期刊文献+
共找到268篇文章
< 1 2 14 >
每页显示 20 50 100
《密码法》背景下工业互联网平台数据保护研究 被引量:2
1
作者 何小龙 柳彩云 +1 位作者 李俊 陈雪鸿 《中国信息安全》 2020年第4期75-77,共3页
工业互联网平台是一种面向制造业数字化、网络化、智能化需求,构建基于海量数据采集、汇聚、分析的服务体系,是支撑制造资源泛在连接、弹性供给、高效配置的工业云平台。当前,我国工业互联网平台迅速发展,涌现了东方国信Cloudiip、徐工... 工业互联网平台是一种面向制造业数字化、网络化、智能化需求,构建基于海量数据采集、汇聚、分析的服务体系,是支撑制造资源泛在连接、弹性供给、高效配置的工业云平台。当前,我国工业互联网平台迅速发展,涌现了东方国信Cloudiip、徐工信息Xrea、树根互联根云等大批优秀实践成果,这些平台在用户生态、开发者生态和数据生态构建中发挥了巨大作用,极大地推动了工业生产的智能化。 展开更多
关键词 工业互联网 密码技术 互联网平台 数据安全保护 《密码法》 密码应用 密码算法 信息安全技术 数据保护
下载PDF
密码化的中华文化(一)
2
作者 钟卓燊 《计算机安全》 2004年第9期78-80,共3页
序习作《密码化的中国文化》本已在2001年的《信息安全与保密通信》杂志第3、4、5期上连载过,承蒙《计算机安全》采编抬举,一再认定拙文还可“挖潜”,要求笔者深掘祖国文化宝藏,续写前文。然恨江郎才尽,虽是面对浩瀚的中华文化知识海洋... 序习作《密码化的中国文化》本已在2001年的《信息安全与保密通信》杂志第3、4、5期上连载过,承蒙《计算机安全》采编抬举,一再认定拙文还可“挖潜”,要求笔者深掘祖国文化宝藏,续写前文。然恨江郎才尽,虽是面对浩瀚的中华文化知识海洋,但对秦碑汉赋南北骈、唐诗宋词元曲明清小说等文学作品懵懂者多、涉及极少,更别说文化当中的其他领域了。正是囿于学浅才疏、少见寡闻,才难于以密码为题取舍、编序。只是两年多来经不住他们的再三督促,才勉为其难,赶鸭子上架,改成本篇。目的无非是想以笔者抛出之砖,引出造诣深厚的文人和密码专家之玉,以激发国人更加热爱民族文化之忱,从而光大我辉煌的中华文化。舛错讹误、鲁鱼亥豕之处,诚望指正。 展开更多
关键词 《密码化的中国文化》 计算机安全 信息安全 保密通信 文化事业
下载PDF
《密码学报》投稿指南
3
《密码学报》 CSCD 2019年第5期687-687,共1页
《密码学报》是中国密码学会主办的唯一学术期刊,主要刊载密码及相关领域的理论及应用最新研究成果、学术动态和发展趋势,促进密码学术交流和人才培养.《密码学报》现已被Scopus数据库、中国科学引文数据库、中国科技论文与引文数据库收... 《密码学报》是中国密码学会主办的唯一学术期刊,主要刊载密码及相关领域的理论及应用最新研究成果、学术动态和发展趋势,促进密码学术交流和人才培养.《密码学报》现已被Scopus数据库、中国科学引文数据库、中国科技论文与引文数据库收录.《密码学报》内容涵盖密码学及信息安全理论和应用的各个方面.主要包括:密码学基础(数学、信息论、计算机科学等)、对称密码学(分组密码、序列密码、Hash函数、MAC码等)、公钥密码学. 展开更多
关键词 《密码学报》 投稿指南 在线出版
下载PDF
密码趣事
4
作者 陈光平 《金融经济》 2000年第6期57-58,共2页
关键词 《密码趣事》 陈光平 重庆 当代 故事
下载PDF
密码时代
5
作者 陈勇 《年轻人(A版)》 2016年第3期79-79,共1页
这个世界上最可靠的一定不是凉嗖嗖的数字,而是处处都有温情的人心。
关键词 杂文 《密码时代》 中国 陈勇
下载PDF
密码的麻烦
6
作者 李维明 《华人时刊》 2004年第4期47-47,共1页
人们已经越来越依赖于密码来守护自己的秘密了。锁、存折,信用卡、电脑以及上网的账号都需要密码来作警卫了。不过密码多了,麻烦也随之而来,你得花时间背下那些呆板枯燥的数字。当然,你还得防着密码被居心叵测者破译。电脑网络上,使用... 人们已经越来越依赖于密码来守护自己的秘密了。锁、存折,信用卡、电脑以及上网的账号都需要密码来作警卫了。不过密码多了,麻烦也随之而来,你得花时间背下那些呆板枯燥的数字。当然,你还得防着密码被居心叵测者破译。电脑网络上,使用专门的软件,破解密码,钻出数字迷宫,对于高手来说,已是小菜一碟的事情。由此可知所谓拒人于“密码”门外,指的是你我一样的常人而已。 有了密码,存放其实也是个问题。日记本、工作笔记簿或者大脑,似乎都不是安全之地。据说有的小偷行窃,喜欢“ 展开更多
关键词 《密码的麻烦》 散文 批判精神 李维明
下载PDF
Analysis of Codon Usage Between Different Poplar Species 被引量:9
7
作者 周猛 童春发 施季森 《Journal of Genetics and Genomics》 SCIE CAS CSCD 北大核心 2007年第6期555-561,共7页
Codon usage is the selective and nonrandom use of synonymous codons to encode amino acids in genes for proteins. The analysis of codon usage may improve the understanding of cocion preferences between different specie... Codon usage is the selective and nonrandom use of synonymous codons to encode amino acids in genes for proteins. The analysis of codon usage may improve the understanding of cocion preferences between different species and allow to rebuild the codons of exogenous genes to increase the expression efficiency of exogenous genes, Here, codon DNA sequence (CDS) of four poplar species, including Populus tremuloides Michx., P. tomentosa Carr., P. deltoides Marsh., and P. trichocarpa Torr. & Gray., is used to analyze the relative frequency of synonymous codon (RFSC). High-frequency codons are selected by high-frequency (HF) codon analysis. The results indicate that the codon usage is common for all four poplar species and the codon preference is quite similar among the four poplar species. However, CCT encoding for Pro, and ACT coding for Thr are the preferred codons in P. tremuloides and P. tomentosa, whereas CCA coding for Pro, and ACA coding for Thr are preferred in P. deltoides and P. trichocarpa The codons such as TGC coding for Cys, TTC coding for Phe, and AAG coding for Lys, are preferred in the poplar species except P trichocarpa. GAG coding for Glu is preferred only in P deltoides, while the other three poplar species prefer to use GAA. The commonness of preferred codon allows exogenous gene designed by the preferred cocion of one of the different poplar species to be used in other poplar species. 展开更多
