期刊文献+
共找到2,470篇文章
< 1 2 124 >
每页显示 20 50 100
LibPass:基于包结构和签名的第三方库检测方法
1
作者 徐建 袁倩婷 《软件学报》 EI CSCD 北大核心 2024年第6期2880-2902,共23页
第三方库检测是Android应用安全分析领域的上游任务,其检测精度对于恶意应用检测、重打包检测、隐私泄露等下游任务有显著影响.为了提升检测精度和效率,采用相似性比较的思想,提出一种基于包结构和签名的第三方库检测方法,命名为LibPass... 第三方库检测是Android应用安全分析领域的上游任务,其检测精度对于恶意应用检测、重打包检测、隐私泄露等下游任务有显著影响.为了提升检测精度和效率,采用相似性比较的思想,提出一种基于包结构和签名的第三方库检测方法,命名为LibPass.LibPass以流水线式模式组合主模块识别、第三方库候选识别和细粒度检测等3个组件.主模块识别方法区分主程序二进制代码与引入的第三方库二进制代码,旨在提升方法检测效率.在此基础上,提出由第三方库候选识别和细粒度检测构成的两阶段检测方法.前者利用包结构特征的稳定性来应对应用程序的混淆行为以提升混淆情形下的检测精度,并利用包结构签名完成快速比对以识别候选第三方库,达到显著降低成对比较次数、提升检测效率的目的;后者在前者涮选出的候选中,通过更细粒度但代价更高的相似性分析精确地识别第三方库及其对应的版本.为了验证方法的性能和效率,构建3个评估不同检测能力的基准数据集,在这些基准数据集上开展实验验证,从检测性能、检测效率和抗混淆性等方面对实验结果进行深入分析,结果表明LibPass具备较高的检测精度,检测效率,以及应对多种常用混淆操作的能力. 展开更多
关键词 第三方库 代码混淆 安全分析 签名
下载PDF
一种基于随机求反的S盒抗DPA攻击安全结构
2
作者 胡晓婷 戴泽龙 +1 位作者 覃中平 巩固 《计算机技术与发展》 2024年第11期109-116,共8页
DPA攻击(差分功耗攻击)作为一种重要的侧信道攻击方法,因其成功率较高而成为加密算法面临的主要威胁之一。S盒是分组加密算法(高级加密标准(AES)、国产商业密码(SM4)等)中唯一的非线性运算,很大程度上决定了相关加密算法的安全性。S盒... DPA攻击(差分功耗攻击)作为一种重要的侧信道攻击方法,因其成功率较高而成为加密算法面临的主要威胁之一。S盒是分组加密算法(高级加密标准(AES)、国产商业密码(SM4)等)中唯一的非线性运算,很大程度上决定了相关加密算法的安全性。S盒的实现主要分为:查表法、组合逻辑和复合域方法。复合域方法因将S盒中的GF(28)域上的求逆运算分解到低阶域上而使其硬件实现具有高性能、低面积等优势。该文提出了一种基于随机求反的复合域S盒抗DPA攻击安全结构,并据此设计了两类抗DPA攻击的AES安全结构:一种是基于随机取反的AES安全结构(RC-AES安全结构),另一种是基于随机取反与一阶掩码结合的AES安全结构(RC-M-AES安全结构)。实验证明,相较于已知文献中基于掩码保护的AES,该文提出的RC-AES结构只需增加微小的面积开销就能有效抵抗DPA攻击,展现出显著的面积优势。同时,RC-M-AES安全结构能在微小面积开销下,构建出比单独掩码方案更安全的密码芯片结构。此外,提出的S盒安全结构不仅适用于AES,也适用于任何以替换函数作为唯一非线性运算的加密算法,具有较好的通用性。 展开更多
关键词 复合域 s 随机求反 抗DPA攻击 安全结构 高级加密标准
下载PDF
一种基于安全多方计算的快速Transformer安全推理方案 被引量:1
3
作者 刘伟欣 管晔玮 +3 位作者 霍嘉荣 丁元朝 郭华 李博 《计算机研究与发展》 EI CSCD 北大核心 2024年第5期1218-1229,共12页
Transformer模型在自然语言处理、计算机视觉等众多领域得到了广泛应用,并且有着突出的表现.在Transformer的推理应用中用户的数据会被泄露给模型提供方.随着数据隐私问题愈发得到公众的关注,上述数据泄露问题引发了学者们对Transforme... Transformer模型在自然语言处理、计算机视觉等众多领域得到了广泛应用,并且有着突出的表现.在Transformer的推理应用中用户的数据会被泄露给模型提供方.随着数据隐私问题愈发得到公众的关注,上述数据泄露问题引发了学者们对Transformer安全推理的研究,使用安全多方计算(secure multi-party computation,MPC)实现Transformer模型的安全推理是当前的一个研究热点.由于Transformer模型中存在大量非线性函数,因此使用MPC技术实现Transformer安全推理会造成巨大的计算和通信开销.针对Transformer安全推理过程中开销较大的Softmax注意力机制,提出了2种MPC友好的注意力机制Softmax freeDiv Attention和2Quad freeDiv Attention.通过将Transformer模型中的Softmax注意力机制替换为新的MPC友好的注意力机制,同时结合激活函数GeLU的替换以及知识蒸馏技术,提出了一个MPC友好的Transformer转换框架,通过将Transformer模型转化为MPC友好的Transformer模型,提高Transformer安全推理的效率.在局域网环境下使用安全处理器(secure processing unit,SPU)提供的隐私计算协议,基于所提出的MPC友好的Transformer转换框架,在SST-2上使用Bert-Base进行安全推理.测试结果表明,在保持推理准确率与无近似模型一致的情况下,安全推理计算效率提高2.26倍. 展开更多
