Connotation and Construction of "1+X" Certificate System in Higher Vocational Colleges : Taking Hetian Vocational and Technical College as an Example 被引量:1
6
作者 Tuerhong AIZEMAITI Huiqin LIU +2 位作者 Hao LIU Mingming WANG Lanke HUANG 《Asian Agricultural Research》 2023年第9期56-59,共4页
This paper emphatically sums up the problems existing in the implementation of"1+X"certificate system by taking horticulture major in higher vocational colleges as an example.From the point of view of the im... This paper emphatically sums up the problems existing in the implementation of"1+X"certificate system by taking horticulture major in higher vocational colleges as an example.From the point of view of the improvement of"1+X"certificate system,the reform of talent training program,the improvement of teachers ability and summing up experience,this paper puts forward the updated working mode and ideas to provide strategies for accelerating the development of vocational education in southern Xinjiang. 展开更多
关键词 "1+X"certificate system Pilot situation Problems Strategies
下载PDF
Blockchain-Based Certificate Authentication System with Enabling Correction
7
作者 Md. Mijanur Rahman Md. Tanzinul Kabir Tonmoy +1 位作者 Saifur Rahman Shihab Riya Farhana 《Journal of Computer and Communications》 2023年第3期73-82,共10页
Blockchain has proven to be an emerging technology in the digital world, changing the way everyone thinks about data security and bringing efficiency to several industries. It has already been applied to a wide range ... Blockchain has proven to be an emerging technology in the digital world, changing the way everyone thinks about data security and bringing efficiency to several industries. It has already been applied to a wide range of applications, from financial services and supply chain management to voting systems and identity verification. An organization must verify its candidates before selecting them. Choosing an unqualified candidate can ruin an organization’s reputation. In this paper, a blockchain-based academic certificate authentication system will be used to ensure authenticity and make the assertion of the decentralized system secure. However, the system will generate, authenticate and make corrections on academic certificates. Ultimately, some blockchain-based authentication systems already exist, they can’t correct any errors that occur during generation. A blockchain-based certificate authentication system was built using blockchain technology. Where admin could generate, authenticate and correct the certificate if necessary. The admin can also check how many times a certificate has been modified. Other users can only check the authenticity of the certificates. We’re using two blockchains to enable corrections. Blockchain technology can successfully implement a certificate authentication system. This system will eliminate doubts about the authenticity of certificates, provide fast responses, and ensure reliable and secure storage. The proposed system will help in many ways, such as providing a user-friendly university admission, and smooth job hiring process, etc. In conclusion, our proposed system can permanently eradicate certificate forgeries and create and promote trust in society. 展开更多
关键词 Blockchain certificate Authentication certificate Correction Secure certification Eliminate Forging
下载PDF
A cooperative model of photovoltaic and electricity-to-hydrogen including green certificate trading under the conditional value at risk
8
作者 Haobo Rong Honghai Kuang 《Global Energy Interconnection》 EI CSCD 2023年第4期403-417,共15页
Cooperation in energy systems is no longer limited to the distribution of electricity,and more attention is paid to the trading of green certificates(GCs).This paper proposed a cooperative method for photovoltaic(PV)a... Cooperation in energy systems is no longer limited to the distribution of electricity,and more attention is paid to the trading of green certificates(GCs).This paper proposed a cooperative method for photovoltaic(PV)and electric-to-hydrogen(EH)trading,including GC trading under risk management.First,a novel PV and EH model is established and the cooperation mechanism is analyzed.Meanwhile,PV and EH models were risk-controlled using the conditional value at risk to reduce the impact of the uncertainty of PV electricity and EH loads.Then,the PV-EH cooperative model was established based on cooperative game theory;this was then divided into two subproblems of“cooperative benefit maximization”and“transaction payment negotiation,”and the above two subproblems were solved distributively by alternating direction multiplier method(ADMM).Only energy transactions and price negotiations were conducted between the PV and EH,which can protect the privacy and confidentiality of each entity.Finally,the effectiveness of the cooperation model was verified using a practical engineering case.The simulation results show that the cooperation of the PV-EH can significantly improve the operational efficiency of each entity and the overall efficiency of the cooperation and realize the efficient redistribution of electricity and GC. 展开更多
关键词 Green certificates Electric-to-hydrogen Cooperative method Decentralized optimization Renewable energy-absorbing task
下载PDF
