期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
A Message-Level Security Model Consisting of Multiple Security-Tokens Mechanism 被引量:1
1
作者 LIU Zhenpeng SONG Xiaojing +2 位作者 TANG Wansheng CHANG Xiaomeng ZHOU Dongdong 《Wuhan University Journal of Natural Sciences》 CAS 2007年第1期1-4,共4页
Current Web services architectures are confronted with a few stubborn problems, and the security problem becomes one of the bottlenecks that restrict the extensive application of Web service. After compared transport ... Current Web services architectures are confronted with a few stubborn problems, and the security problem becomes one of the bottlenecks that restrict the extensive application of Web service. After compared transport level with message level security, the limitation of transport level security became clearly. And then on the basis of the analysis message level security, especially WS-Security, XML security protocol was adopted to guarantee message level security. Because WS-Security is a new protocol jointly developed by Microsoft and IBM among these XML security protocols, and a security-token mechanism of WS-Security mechanism was improved, added a table with security-token types. And a new model consisting of multiple security-token is put forward to guarantee the security of message transmission. 展开更多
关键词 Web service message level security WS-security security-token
下载PDF
Cryptanalysis of a Completely Anonymous Multi-recipient Signcryption Scheme with Public Verification
2
作者 张波 孙涛 于代荣 《Journal of Donghua University(English Edition)》 EI CAS 2015年第2期240-243,共4页
Anonymity is a very important security objective in network communications.Recently,Pang et al.proposed a novel multirecipient signcryption scheme with complete anonymity and claimed that the new concrete scheme was s... Anonymity is a very important security objective in network communications.Recently,Pang et al.proposed a novel multirecipient signcryption scheme with complete anonymity and claimed that the new concrete scheme was strong existential unforgeability under selective multi-ID,chosen message attack.Unfortunately,by giving concrete attacks,named " inside attack" and " outside attack" respectively,we indicate that Pang et al.'s scheme is not secure in their security model. 展开更多
关键词 recipient private claimed secure giving message signer outside secret chosen
下载PDF
Research on medical data storage and sharing model based on blockchain
3
作者 Jian Zhao Wenqian Qiang +4 位作者 Zisong Zhao Tianbo An Zhejun Kuang Dawei Xu Lijuan Shi 《High-Confidence Computing》 2023年第3期61-67,共7页
With the process of medical informatization,medical diagnosis results are recorded and shared in the form of electronic data in the computer.However,the security of medical data storage cannot be effectively protected... With the process of medical informatization,medical diagnosis results are recorded and shared in the form of electronic data in the computer.However,the security of medical data storage cannot be effectively protected and the unsafe sharing of medical data among different institutions is still a hidden danger that cannot be underestimated.To solve the above problems,a secure storage and sharing model of private data based on blockchain technology and homomorphic encryption is constructed.Based on the idea of blockchain decentralization,the model maintains a reliable medical alliance chain system to ensure the safe transmission of data between different institutions;A privacy data encryption and computing protocol based on homomorphic encryption is constructed to ensure the safe transmission of medical data;Using its complete anonymity to ensure the Blockchain of medical data and patient identity privacy;A strict transaction control management mechanism of medical data based on Intelligent contract automatic execution of preset instructions is proposed.After security verification,compared with the traditional medical big data storage and sharing mode,the model has better security and sharing. 展开更多
关键词 Blockchain Encryption algorithm Medical data Secure message processing systems storage MODELS Shared-resource systems
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部