关键词 安全推理 TRANsFORMER 安全多方计算 安全处理器 知识蒸馏
下载PDF
基于Spring Security安全框架的联通资源管理系统安全分析
4
作者 董一璠 李宝林 何先波 《电子设计工程》 2013年第8期61-64,共4页
基于为联通资源管系统提供一个方便可靠的安全框架的目的,采用"面向切面编程"(AOP)的Spring Security安全框架,结合了Spring框架提供的"控制反转"技术,最终创建了一个功能强大、安全可靠的权限控制安全框架。
关键词 软件工程 J2EE sPRING security 过滤器 B s
下载PDF
U. S. -Iraq War and China's National Security 被引量:1
5
作者 Gu Dexin 《Contemporary International Relations》 2003年第6期18-24,共7页
Discussions about the U. S-Iraq war would last for years, but the war will surely produce long-term influences on international strategic structure and China’s security environment. The feature and influence of the w... Discussions about the U. S-Iraq war would last for years, but the war will surely produce long-term influences on international strategic structure and China’s security environment. The feature and influence of the war are determined by the America’ purposes in launching the war, which, in the common. 展开更多
关键词 of on IT into Iraq War and China’s National security that HAVE been for
下载PDF
Security transmission and recognition of F-knowledge 被引量:7
6
作者 Zhang Ling Shi Kaiquan 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2009年第4期877-882,共6页
The concept of F-knowledge is presented by employing S-rough sets. By engrafting and penetrating between the F-knowledge generated by S-rough sets and the RSA algorithm, the security transmission and recognition of mu... The concept of F-knowledge is presented by employing S-rough sets. By engrafting and penetrating between the F-knowledge generated by S-rough sets and the RSA algorithm, the security transmission and recognition of multi-agent F-knowledge are proposed, which includes the security transmission of multi-agent F-knowledge with positive direction secret key and the security transmission of multi-agent F-knowledge with reverse direction secret key. Finally, the recognition criterion and the applications of F-knowledge are presented. The security of F-knowledge is a new application research direction of S-rough sets in information systems. 展开更多
关键词 s-rough sets F-knowledge security of knowledge RsA algorithm recognition criterion application.