Certrust:An SDN-Based Framework for the Trust of Certificates against Crossfire Attacks in IoT Scenarios
9
作者 Lei Yan Maode Ma +3 位作者 Dandan Li Xiaohong Huang Yan Ma Kun Xie 《Computer Modeling in Engineering & Sciences》 SCIE EI 2023年第3期2137-2162,共26页
The low-intensity attack flows used by Crossfire attacks are hard to distinguish from legitimate flows.Traditional methods to identify the malicious flows in Crossfire attacks are rerouting,which is based on statistic... The low-intensity attack flows used by Crossfire attacks are hard to distinguish from legitimate flows.Traditional methods to identify the malicious flows in Crossfire attacks are rerouting,which is based on statistics.In these existing mechanisms,the identification of malicious flows depends on the IP address.However,the IP address is easy to be changed by attacks.Comparedwith the IP address,the certificate ismore challenging to be tampered with or forged.Moreover,the traffic trend in the network is towards encryption.The certificates are popularly utilized by IoT devices for authentication in encryption protocols.DTLShps proposed a new way to verify certificates for resource-constrained IoT devices by using the SDN controller.Based on DTLShps,the SDN controller can collect statistics on certificates.In this paper,we proposeCertrust,a framework based on the trust of certificates,tomitigate the Crossfire attack by using SDN for IoT.Our goal is threefold.First,the trust model is built based on the Bayesian trust system with the statistics on the participation of certificates in each Crossfire attack.Moreover,the forgetting curve is utilized instead of the traditional decay method in the Bayesian trust system for achieving a moderate decay rate.Second,for detecting the Crossfire attack accurately,a method based on graph connectivity is proposed.Third,several trust-based routing principles are proposed tomitigate the Crossfire attack.These principles can also encourage users to use certificates in communication.The performance evaluation shows that Certrust is more effective in mitigating the Crossfire attack than the traditional rerouting schemes.Moreover,our trust model has a more appropriate decay rate than the traditional methods. 展开更多
关键词 Trust model certificate SDN Crossfire attack bayesian trust system forgetting curve IOT
下载PDF
Deletion and Recovery Scheme of Electronic Health Records Based onMedical Certificate Blockchain
10
作者 Baowei Wang Neng Wang +2 位作者 Yuxiao Zhang Zenghui Xu Junhao Zhang 《Computers, Materials & Continua》 SCIE EI 2023年第7期849-859,共11页
The trusted sharing of Electronic Health Records(EHRs)can realize the efficient use of medical data resources.Generally speaking,EHRs are widely used in blockchain-based medical data platforms.EHRs are valuable privat... The trusted sharing of Electronic Health Records(EHRs)can realize the efficient use of medical data resources.Generally speaking,EHRs are widely used in blockchain-based medical data platforms.EHRs are valuable private assets of patients,and the ownership belongs to patients.While recent research has shown that patients can freely and effectively delete the EHRs stored in hospitals,it does not address the challenge of record sharing when patients revisit doctors.In order to solve this problem,this paper proposes a deletion and recovery scheme of EHRs based on Medical Certificate Blockchain.This paper uses cross-chain technology to connect the Medical Certificate Blockchain and the Hospital Blockchain to real-ize the recovery of deleted EHRs.At the same time,this paper uses the Medical Certificate Blockchain and the InterPlanetary File System(IPFS)to store Personal Health Records,which are generated by patients visiting different medical institutions.In addition,this paper also combines digital watermarking technology to ensure the authenticity of the restored electronic medical records.Under the combined effect of blockchain technology and digital watermarking,our proposal will not be affected by any other rights throughout the process.System analysis and security analysis illustrate the completeness and feasibility of the scheme. 展开更多
关键词 Electronic health records cross-chain medical certificate blockchain data deletion and recovery
下载PDF
Does Green Food Certification promote agri-food export quality?Evidence from China
11
作者 Ping Wei Hongman Liu +1 位作者 Chaokai Xu Shibin Wen 《Journal of Integrative Agriculture》 SCIE CAS CSCD 2024年第3期1061-1074,共14页
The construction of a food certification system plays a vital role in upgrading export quality, which previous studies have largely overlooked. We match China's industry-level data of Green Food Certification with... The construction of a food certification system plays a vital role in upgrading export quality, which previous studies have largely overlooked. We match China's industry-level data of Green Food Certification with its HS6-digit export data of agri-food products to quantify the impact of Green Food Certification on export quality. We identify the significant and positive effect of Green Food Certification on export quality. The 2SLS estimation based on instrumental variables and a range of robustness checks confirm the validity and robustness of the benchmark conclusions. Further analysis discloses that Green Food Certification improves export quality by raising agricultural production efficiency and brand premiums. Heterogeneity analysis shows that the effect of Green Food Certification varies across regions, notably improving the quality of agri-food products exported to developed regions and regions with high levels of import supervision. Furthermore, among various product types, Green Food Certification significantly improves the export quality of primary products and products vulnerable to non-tariff measures. The above findings could guide the future development of agri-food quality certification systems, potentially leading to a transformation and promotion of the agri-food trade. 展开更多
