期刊文献+
共找到5篇文章
< 1 >
每页显示 20 50 100
Tackling Key Technological Problems and Advancing 5G Technology Application in Railway
1
作者 ZHOU Li ZHENG Mingda 《Chinese Railways》 2023年第1期3-12,共10页
The paper summarizes the development of mobile communication of domestic and foreign railways,and proposes the priorities for tackling key technological problems of railway 5G private network according to the technica... The paper summarizes the development of mobile communication of domestic and foreign railways,and proposes the priorities for tackling key technological problems of railway 5G private network according to the technical routes of railway next-generation mobile communication determined by China State Railway Group Co.,Ltd.From the aspects of work objectives,principles,technical routes and innovative working methods,the paper elaborates the ideas of railway 5G scientific and technological research,puts forward the contents and plans of scientific and technological research on railway 5G private network,systematically organizes the achievements in the scientific and technological research stage of railway 5G private network,and sets forth the key contents of next-step scientific and technological research. 展开更多
关键词 railway mobile communication system railway 5G private network tackling key problems in science and technology on 5G private network
下载PDF
Attacks Against Cross-Chain Systems and Defense Approaches:A Contemporary Survey
2
作者 Li Duan Yangyang Sun +3 位作者 Wei Ni Weiping Ding Jiqiang Liu Wei Wang 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2023年第8期1647-1667,共21页
The blockchain cross-chain is a significant technology for inter-chain interconnection and value transfer among different blockchain networks.Cross-chain overcomes the“information island”problem of the closed blockc... The blockchain cross-chain is a significant technology for inter-chain interconnection and value transfer among different blockchain networks.Cross-chain overcomes the“information island”problem of the closed blockchain network and is increasingly applied to multiple critical areas such as finance and the internet of things(IoT).Blockchain can be divided into three main categories of blockchain networks:public blockchains,private blockchains,and consortium blockchains.However,there are differences in block structures,consensus mechanisms,and complex working mechanisms among heterogeneous blockchains.The fragility of the cross-chain system itself makes the cross-chain system face some potential security and privacy threats.This paper discusses security defects on the cross-chain implementation mechanism,and discusses the impact of the structural features of blockchain networks on cross-chain security.In terms of cross-chain intercommunication,a cross-chain attack can be divided into a multi-chain combination attack,native chain attack,and inter-chain attack diffusion.Then various security threats and attack paths faced by the cross-chain system are analyzed.At last,the corresponding security defense methods of cross-chain security threats and future research directions for cross-chain applications are put forward. 展开更多
关键词 Blockchain cross-chain DEFENSE distributed private key control hash-locking NOTARY security threats sidechain/relay
下载PDF
Novel Block Chain Technique for Data Privacy and Access Anonymity in Smart Healthcare
3
作者 J.Priya C.Palanisamy 《Intelligent Automation & Soft Computing》 SCIE 2023年第1期243-259,共17页
The Internet of Things (IoT) and Cloud computing are gaining popularity due to their numerous advantages, including the efficient utilization of internetand computing resources. In recent years, many more IoT applicat... The Internet of Things (IoT) and Cloud computing are gaining popularity due to their numerous advantages, including the efficient utilization of internetand computing resources. In recent years, many more IoT applications have beenextensively used. For instance, Healthcare applications execute computations utilizing the user’s private data stored on cloud servers. However, the main obstaclesfaced by the extensive acceptance and usage of these emerging technologies aresecurity and privacy. Moreover, many healthcare data management system applications have emerged, offering solutions for distinct circumstances. But still, theexisting system has issues with specific security issues, privacy-preserving rate,information loss, etc. Hence, the overall system performance is reduced significantly. A unique blockchain-based technique is proposed to improve anonymityin terms of data access and data privacy to overcome the above-mentioned issues.Initially, the registration phase is done for the device and the user. After that, theGeo-Location and IP Address values collected during registration are convertedinto Hash values using Adler 32 hashing algorithm, and the private and publickeys are generated using the key generation centre. Then the authentication is performed through login. The user then submits a request to the blockchain server,which redirects the request to the associated IoT device in order to obtain thesensed IoT data. The detected data is anonymized in the device and stored inthe cloud server using the Linear Scaling based Rider Optimization algorithmwith integrated KL Anonymity (LSR-KLA) approach. After that, the Time-stamp-based Public and Private Key Schnorr Signature (TSPP-SS) mechanismis used to permit the authorized user to access the data, and the blockchain servertracks the entire transaction. The experimental findings showed that the proposedLSR-KLA and TSPP-SS technique provides better performance in terms of higherprivacy-preserving rate, lower information loss, execution time, and Central Processing Unit (CPU) usage than the existing techniques. Thus, the proposed method allows for better data privacy in the smart healthcare network. 展开更多
关键词 Adler 32 hashing algorithm linear scaling based rider optimization algorithm with integrated KL anonymity(LSR-KLA) timestamp-based public and private key schnorr signature(TSPP-SS) blockchain internet of things(IoT) healthcare
下载PDF
CRYPTANALYSIS OF AN EXTENDED MQ SIGNATURE SYSTEM HTTM
4
作者 Jing Zhengjun Yu Zhimin +2 位作者 Gu Chunsheng Wu Fangsheng Zhao Xiaorong 《Journal of Electronics(China)》 2013年第5期491-499,共9页
Since Multivatriate Quadratic(MQ)-based Public Key Cryptosystem(MPKC)has been one of the hot research fields of post-quantum cryptography,it becomes important to analyze the security of new MPKC schemes.Wang et al.pro... Since Multivatriate Quadratic(MQ)-based Public Key Cryptosystem(MPKC)has been one of the hot research fields of post-quantum cryptography,it becomes important to analyze the security of new MPKC schemes.Wang et al.proposed a novel multivariate signature scheme with Hash-based Tame Transformation and Minus(HTTM)in 2011.For this extended MQ-based signature,we can transform it into an SFLASH variant by splitting and merging HT transformation,and solve an equivalent private key corresponding to the public key of HTTM.Thus,the adversary can forge legitimate signature for any message by using this equivalent private key. 展开更多
关键词 Multivariate Quadratic(MQ) problem CRYPTANALYSIS Equivalent private key Forging signature Hash-based Tame Transformation and Minus(HTTM
下载PDF
Cryptographic Protocols Based on Nielsen Transformations
5
作者 Benjamin Fine Anja I. S. Moldenhauer Gerhard Rosenberger 《Journal of Computer and Communications》 2016年第12期63-107,共46页
We introduce in this paper cryptographic protocols which use combinatorial group theory. Based on a combinatorial distribution of shares we present secret sharing schemes and cryptosystems using Nielsen transformation... We introduce in this paper cryptographic protocols which use combinatorial group theory. Based on a combinatorial distribution of shares we present secret sharing schemes and cryptosystems using Nielsen transformations. Nielsen transformations are a linear technique to study free groups and general infinite groups. In addition the group of all automorphisms of a free group F, denoted by AUT (F), is generated by a regular Nielsen transformation between two basis of F, and each regular Nielsen transformation between two basis of F defines an automorphism of F. 展开更多
关键词 Nielsen Transformation Matrix Group SL(2 Q) Secret Sharing Protocol private key Cryptosystem Public key Cryptosystem
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部