下载PDF
基于不经意多项式估值的SM4协同加解密方案 被引量:1
7
作者 李莉 宣佳铮 +1 位作者 高尚 郭国疆 《计算机应用研究》 CSCD 北大核心 2024年第6期1862-1868,共7页
协同加解密是安全多方计算中的重要研究方向,它可以安全高效地实现数据保护、隐私保护。为解决现有SM4协同加解密方案离线计算阶段计算复杂度偏高的问题,提出一种基于不经意多项式估值的SM4协同加解密方案。方案利用预计算的多项式集合... 协同加解密是安全多方计算中的重要研究方向,它可以安全高效地实现数据保护、隐私保护。为解决现有SM4协同加解密方案离线计算阶段计算复杂度偏高的问题,提出一种基于不经意多项式估值的SM4协同加解密方案。方案利用预计算的多项式集合和多项式值集合来完成在线阶段的S盒协同计算,从而提高在线计算阶段的性能。其证明了所提方案的正确性和安全性,同时与四种不同的方案进行对比,结果表明,所提方案计算效率明显高于其他方案,说明所提方案能安全高效地完成SM4协同加解密。 展开更多
关键词 安全多方计算 协同加解密 sM4 不经意多项式估值
下载PDF
A Corpus-Based Analytical Study on Military and Security Developments Involving People's Republic of China 被引量:2
8
作者 MEI Zhao-yang YANG Min 《Sino-US English Teaching》 2015年第7期510-518,共9页
This paper contrasts Military Power of the People's Republic of China from the year of 2000 to 2009 and Military and Security Developments Involving People's Republic of China from the year 2010 to 2013 with corpus ... This paper contrasts Military Power of the People's Republic of China from the year of 2000 to 2009 and Military and Security Developments Involving People's Republic of China from the year 2010 to 2013 with corpus analysis. It distinguishes the new reports' differences from the old ones and tries to explore American's discourse colonization and discourse hegemony through corpus software WordSmith 5.0-Keywords and Concordance analysis of high frequency words. The significance of the study is that it enlightens military texts which will influence audiences' viewpoints and provides a new perspective for strategies replying American media war. 展开更多
关键词 corpus Military Power of the People's Republic of China and Military security Developments Involving People's Republic of China sino-America relation
下载PDF
Ecological Security Assessment in County Area Based on P-S-R Model——A Case Study of Ningwu County,Shanxi Province 被引量:3
9
作者 Feng Xufang Liu Jingmei Zhao Lijuan 《Meteorological and Environmental Research》 CAS 2014年第8期13-15,19,共4页
To further understand the status quo and change tendency of ecological security in county area, we took the example of Ningwu County, the headstream of Fenhe River, confronting serious eco-environment problem and cons... To further understand the status quo and change tendency of ecological security in county area, we took the example of Ningwu County, the headstream of Fenhe River, confronting serious eco-environment problem and considerable human impacts. Taking Ningwu as the study area and using variation coefficient method to determine the weights of the indices, we built ecological security pattern based on Pressure-State-Response (P-S-R) Model of Organization for Economic Cooperation and Development. The ecological security status was evaluated by calculating eco-security index (ESI) with socio-economic statistical data of Ningwu during 2001 -2010. The results showed that the situation of eco-security had been improved from heavy alarm to relative safety during 2001 -2010. It reflected that the ecological economic system in Ningwu County tended to be relaxed constantly after experienced a sharp conflict between ecological environment and economic growth. The ecological safety awareness was growing, however, by force of the objective requirements of population growth and economic development, the situation of ecological security was still unstable. 展开更多
关键词 Ecological security P-s-R model Es/ Ningwu County China
下载PDF
Risk assessment of water security in Haihe River Basin during drought periods based on D-S evidence theory 被引量:7
10
作者 Qian-jin DONG Xia LIU 《Water Science and Engineering》 EI CAS CSCD 2014年第2期119-132,共14页