关键词 Green Food certification agri-food products green transformation export quality food labeling
下载PDF
Countermeasures of“Post-Course Competition Certificate”Mode to Promote Innovation and Reform of BIM Course in Vocational Colleges
12
作者 Yuqing Yang Shan Zhao 《Journal of Contemporary Educational Research》 2023年第10期33-39,共7页
The model of“post-course competition certificate”can be the basic model of Building Information Modeling(BIM)course teaching in vocational colleges in the new era,and many vocational colleges have also made attempts... The model of“post-course competition certificate”can be the basic model of Building Information Modeling(BIM)course teaching in vocational colleges in the new era,and many vocational colleges have also made attempts to construct and apply this model in BIM courses and other professional courses.Based on the application of methods such as literature review and observation,it can be found that it is highly feasible in theory and practice to promote the innovation and reform of BIM curriculum based on this model.However,there are more influencing factors at the practical level,which can easily lead to some problems.In this paper,we will analyze the corresponding problems and put forward a more effective reform strategy of BIM course education innovation in combination with reality. 展开更多
关键词 Post-course competition certificate Vocational colleges and universities BIM course
下载PDF
Construction and Reflection of Software Engineering Major Based on Accreditation Board for Engineering and Technology (ABET) Certification
13
作者 Yimei Xu Na Li Hongfei Hu 《Journal of Contemporary Educational Research》 2024年第3期83-87,共5页
With the rapid development of information technology,the demand for talents in the field of software engineering is growing.In order to cultivate high-quality software engineering talents who meet the market demand,un... With the rapid development of information technology,the demand for talents in the field of software engineering is growing.In order to cultivate high-quality software engineering talents who meet the market demand,universities have continuously carried out the construction of software engineering majors.Accreditation Board for Engineering and Technology(ABET)certification,as an internationally recognized higher education quality assurance system,provides important reference and guidance for the construction of software engineering majors.Guided by student learning outcomes and core competencies,combined with the characteristics of software engineering talent cultivation,the innovation of talent cultivation mode takes industry-education integration and school-enterprise cooperation as the main development paths and explores comprehensive reform of the major in terms of professional positioning and goals,curriculum system,teaching conditions,and teachers.This comprehensive reform model has effectively promoted the development of major construction and improved the quality of talent cultivation. 展开更多
关键词 ABET certification Software engineering Major construction Talent cultivation
下载PDF
Android Permission机制的实现与安全分析 被引量:6
14
作者 张中文 雷灵光 王跃武 《信息网络安全》 2012年第8期3-6,共4页
Permission机制作为Android安全的重要组成部分,受到了越来越多的关注,已有的研究主要集中在对应用程序申请的Permission进行静态分析上。文章从分析Permission机制的实现过程入手,分析了Permission机制自身的安全问题,发现了一个Permis... Permission机制作为Android安全的重要组成部分,受到了越来越多的关注,已有的研究主要集中在对应用程序申请的Permission进行静态分析上。文章从分析Permission机制的实现过程入手,分析了Permission机制自身的安全问题,发现了一个Permission机制漏洞。应用程序利用该漏洞可以绕过权限管理,主动提升应用程序的访问权限,为后续攻击提供支持。同时文章也对Permission机制其它方面的安全特性进行了分析。 展开更多
关键词 ANDROID系统 permission 安全 漏洞
下载PDF
基于API和Permission的Android恶意软件静态检测方法研究 被引量:3
15
作者 杨鸣坤 罗锦光 +1 位作者 欧跃发 慕德俊 《计算机应用与软件》 北大核心 2020年第4期53-58,104,共7页
当前大量的Android恶意软件在后台收集用户的位置信息、通话记录、电话号码及短信等信息并将其上传至指定服务器,造成了难以估量的危害。为解决此问题,提出一种Android恶意软件静态检测方法。对收集到的训练集中的所有APK文件进行静态... 当前大量的Android恶意软件在后台收集用户的位置信息、通话记录、电话号码及短信等信息并将其上传至指定服务器,造成了难以估量的危害。为解决此问题,提出一种Android恶意软件静态检测方法。对收集到的训练集中的所有APK文件进行静态反编译,提取其中的静态信息;对静态信息中的API和Permission进行统计学分析,得到API和Permission在恶意APK和正常APK中的使用率;根据它们的使用率确定基准API和Permission集合,将每一个APK转换成可参与计算的关于API和Permission的特征向量;利用改进的k-NN分类器,对待检测的APK进行分类判定。实验结果表明,该方法可以有效地对APK进行恶意分类。 展开更多
关键词 ANDROID 恶意软件 静态检测 permission 机器学习
下载PDF
Suggestions for the "Integration in Multiple Certificates" Curriculum System Construction
16
作者 赵平 《海外英语》 2014年第14期62-63,共2页
