期刊文献+
共找到4篇文章
< 1 >
每页显示 20 50 100
An Efficient Multicast Source Authentication Protocol 被引量:1
1
作者 WANG Weidong LI Zhitang +1 位作者 LU Chuiwei ZHANG Yejiang 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1831-1834,共4页
We propose an efficient multicast source authentication protocol called efficient multi-tree-chains scheme (EMTC), which shows more loss resistibility, less communication cost, and no delay at receivers. The EMTC sc... We propose an efficient multicast source authentication protocol called efficient multi-tree-chains scheme (EMTC), which shows more loss resistibility, less communication cost, and no delay at receivers. The EMTC scheme is based on combination of single Chain scheme and Hash Tree Chains scheme, and integrates the advantages of both. In this scheme, stream is firstly divided into blocks with n packets, and each block consists of m clusters, everyone of which contains a tree of packets. All clusters are chained together. Through EMTC, packets of one cluster can be authenticated by any packet of the previous cluster. Compared to other multicast authentication protocols, the proposed scheme has the following advantages: ① dramatically improves the resistance to burst packets loss; ② low computation and communication overhead; ③ imposes low delay on the sender side and no delay on the receiver side. 展开更多
关键词 source authentication multi-tree-chains MULTICAST
下载PDF
Evaluation of the chemical profile from four germplasms sources of Pruni Semen using UHPLC-LTQ-Orbitrap-MS and multivariate analyses 被引量:1
2
作者 Zihan Zhao Yue Liu +7 位作者 Yushi Zhang Zeyu Geng Rina Su Lipeng Zhou Chao Han Zhanjun Wang Shuangcheng Ma Weidong Li 《Journal of Pharmaceutical Analysis》 SCIE CAS CSCD 2022年第5期733-742,共10页
Pruni Semen,the seed of several unique Prunus plants,is a traditional purgative herbal material.To determine the authentic sources of Pruni Semen,46 samples from four species were collected and analyzed.Ten compounds ... Pruni Semen,the seed of several unique Prunus plants,is a traditional purgative herbal material.To determine the authentic sources of Pruni Semen,46 samples from four species were collected and analyzed.Ten compounds including multiflorin A(Mul A),a notable purative compound,were isolated and identified by chemical separation and nuclear magnetic resonance spectroscopy.Seventy-six communal components were identified by ultra-high performance liquid chromatography with linear ion trap-quadrupole Orbitrap mass spectrometry,and acetyl flavonoid glycosides were recognized as characteristic constituents.The flavonoids were distributed in the seed coat and cyanogenic glycosides in the kernel.Based on this,methods for identifying Pruni Semen from different sources were established using chemical fingerprinting,quantitative analysis of the eight principal compounds,hierarchical cluster analysis,principal component analysis,and orthogonal partial least squares discriminant analysis.The results showed that the samples were divided into two categories:one is the small seeds from Prunus humilis(Ph)and Prunus japonica(Pj),and the other is the big seeds from Prunus pedunculata(Pp)and Prunus triloba(Pt).The average content of Mul A was 3.02,6.93,0.40,and 0.29 mg/g,while the average content of amygdalin was 18.5,17.7,31.5,and 30.9 mg/g in Ph,Pj,Pp,and Pt,respectively.All the above information suggests that small seeds might be superior sources of Pruni Semen.This is the first comprehensive report on the identification of chemical components in Pruni Semen from different species. 展开更多
关键词 Pruni semen Acetyl flavonoids AMYGDALIN Multivariate analyses Authentic sources
下载PDF
Improving Computation Efficiency of Source Authentication by Elliptic Curve Cryptosystem
3
作者 Iuon-Chang Lin Jen-Ho Yang 《Journal of Electronic Science and Technology》 CAS 2012年第3期227-231,共5页
The overload of traditional cryptosystems is too high for real-time applications so there is a need to design a new encryption and signature scheme for the multicast applications. In this paper, we use the elliptic cu... The overload of traditional cryptosystems is too high for real-time applications so there is a need to design a new encryption and signature scheme for the multicast applications. In this paper, we use the elliptic curve cryptosystem to design a source authentication scheme for real-time applications. The proposed scheme uses the message recovery signature to reduce the computation cost. Thus, the proposed source authentication scheme is more suitable for real-time applications, such as online meeting, online movie, and online music. 展开更多
关键词 ENCRYPTION message recovery multicast real-time application source authentication.
下载PDF
Blockchain-Based Data Acquisition with Privacy Protection in UAV Cluster Network
4
作者 Lemei Da Hai Liang +3 位作者 Yong Ding Yujue Wang Changsong Yang Huiyong Wang 《Computer Modeling in Engineering & Sciences》 SCIE EI 2023年第10期879-902,共24页
The unmanned aerial vehicle(UAV)self-organizing network is composed of multiple UAVs with autonomous capabilities according to a certain structure and scale,which can quickly and accurately complete complex tasks such... The unmanned aerial vehicle(UAV)self-organizing network is composed of multiple UAVs with autonomous capabilities according to a certain structure and scale,which can quickly and accurately complete complex tasks such as path planning,situational awareness,and information transmission.Due to the openness of the network,the UAV cluster is more vulnerable to passive eavesdropping,active interference,and other attacks,which makes the system face serious security threats.This paper proposes a Blockchain-Based Data Acquisition(BDA)scheme with privacy protection to address the data privacy and identity authentication problems in the UAV-assisted data acquisition scenario.Each UAV cluster has an aggregate unmanned aerial vehicle(AGV)that can batch-verify the acquisition reports within its administrative domain.After successful verification,AGV adds its signcrypted ciphertext to the aggregation and uploads it to the blockchain for storage.There are two chains in the blockchain that store the public key information of registered entities and the aggregated reports,respectively.The security analysis shows that theBDAconstruction can protect the privacy and authenticity of acquisition data,and effectively resist a malicious key generation center and the public-key substitution attack.It also provides unforgeability to acquisition reports under the Elliptic Curve Discrete Logarithm Problem(ECDLP)assumption.The performance analysis demonstrates that compared with other schemes,the proposed BDA construction has lower computational complexity and is more suitable for the UAV cluster network with limited computing power and storage capacity. 展开更多
关键词 Unmanned aerial vehicle cluster network certificateless signcryption certificateless signature batch verification source authentication data privacy blockchain
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部