The weights of the drought risk index (DRI), which linearly combines the reliability, resiliency, and vulnerability, are difficult to obtain due to complexities in water security during drought periods. Therefore, d... The weights of the drought risk index (DRI), which linearly combines the reliability, resiliency, and vulnerability, are difficult to obtain due to complexities in water security during drought periods. Therefore, drought entropy was used to determine the weights of the three critical indices. Conventional simulation results regarding the risk load of water security during drought periods were often regarded as precise. However, neither the simulation process nor the DRI gives any consideration to uncertainties in drought events. Therefore, the Dempster-Shafer (D-S) evidence theory and the evidential reasoning algorithm were introduced, and the DRI values were calculated with consideration of uncertainties of the three indices. The drought entropy and evidential reasoning algorithm were used in a case study of the Haihe River Basin to assess water security risks during drought periods. The results of the new DRI values in two scenarios were compared and analyzed. It is shown that the values of the DRI in the D-S evidence algorithm increase slightly from the original results of Zhang et al. (2005), and the results of risk assessment of water security during drought periods are reasonable according to the situation in the study area. This study can serve as a reference for further practical application and planning in the Haihe River Basin, and other relevant or similar studies. 展开更多
关键词 risk assessment water security drought periods entropy D-s evidence theory "evidential reasoning algorithm Haihe River Basin
下载PDF
Security Research on Engineering Database System
11
作者 REN Jian-ping 1,2, SONG Han-tao 2, LIANG Yun-rong 2 (1. North China Institute of Technology, Taiyuan 030051, China 2. Beijing Institute of Technology, Beijing 100081, China) 《厦门大学学报(自然科学版)》 CAS CSCD 北大核心 2002年第S1期288-289,共2页
Engine engineering database system is an oriented C AD applied database management system that has the capability managing distributed data. The paper discusses the security issue of the engine engineering database ma... Engine engineering database system is an oriented C AD applied database management system that has the capability managing distributed data. The paper discusses the security issue of the engine engineering database management system (EDBMS). Through studying and analyzing the database security, to draw a series of securi ty rules, which reach B1, level security standard. Which includes discretionary access control (DAC), mandatory access control (MAC) and audit. The EDBMS implem ents functions of DAC, MAC and multigranularity audit. DAC solves the problems o f role inheritance, right contain, authorization identify and cascade revoke, et c; MAC includes subject and object security setup rule, security modify rule and multilevel relation access operation rule, etc; Audit allows making the sub ject, object or operation type as different audit object to implement flexible a nd multigranularity audit method. The model is designed act as a security agent to access daemon database. At present, the model is implemented which runs on th e Windows 2000 environments. 展开更多
关键词 engineering database management system (EDBMs) s ecurity agent security level
下载PDF
A Study of Secure Multi-Party Elementary Function Computation Protocols 被引量:1
12
作者 Wenjun Luo Xiang Li 《通讯和计算机(中英文版)》 2005年第5期32-40,共9页
关键词 安全系统 操作系统 基础功能 计算机设备安全
下载PDF
Tourism Destination Eco-Security and Its Dynamic Evaluation Method 被引量:1
13
作者 SU Qiaolan 《Journal of Landscape Research》 2013年第Z1期35-37,40,共4页
Ecological security of tourism destination is an important factor for the sustainable development of tourism industry, and many tourism destinations are threatened by various ecological problems. A complete understand... Ecological security of tourism destination is an important factor for the sustainable development of tourism industry, and many tourism destinations are threatened by various ecological problems. A complete understanding of eco-security situation is the foundation of maintaining sustainable development for tourism destinations. However, study on tourism destination eco-security has remained in the initial stage, based on domestic and international researches, the connotations and dynamic characteristics of tourism destination eco-security were discussed. Then, evaluation method of tourism destination eco-security and standard system were proposed, also dynamic evaluation method of tourism destination eco-safety based on the situation evaluation and trend was analyzed. 展开更多
