期刊文献+
共找到5篇文章
< 1 >
每页显示 20 50 100
Security of Broadband Access Network
1
作者 Wang Deqiang(Network Division of ZTE Corporation, Shanghai 201203, China) 《ZTE Communications》 2007年第1期37-41,共5页
Due to the rapid development of broadband access technologies, the broadband access networks have wider and wider application. However, with the development, the security issue became a public concern. Under the envir... Due to the rapid development of broadband access technologies, the broadband access networks have wider and wider application. However, with the development, the security issue became a public concern. Under the environment of access network, customers, access equipment and networks all face various threats, especially those from the user side. Such technologies and solutions as port positioning, fraud prevention on Medium Access Control (MAC) addresses and monitoring of illegal services might be the solution to the security problem existing in the current networks. 展开更多
关键词 access MAC security of Broadband access Network PPPOE
下载PDF
CHINA SECURITIES REGULATORY COMMISSION RELEASING CHINA'S COMMITMENTS FOR WTO ACCESSION
2
《China's Foreign Trade》 2002年第2期38-38,共1页
关键词 WTO CHINA SECURITIES REGULATORY COMMISSION RELEASING CHINA’S COMMITMENTS FOR WTO accessION
下载PDF
Privacy Preserving and Delegated Access Control for Cloud Applications 被引量:2
3
作者 Xinfeng Ye 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2016年第1期40-54,共15页
In cloud computing applications, users' data and applications are hosted by cloud providers. This paper proposed an access control scheme that uses a combination of discretionary access control and cryptographic tech... In cloud computing applications, users' data and applications are hosted by cloud providers. This paper proposed an access control scheme that uses a combination of discretionary access control and cryptographic techniques to secure users' data and applications hosted by cloud providers. Many cloud applications require users to share their data and applications hosted by cloud providers. To facilitate resource sharing, the proposed scheme allows cloud users to delegate their access permissions to other users easily. Using the access control policies that guard the access to resources and the credentials submitted by users, a third party can infer information about the cloud users. The proposed scheme uses cryptographic techniques to obscure the access control policies and users' credentials to ensure the privacy of the cloud users. Data encryption is used to guarantee the confidentiality of data. Compared with existing schemes, the proposed scheme is more flexible and easy to use. Experiments showed that the proposed scheme is also efficient. 展开更多
关键词 cloud computing access control security
原文传递
An Anti-Quantum Authentication Protocol for Space Information Networks Based on Ring Learning with Errors
4
作者 Junyan Guo Ye Du +1 位作者 Xuesong Wu Meihong Li 《Journal of Communications and Information Networks》 CSCD 2021年第3期301-311,共11页
With the continuous development of satellite communication and Internet of things technology,more and more devices can access space information networks(SIN)and enjoy satellite services everywhere in the world.However... With the continuous development of satellite communication and Internet of things technology,more and more devices can access space information networks(SIN)and enjoy satellite services everywhere in the world.However,due to the openness of the air-to-ground channel,the device will face a series of security threats when accessing SIN,such as replay attacks,eavesdropping attacks,impersonation attacks,and man-in-the-middle attacks.These security threats will lead to illegal entity access and further endanger the reliability and availability of the system.Although scholars have proposed many enhanced security access authentication protocols,most of them have been proved to have security vulnerabilities.In addition,with the development of quantum computing,the previous authentication protocols based on some asymmetric cryptographic mechanisms such as discrete logarithm and elliptic curve cryptographic mechanisms may face new security challenges.In this context,this paper proposes a novel antiquantum access authentication protocol based on ring learning with errors(RLWE),which meets more security requirements and greatly reduces the authentication delay through prenegotiation.Through the security analysis and performance analysis,it is shown that our protocol can be more suitable for delaysensitive IoT devices to access SIN while ensuring higher security. 展开更多
关键词 space information networks access security anti-quantum authentication protocol
原文传递
Design of power balance SRAM for DPA-resistance 被引量:1
5
作者 周可基 汪鹏君 温亮 《Journal of Semiconductors》 EI CAS CSCD 2016年第4期106-112,共7页
A power balance static random-access memory(SRAM) for resistance to differential power analysis(DPA) is proposed. In the proposed design, the switch power consumption and short-circuit power consumption are balanc... A power balance static random-access memory(SRAM) for resistance to differential power analysis(DPA) is proposed. In the proposed design, the switch power consumption and short-circuit power consumption are balanced by discharging and pre-charging the key nodes of the output circuit and adding an additional shortcircuit current path. Thus, the power consumption is constant in every read cycle. As a result, the DPA-resistant ability of the SRAM is improved. In 65 nm CMOS technology, the power balance SRAM is fully custom designed with a layout area of 5863.6 μm^2.The post-simulation results show that the normalized energy deviation(NED) and normalized standard deviation(NSD) are 0.099% and 0.04%, respectively. Compared to existing power balance circuits, the power balance ability of the proposed SRAM has improved 53%. 展开更多
关键词 differential power analysis(DPA) static random access memory(SRAM) power balance information security
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部