Business English professional "Integration in Multiple Certificates" refers to these two kinds of certificates——a diploma and vocational certificates. Business English curriculum design unified vocational ... Business English professional "Integration in Multiple Certificates" refers to these two kinds of certificates——a diploma and vocational certificates. Business English curriculum design unified vocational qualification certificate with professional training objectives. Basis on the meeting of requirements of certificates for graduation, making professional training contents, curriculum,teaching methods together with vocational training and the requirements of professional qualification certificates. 展开更多
关键词 BUSINESS ENGLISH INTEGRATION in MULTIPLE certifica
下载PDF
Permission and role automatic assigning of user in role-based access control 被引量:4
17
作者 韩道军 卓汉逵 +1 位作者 夏兰亭 李磊 《Journal of Central South University》 SCIE EI CAS 2012年第4期1049-1056,共8页
Role mining and setup affect the usage of role-based access control(RBAC).Traditionally,user's role and permission assigning are manipulated by security administrator of system.However,the cost is expensive and th... Role mining and setup affect the usage of role-based access control(RBAC).Traditionally,user's role and permission assigning are manipulated by security administrator of system.However,the cost is expensive and the operating process is complex.A new role analyzing method was proposed by generating mappings and using them to provide recommendation for systems.The relation among sets of permissions,roles and users was explored by generating mappings,and the relation between sets of users and attributes was analyzed by means of the concept lattice model,generating a critical mapping between the attribute and permission sets,and making the meaning of the role natural and operational.Thus,a role is determined by permission set and user's attributes.The generated mappings were used to automatically assign permissions and roles to new users.Experimental results show that the proposed algorithm is effective and efficient. 展开更多
关键词 role-based access control ROLE permission assignment concept lattice
下载PDF
Dynamic Vector Space Secret Sharing Based on Certificates 被引量:1
18
作者 XU Chunxiang LI Jiajia LIU Dongsu 《Wuhan University Journal of Natural Sciences》 CAS 2006年第5期1253-1256,共4页
A vector space secret sharing scheme based on certificates is proposed in this paper. The difficulties of solving discrete logarithm assure confidential information's security, and the use of each participant's cert... A vector space secret sharing scheme based on certificates is proposed in this paper. The difficulties of solving discrete logarithm assure confidential information's security, and the use of each participant's certificate makes the dealer have no need to transfer secret information to the participants. The proposed scheme is dynamic. It can effectively check cheaters and does not have secure channel requirements. 展开更多
关键词 vector space secret sharing dynamic secret sharing certificate
下载PDF
A Review of Rural Policy-favored Petty Loan Forest Property Certificate Mortgage 被引量:1
19
作者 Li ZHOU Yuhui LI 《Asian Agricultural Research》 2014年第8期8-11,17,共5页
Studying petty loan forestry property mortgage mode has significant practical meaning in fund-raising and income-increasing in the forest- agriculture industry,restructuring and expanding the industry as well as setti... Studying petty loan forestry property mortgage mode has significant practical meaning in fund-raising and income-increasing in the forest- agriculture industry,restructuring and expanding the industry as well as setting up scientific industrial public policies. On the basis of literature analysis and field research data,this paper will classify and analyze research papers studying in forestry,property mortgage,and therefore draws conclusions on relevant concepts of petty loan forestry property mortgage,economics and property rights theory as well. At present,the studies of petty loan forestry property mortgage are more practical that are lack of an overall theoretical framework. Considering China's real situation of petty loan forestry property mortgage mode,we have investigated some foreign cases in operating forestry property mortgage systemically and some challenges and difficulties confronted by stakeholders in real cases. Therefore,we put forward that in the current period the fund-raising in forestry industry should focus on establishing and improving an overall rural petty loan forestry property mortgage mode. 展开更多
关键词 FOREST PROPERTY certificate Small LOAN MORTGAGE Fu
下载PDF
Breaking and Repairing the Certificateless Key Agreement Protocol from ASIAN 2006 被引量:8
20
作者 XIA Liang WANG Shengbao +1 位作者 SHEN Jiajun XU Guoming 《Wuhan University Journal of Natural Sciences》 CAS 2008年第5期562-566,共5页
The certificateless authenticated key agreement protocol proposed by Mandt et al does not haVE the property of key-compromise impersonation (K-CI) resilience. An improved protocol with a simple modification of their... The certificateless authenticated key agreement protocol proposed by Mandt et al does not haVE the property of key-compromise impersonation (K-CI) resilience. An improved protocol with a simple modification of their protocol is proposed in this paper. In particular, our improved protocol is proved to be immune to the K-CI attack and at the same time possess other security properties. 展开更多
关键词 cryptographic protocols key agreement certificate-less scheme CRYPTANALYSIS
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部