关键词 TOURIsM DEsTINATION Eco-security P-s-R MODE DYNAMIC EVALUATION
下载PDF
China's Labor and Social Security Protection under the Globle Financial Crisis 被引量:1
14
作者 SHI MEIXIA Professor of School of Economics and Management of Beijing Jiaotong University 《The Journal of Human Rights》 2011年第1期14-16,共3页
Against the background of economic globalization, the economy of many countries has been inevitably affected by the globle financial crisis. But the impact varies. China, as one of the leading countries in globalizati... Against the background of economic globalization, the economy of many countries has been inevitably affected by the globle financial crisis. But the impact varies. China, as one of the leading countries in globalization, the direct or indirect impact it suffered can be imagined. The Chinese government adopted a series of measures to deal with the financial crisis. 展开更多
关键词 security China’s Labor and social security Protection under the Globle Financial Crisis
下载PDF
严格可证明安全的两方协同SM2签名协议
15
作者 程一帆 刘擎宇 +1 位作者 梁泽宇 于昇 《电子学报》 EI CAS CSCD 北大核心 2024年第2期540-549,共10页
SM2签名算法自提出后得到了广泛的应用,其中电子合同是一个典型的应用场景.用户在使用电子合同服务签约时,由于单个用户抗攻击能力较弱,存在严重的私钥泄露风险,因此往往将私钥托管在服务商的云端服务器上.但是这又涉及对服务商的信任问... SM2签名算法自提出后得到了广泛的应用,其中电子合同是一个典型的应用场景.用户在使用电子合同服务签约时,由于单个用户抗攻击能力较弱,存在严重的私钥泄露风险,因此往往将私钥托管在服务商的云端服务器上.但是这又涉及对服务商的信任问题,甚至直接影响电子合同的合法性.为了解决这个两难问题,我们基于同态加密的思想提出了一种两方协同SM2签名协议,用户和服务商协同生成并保存各自的私钥分片,在使用时通过线上交互的方式合作生成签名,从而同时解决安全和信任问题.我们发现,现有的两方协同SM2签名协议的安全性都存在问题或者错误,就我们所知,本协议是第一个严格可证明安全的两方协同SM2签名协议. 展开更多
关键词 sM2协同签名 可证明安全 电子合同 同态加密 安全多方计算
下载PDF
GDI and GSI: China’s New Propositions for Global Governance
16
作者 Ouyang Xiangying 《China Economist》 2024年第5期107-116,共10页
In the post-pandemic era,the global economic and security landscapes are fraught with complexities and uncertainties.Among them,four risk flashpoints merit attention:Certain countries are raising interest rates to sub... In the post-pandemic era,the global economic and security landscapes are fraught with complexities and uncertainties.Among them,four risk flashpoints merit attention:Certain countries are raising interest rates to subdue inflation,despite their already high levels of debt;the bulk commodities market is experiencing volatility,leading to global turbulence and change;trade protectionism is at the forefront of major-power rivalry in political and economic spheres;and regional security crises are compounding international tensions.Behind those flashpoints are contradictions that obstruct world peace and progress,including development imbalances,governance gaps,and structural tensions in global security.In the face of uncertainties,it is crucial for China to seize strategic opportunities and transform crises into favorable situations.China has launched the Global Development Initiative(GDI)and the Global Security Initiative(GSI)to contribute to global prosperity and security.The two initiatives demonstrate China’s commitment to addressing global deficits in peace,development,security,and governance. 展开更多
关键词 Global Development Initiative(GDI) Global security Initiative(GsI) China’s approach to global governance Ukraine crisis China-Russia relationship
下载PDF
Scientific and Technological Innovation Is an Important Approach to Ensuring China’s Oil Security
17
作者 Liu Qianru Wang Jianyong 《Petroleum Science》 SCIE CAS CSCD 2006年第4期74-77,共4页
With the rapid and continual growth of national economy, the gap between oil demand and supply keeps widening in China, therefore China will increasingly depend on imported oil. However, the world's oil and gas resou... With the rapid and continual growth of national economy, the gap between oil demand and supply keeps widening in China, therefore China will increasingly depend on imported oil. However, the world's oil and gas resources are unevenly distributed; global world's oil prices remain high; and over 70 percent of China's imported oil has to be shipped through the Malacca Strait. There are various ways to ensure China's oil security today, and the practical and feasible strategic option is to increase the discovery and production of domestic oil, raise energy efficiency and develop petroleum substitutes. Scientific and technological innovation is crucial both in new oil reserves discovery and production, energy conservation, and in the development of petroleum substitutes, establishment of a strategic oil reserve system and for environment protection. This indicates that China should take effective measures in investment strategy, fiscal policies, financing instruments, intellectual property protection, fostering talents and professionals, so as to establish its own scientific and technological innovation system in the petroleum industry and be better able to ensure oil security. 展开更多
