期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
Fold catastrophe model of strike-slip fault earthquake
1
作者 潘岳 李爱武 《Applied Mathematics and Mechanics(English Edition)》 SCIE EI 2010年第3期349-362,共14页
Using a differential form of the potential energy function and taking the effect of work applied by external force in far field into account, the mechanism of strike-slip fault earthquake is analyzed. The research ind... Using a differential form of the potential energy function and taking the effect of work applied by external force in far field into account, the mechanism of strike-slip fault earthquake is analyzed. The research indicates that each characteristic displayed with a fold catastrophe model in the catastrophe theory corresPonds to a specific primary characteristic of the strike-slip fault earthquake. The fold catastrophe can describe the positions of starting and end points of a fault failure and the distance of fault dislocation. These include the description of stability of the surrounding rock-fault system before and after the earthquake. Two different illustrations about elastic energy releasing amount of the surrounding rock with the fault failure are shown with the primary characteristics mutually demonstrated. The intensity of strike-slip fault earthquake is related to the surrounding rock press and the stiffness ratio of surrounding rock and fault. The larger the surrounding rock press, the smaller the stiffness ratio. The larger the included angle between the tangential stress axis and the causative fault surface, the stronger the earthquake. 展开更多
关键词 fault earthquake fold catastrophe model end point of failure failure criterion energy import rate elastic energy releasing amount
下载PDF
Self-Certificating Root:A Root Zone Security Enhancement Mechanism for DNS
2
作者 Wenfeng Liu Yu Zhang +3 位作者 Wenjia Zhang Lu Liu Hongli Zhang Binxing Fang 《Computers, Materials & Continua》 SCIE EI 2020年第4期521-536,共16页
As a critical Internet infrastructure,domain name system(DNS)protects the authenticity and integrity of domain resource records with the introduction of security extensions(DNSSEC).DNSSEC builds a single-center and hi... As a critical Internet infrastructure,domain name system(DNS)protects the authenticity and integrity of domain resource records with the introduction of security extensions(DNSSEC).DNSSEC builds a single-center and hierarchical resource authentication architecture,which brings management convenience but places the DNS at risk from a single point of failure.When the root key suffers a leak or misconfiguration,top level domain(TLD)authority cannot independently protect the authenticity of TLD data in the root zone.In this paper,we propose self-certificating root,a lightweight security enhancement mechanism of root zone compatible with DNS/DNSSEC protocol.By adding the TLD public key and signature of the glue records to the root zone,this mechanism enables the TLD authority to certify the self-submitted data in the root zone and protects the TLD authority from the risk of root key failure.This mechanism is implemented on an open-source software,namely,Berkeley Internet Name Domain(BIND),and evaluated in terms of performance,compatibility,and effectiveness.Evaluation results show that the proposed mechanism enables the resolver that only supports DNS/DNSSEC to authenticate the root zone TLD data effectively with minimal performance difference. 展开更多
关键词 Domain name system root zone security single point of failure
下载PDF
Fully distributed identity-based threshold signatures with identifiable aborts
3
作者 Yan JIANG Youwen ZHU +1 位作者 Jian WANG Xingxin LI 《Frontiers of Computer Science》 SCIE EI CSCD 2023年第5期179-195,共17页
Identity-based threshold signature(IDTS)is a forceful primitive to protect identity and data privacy,in which parties can collaboratively sign a given message as a signer without reconstructing a signing key.Neverthel... Identity-based threshold signature(IDTS)is a forceful primitive to protect identity and data privacy,in which parties can collaboratively sign a given message as a signer without reconstructing a signing key.Nevertheless,most IDTS schemes rely on a trusted key generation center(KGC).Recently,some IDTS schemes can achieve escrow-free security against corrupted KGC,but all of them are vulnerable to denial-of-service attacks in the dishonest majority setting,where cheaters may force the protocol to abort without providing any feedback.In this work,we present a fully decentralized IDTS scheme to resist corrupted KGC and denialof-service attacks.To this end,we design threshold protocols to achieve distributed key generation,private key extraction,and signing generation which can withstand the collusion between KGCs and signers,and then we propose an identification mechanism that can detect the identity of cheaters during key generation,private key extraction and signing generation.Finally,we formally prove that the proposed scheme is threshold unforgeability against chosen message attacks.The experimental results show that the computation time of both key generation and signing generation is<1 s,and private key extraction is about 3 s,which is practical in the distributed environment. 展开更多
关键词 threshold signatures single points of failure identifiable aborts
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部