期刊文献+
共找到7篇文章
< 1 >
每页显示 20 50 100
A Novel Approach towards Cost Effective Region-Based Group Key Agreement Protocol for Ad Hoc Networks Using Elliptic Curve Cryptography 被引量:1
1
作者 Krishnan Kumar J. Nafeesa Begum V. Sumathy 《International Journal of Communications, Network and System Sciences》 2010年第4期369-379,共11页
This paper addresses an interesting security problem in wireless ad hoc networks: the dynamic group key agreement key establishment. For secure group communication in an ad hoc network, a group key shared by all group... This paper addresses an interesting security problem in wireless ad hoc networks: the dynamic group key agreement key establishment. For secure group communication in an ad hoc network, a group key shared by all group members is required. This group key should be updated when there are membership changes (when the new member joins or current member leaves) in the group. In this paper, we propose a novel, secure, scalable and efficient region-based group key agreement protocol for ad hoc networks. This is implemented by a two-level structure and a new scheme of group key update. The idea is to divide the group into subgroups, each maintaining its subgroup keys using group elliptic curve diffie-hellman (GECDH) Protocol and links with other subgroups in a tree structure using tree-based group elliptic curve diffie-hellman (TGECDH) protocol. By introducing region-based approach, messages and key updates will be limited within subgroup and outer group;hence computation load is distributed to many hosts. Both theoretical analysis and experimental results show that this Region-based key agreement protocol performs well for the key establishment problem in ad hoc network in terms of memory cost, computation cost and communication cost. 展开更多
关键词 Ad HOC Network Region-Based group Key AGREEMENT protocol ELLIPTIC CURVE diffie-hellman Tree-Based group ELLIPTIC CURVE diffie-hellman
下载PDF
RESEARCH ON GROUPING STRATEGY OF SIP-BASED STREAMING MEDIA P2P LIVE BROADCAST NETWORK
2
作者 Liu Hui Huang Yongfeng Li Xing 《Journal of Electronics(China)》 2008年第3期364-371,共8页
The rapid development of Internet has led to the explosion of information sharing, and how to supervise the sharing is a main research topic on current Internet. Aiming at the disadvantage that the current Peer-to-Pee... The rapid development of Internet has led to the explosion of information sharing, and how to supervise the sharing is a main research topic on current Internet. Aiming at the disadvantage that the current Peer-to-Peer (P2P) is hard to manage and control, this paper presents a Session Initial Protocol (SIP)-based P2P network of three-level architecture. SIP middleware is introduced to the middle level of the three-layer architecture. By the connection function of the SIP signaling, the P2P transmission on media-level can be controlled. Using SIP’s register and authentication function, the manage layer can manage the whole P2P network. Based on the aforementioned architecture, this paper investigates the grouping strategy on a live broadcast application in P2P network. Combined with the function of SIP register, the paper works on several grouping strategies, sets up models to manage users by grouping them, presents a weight-based K-means IP address grouping algorithm, and realizes it. The experiment shows that the grouping strategy presented in this paper can solve the problem of group sharing of network resource, and can realize the efficient-sharing, reasonable-distributing of network resource. 展开更多
