期刊文献+
共找到7篇文章
< 1 >
每页显示 20 50 100
天津市组织机构代码管理办法
1
《质量监督与消费》 2003年第4期10-11,共2页
关键词 天津市组织机构代码管理办法 质量技术监督 代码工作 《代码证》
下载PDF
Authentication masking code against DoS of T-MAC protocol 被引量:2
2
作者 SON Young-ho HONG Jin-keun BAE Keun-sung 《Journal of Central South University》 SCIE EI CAS 2013年第7期1889-1895,共7页
Security vulnerability of denial of service (DoS) in time out-medium access control (T-MAC) protocol was discussed and analysis of power consumption at each stage of T-MAC protocol was carried out. For power efficient... Security vulnerability of denial of service (DoS) in time out-medium access control (T-MAC) protocol was discussed and analysis of power consumption at each stage of T-MAC protocol was carried out. For power efficient authentication scheme which can provide reliability, efficiency, and security for a general T-MAC communication, a novel synchronization and authentication scheme using authentication masking code was proposed. Authentication data were repeated and masked by PN sequence. The simulation results show that the proposed approach can provide synchronization and authentication simultaneously for nodes in wireless sensor network (WSN). 63 bits AMC code gives above 99.97% synchronization detection and 93.98% authentication data detection probability in BER 0.031 7. 展开更多
关键词 time out-medium access control (T-MAC) security vulnerability AUTHENTICATION SYNCHRONIZATION authenticationmasking code
下载PDF
Strategic information perception methods and practices in the open source intelligence 被引量:1
3
作者 曾文 Li Hui 《High Technology Letters》 EI CAS 2018年第3期330-336,共7页
Open source intelligence is one of the most important public data sources for strategic information analysis. One of the primary and core issues of strategic information research is information perception,so this pape... Open source intelligence is one of the most important public data sources for strategic information analysis. One of the primary and core issues of strategic information research is information perception,so this paper mainly expounds the perception method for strategic information perception in the open source intelligence environment as well as the framework and basic process of information perception. This paper argues that in order to match the information perception result with the information depiction result,it conducts practical exploration for the results of information acquisition,perception,depiction and analysis. This paper introduces and develops a monitoring platform for information perception. The results show that the method proposed in this paper is feasible. 展开更多
关键词 open source intelligence (OSINT) open source information (OSIF) information perception methods and practices INFORMATION science and technology
下载PDF
Research on the Security of the United Storage Network Based on NAS
4
作者 黄建忠 《Journal of Chongqing University》 CAS 2004年第2期48-53,共6页
A multi-user view file system (MUVFS) and a security scheme are developed to improve the security of the united storage network (USN) that integrates a network attached storage (NAS) and a storage area network (SAN). ... A multi-user view file system (MUVFS) and a security scheme are developed to improve the security of the united storage network (USN) that integrates a network attached storage (NAS) and a storage area network (SAN). The MUVFS offers a storage volume view for each authorized user who can access only the data in his own storage volume, the security scheme enables all users to encrypt and decrypt the data of their own storage view at client-side, and the USN server needs only to check the users’ identities and the data’s integrity. Experiments were performed to compare the sequential read, write and read/write rates of NFS+MUVFS+secure_module with those of NFS. The results indicate that the security of the USN is improved greatly with little influence on the system performance when the MUVFS and the security scheme are integrated into it. 展开更多
关键词 multi-user view file system (MUVFS) storage area network (SAN) united storage network (USN) network attached storage (NAS) hashed message authentication code (HMAC)
下载PDF
Validation of the TASS/SMR-S Code for the Core Heat Transfer Model on the Steady Experimental Conditions
5
作者 In Sub Jun Kyoo Hwan Bae Young Jong Chung Won Jae Lee 《Journal of Energy and Power Engineering》 2012年第3期338-345,共8页
The SMART (System-integrated Modular Advanced ReacTor) which is a 330 MWt advanced integral PWR was developed by the KAERI (Korea Atomic Energy Institute) for electricity generation and seawater desalination. To e... The SMART (System-integrated Modular Advanced ReacTor) which is a 330 MWt advanced integral PWR was developed by the KAERI (Korea Atomic Energy Institute) for electricity generation and seawater desalination. To enhance its safety, the various design concepts were adopted such as the most containing of the RCS (reactor coolant system) components and a PRHRS (passive residual heat removal system). To ensure the safety and performance of the SMART, a thermal hydraulic evaluation and safety analysis are performed by the TASS/SMR-S code. It uses a one dimensional node/path modeling and point kinetics for the core power simulation. The code also has specific models reflecting the design features of the SMART such as a helical tube and PRHRS heat transfer models. In this study, the validation of the core heat transfer model in the TASS/SMR-S code on the steady conditions was performed with the Bennett's heated tube tests and THTF (thermal hydraulic test facility) experiment. From the results of the TASS/SMR-S code calculation, the CHF (critical heat flux) point and the fuel rod surface temperature were predicted conservatively compared to the test results. 展开更多
关键词 SMART TASS/SMR-S code core heat transfer model Bennett tube test THTF experiment.
下载PDF
Empirical analysis of network measures for predicting high severity software faults 被引量:4
6
作者 Lin CHEN Wanwangying MA +4 位作者 Yuming ZHOU Lei XU Ziyuan WANG Zhifei CHEN Baowen XU 《Science China Earth Sciences》 SCIE EI CAS CSCD 2016年第12期198-215,共18页
Network measures are useful for predicting fault-prone modules. However, existing work has not distinguished faults according to their severity. In practice, high severity faults cause serious problems and require fur... Network measures are useful for predicting fault-prone modules. However, existing work has not distinguished faults according to their severity. In practice, high severity faults cause serious problems and require further attention. In this study, we explored the utility of network measures in high severity faultproneness prediction. We constructed software source code networks for four open-source projects by extracting the dependencies between modules. We then used univariate logistic regression to investigate the associations between each network measure and fault-proneness at a high severity level. We built multivariate prediction models to examine their explanatory ability for fault-proneness, as well as evaluated their predictive effectiveness compared to code metrics under forward-release and cross-project predictions. The results revealed the following:(1) most network measures are significantly related to high severity fault-proneness;(2) network measures generally have comparable explanatory abilities and predictive powers to those of code metrics; and(3) network measures are very unstable for cross-project predictions. These results indicate that network measures are of practical value in high severity fault-proneness prediction. 展开更多
关键词 network measures high severity fault-proneness fault prediction software metrics
原文传递
On Constructing Certificateless Proxy Signature from Certificateless Signature
7
作者 万中美 来学嘉 +3 位作者 翁健 洪璇 龙宇 贾巍巍 《Journal of Shanghai Jiaotong university(Science)》 EI 2008年第6期692-694,共3页
In proxy signature schemes, an original signer A delegates its signing capability to a proxy signer B, in such a way that B can sign message on behalf of A.The recipient of the final message verifies at the same time ... In proxy signature schemes, an original signer A delegates its signing capability to a proxy signer B, in such a way that B can sign message on behalf of A.The recipient of the final message verifies at the same time that B computes the signature and that A has delegated its signing capability to B.Recently many identity-based(ID-based) proxy signature schemes have been proposed, however, the problem of key escrow is inherent in this setting.Certificateless cryptography can overcome the key escrow problem.In this paper, we present a general security model for certificateless proxy signature scheme.Then, we give a method to construct a secure certificateless proxy scheme from a secure certificateless signature scheme, and prove that the security of the construction can be reduced to the security of the original certificateless signature scheme. 展开更多
关键词 certificateless signature proxy signature certificateless proxy signature
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部