关键词 China's economy oil security scientific and technological innovation energy conservation energy intensity
下载PDF
Assessment of Ecosystems Damages Caused by Russian War against Ukraine
18
作者 Yevhen Bezsonov 《Open Journal of Ecology》 2024年第10期754-788,共35页
The question of the impact of war on ecosystems still remains secondary in the internal and external policy of states, society and the agenda of international organizations. From the point of view of losses in monetar... The question of the impact of war on ecosystems still remains secondary in the internal and external policy of states, society and the agenda of international organizations. From the point of view of losses in monetary terms, the values of ecosystem damages obtained in the work, which are a consequence of the impact of hostilities on the environment, correspond to the annual budgets of the largest countries in the world or exceed them. The presented calculations significantly exceed the known normative methods, the use of which in the conditions of war is limited in space and time. Objective difficulties associated with the uncertainty of many processes of the development of ecological systems and their reaction to the multifactorial impact of war are also significant limitations. Therefore, as part of the study, a method of assessing the impact of war on the environment is proposed, which is based on the patterns of energy flows in ecosystems from the moment it is binding by producers. This made it possible to take into account in the calculations the principle of functional integrity of the ecological system, according to which the destruction or damage of the components of a functionally whole environment will necessarily cause negative phenomena in the development of ecological systems. The results are presented in the form of real values of ecological losses in energy and monetary equivalents, as consequences of the loss of ecosystem services. As the results of the research show, the minimum amount of damage to ecosystems from Russian tanks is 43,500 USD per day. Environmental damage from Russian fighter jets has been estimated at $1.5 billion per week since the start of the war. Noise from military operations causes losses of at least 2.3 billion US dollars per year. The obtained results create prerequisites for improving the system of ensuring environmental safety at the local, state, and international levels and transferring the obtained solutions into safety-shaping practice. 展开更多
关键词 Ecosystem services Damage Assessment Environmental security Russia’s War against Ukraine
下载PDF
基于JSR 269的安全多方计算编译器
19
作者 刘芹 汪鹏程 +1 位作者 崔竞松 涂航 《计算机应用与软件》 北大核心 2024年第7期302-308,共7页
随着多种通用安全多方计算协议的提出,在这些协议上构建的框架、领域特定语言层出不穷,但都有着易用性差、现有编程语言难以交互等问题。因此,针对这些问题,设计一种基于JSR 269的安全多方计算编译器构建方案。该方案将经过了安全多方... 随着多种通用安全多方计算协议的提出,在这些协议上构建的框架、领域特定语言层出不穷,但都有着易用性差、现有编程语言难以交互等问题。因此,针对这些问题,设计一种基于JSR 269的安全多方计算编译器构建方案。该方案将经过了安全多方计算相关的注解标注的Java源代码,通过编译器插件编译为安全多方计算应用,并且可以和Java语言进行交互。通过实验及结果分析,该方案可保留Java语言的高级语言特性,以高度抽象的方式进行安全多方计算应用逻辑的编写。 展开更多
关键词 JsR 269 安全多方计算 编译器
下载PDF
Check Point新安全加速模块整合Security Core技术
20
《电信科学》 北大核心 2012年第6期124-124,共1页
全球互联网安全领域首屈一指的Check Point软件技术有限公司日前宣布,推出一款新的安全加速模块(securitv acceleration module),旨在满足客户对高性能和低时延环境的独特需求。安全加速模块采用Check Point先进的Security Core技... 全球互联网安全领域首屈一指的Check Point软件技术有限公司日前宣布,推出一款新的安全加速模块(securitv acceleration module),旨在满足客户对高性能和低时延环境的独特需求。安全加速模块采用Check Point先进的Security Core技术,帮助客户防火墙实现高达110Gbit/s的吞吐量和不到5μs的时延,从而实现业界性能最高的双架单元防火墙。 展开更多
关键词 security 互联网安全 CHECK Point 软件技术 模块 10GBIT/s 客户防火墙
下载PDF
上一页 1 2 124 下一页 到第
使用帮助 返回顶部