关键词 Session Initial protocol (SIP) Peer-to-Peer(P2P) Streaming media Live broadcast grouping strategy
下载PDF
基于DeviceNet技术的仅限组2从设备设计 被引量:7
3
作者 黄恒 李叶松 《电工技术杂志》 2004年第6期50-53,共4页
以DeviceNet协议规范 2 0 ,Errata 4为蓝本 ,分别从物理层、数据链层、应用层重点分析仅限组 2从设备的实现过程 ,使数字设备能连接到设备网上 ,实现现场设备网络化控制。
关键词 现场总线 DEVICENET协议 CAN总线 数据链层
下载PDF
Cryptographic Protocols Based on Nielsen Transformations
4
作者 Benjamin Fine Anja I. S. Moldenhauer Gerhard Rosenberger 《Journal of Computer and Communications》 2016年第12期63-107,共46页
We introduce in this paper cryptographic protocols which use combinatorial group theory. Based on a combinatorial distribution of shares we present secret sharing schemes and cryptosystems using Nielsen transformation... We introduce in this paper cryptographic protocols which use combinatorial group theory. Based on a combinatorial distribution of shares we present secret sharing schemes and cryptosystems using Nielsen transformations. Nielsen transformations are a linear technique to study free groups and general infinite groups. In addition the group of all automorphisms of a free group F, denoted by AUT (F), is generated by a regular Nielsen transformation between two basis of F, and each regular Nielsen transformation between two basis of F defines an automorphism of F. 展开更多
关键词 Nielsen Transformation Matrix group SL(2 Q) Secret Sharing protocol Private Key Cryptosystem Public Key Cryptosystem
下载PDF
基于Switch Ware主动网络密钥分配协议的改进
5
作者 钟穗 何明德 《同济大学学报(自然科学版)》 EI CAS CSCD 北大核心 2004年第6期806-810,共5页
针对SwitchWare主动网络的密钥分配协议进行了分析和研究 ,指出SwitchWare使用的密钥分配协议主要是站到站的协议 ,它是针对 2个节点的 ,这样使主体要与每个节点建立共享密钥 ,从而增大了包和CPU的开销 .因此 ,借鉴了用于多点的密钥分... 针对SwitchWare主动网络的密钥分配协议进行了分析和研究 ,指出SwitchWare使用的密钥分配协议主要是站到站的协议 ,它是针对 2个节点的 ,这样使主体要与每个节点建立共享密钥 ,从而增大了包和CPU的开销 .因此 ,借鉴了用于多点的密钥分配协议 (GDH .2协议 ) ,并在对GDH .2安全性进行改进的基础上 ,提出了E GDH .2协议 ;最后对E GDH . 展开更多
关键词 主动网络 交换件 密钥分配协议 GDH.2协议
下载PDF
数字电视系统解复用中PCR抖动问题的研究 被引量:2
6
作者 吴娟 《中国有线电视》 2011年第1期22-25,共4页
通过研究系统级解复用过程中出现的PCR抖动问题,提出了两种解决的策略,尤其是在符合MPEG-2标准的前提下,对MPEG-2标准进行了一些改进,自定义了一些复用和解复用的协议,使得在系统级解复用过程中,能从多节目TS流中完整准确地恢复出单节... 通过研究系统级解复用过程中出现的PCR抖动问题,提出了两种解决的策略,尤其是在符合MPEG-2标准的前提下,对MPEG-2标准进行了一些改进,自定义了一些复用和解复用的协议,使得在系统级解复用过程中,能从多节目TS流中完整准确地恢复出单节目码流。 展开更多
关键词 MPEG-2标准 复用 解复用
下载PDF
BAG-1和ERCC1基因多态性与晚期非小细胞肺癌患者铂类药物敏感性的关系 被引量:9
7
作者 王亚帝 成健 +2 位作者 陈君臣 王月 哈敏文 《肿瘤》 CAS CSCD 北大核心 2011年第9期824-829,共6页
目的:探讨Bcl-2结合抗凋亡基因1(Bcl-2associated athanogene1,BAG-1)codon324(C→T,rs11551682)和切除修复交叉互补基因1(excision repair cross-complementing group1,ERCC1)codon118(C→T,rsl1615)基因多态性与晚期非小细胞肺癌(non-... 目的:探讨Bcl-2结合抗凋亡基因1(Bcl-2associated athanogene1,BAG-1)codon324(C→T,rs11551682)和切除修复交叉互补基因1(excision repair cross-complementing group1,ERCC1)codon118(C→T,rsl1615)基因多态性与晚期非小细胞肺癌(non-small cell lung cancer,NSCLC)患者对铂类药物敏感性的关系。方法:以聚合酶链-限制性片段长度多态性(PCR-restriction fragment length polymorphism,PCR-RFLP)方法检测142例接受铂类药物化疗的晚期NSCLC患者的BAG-1codon324基因型和ERCC1codon118基因型,比较不同基因型与化疗敏感性的关系。结果:BAG-1codon324基因型频率分别为C/C占77.46%(110/142),C/T占22.54%(32/142),未发现T/T。142例患者中,完全缓解4例,部分缓解42例,疾病稳定55例,疾病进展41例;总有效率为32.39%。BAG-1codon324C/C基因型患者对顺铂类药物的敏感性是C/T基因型患者的2.852倍(95%可信区间:1.133~7.182,P=0.026),且BAG-1codon324C/C基因型与C/T基因型患者的中位无进展生存期差异有统计学意义(分别为5.7和5.3个月,P=0.002)。携带BAG-1codon324C/C和ERCC1codon118C/C基因型,对铂类药物的敏感性存在一定的联合作用(P=0.005)。结论:BAG-1codon324和ERCC1codon118基因型可能是晚期NSCLC患者铂类药物敏感性的预测因子。 展开更多
关键词 非小细胞肺 抗肿瘤联合化疗方案 多态性 单核苷酸 Bcl-2结合抗凋亡基因1 切除修复交叉互补基因1
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部