关键词 POPLAR codon usage high-frequency cocion codon preference
下载PDF
The Factors Shaping Synonymous Codon Usage in the Genome of Burkholderia mallei 被引量:4
8
作者 赵胜 张琴 +2 位作者 陈智华 赵益新 钟金城 《Journal of Genetics and Genomics》 SCIE CAS CSCD 北大核心 2007年第4期362-372,共11页
Burkholderia mallei is regarded as a potential biological weapon by the Centers for Disease Control and Prevention. In this study, the main factors shaping codon usage in the genome of B. mallei ATCC 23344 were firstl... Burkholderia mallei is regarded as a potential biological weapon by the Centers for Disease Control and Prevention. In this study, the main factors shaping codon usage in the genome of B. mallei ATCC 23344 were firstly reported. The results showed that the primary trend in codon usage variation in the B. mallei is due to translational selection; while compositional mutation bias is relatively the weaker influence and the hydrophobicity of each protein and gene length are only the minor influences. At the same time, 21 codons defined firstly as 'optimal codons' might provide more useful information for the expression of target genes and development of a vaccine to prevent glanders. 展开更多
关键词 Burkholderia mallei ATCC 23344 codon usage correspondence analysis
下载PDF
NEW REMOTE USER AUTHENTICATION SCHEME USING SMART CARD 被引量:2
9
作者 杨君佐 王永建 周渊 《Transactions of Nanjing University of Aeronautics and Astronautics》 EI 2012年第2期187-192,共6页
Because the modified remote user authentication scheme proposed by Shen, Lin and Hwang is insecure, the Shen-Lin-Hwang' s scheme is improved and a new secure remote user authentication scheme based on the bi- linear ... Because the modified remote user authentication scheme proposed by Shen, Lin and Hwang is insecure, the Shen-Lin-Hwang' s scheme is improved and a new secure remote user authentication scheme based on the bi- linear parings is proposed. Moreover, the effectiveness of the new scheme is analyzed, and it is proved that the new scheme can prevent from all kinds of known attack. The one-way hash function is effective in the new scheme. The new scheme is proved that it has high effectiveness and fast convergence speed. Moreover, the ap- plication of the new scheme is easy and operational. 展开更多
关键词 remote user authentication password authentication remote login bilinear pairings
下载PDF
DISTRIBUTIONS OF TRIPLET CODONS IN MESSENGER RNA SECONDARY STRUCTURES 被引量:1
10
作者 张静 顾宝洪 +1 位作者 彭守礼 刘次全 《Zoological Research》 CAS CSCD 1998年第5期350-358,共9页
Analysis of the secondary structures of mRNAs which encode mature peptides shows that the location of each codon in mRNA secondary structure has a trend, which appears to be in agreement with the conformational proper... Analysis of the secondary structures of mRNAs which encode mature peptides shows that the location of each codon in mRNA secondary structure has a trend, which appears to be in agreement with the conformational property of the corresponding amino acid to some extent. Most of the codons that encode hydrophobic amino acids are located in stable stem regions of mRNA secondary structures, and vice versa, most of the codons that encode hydrophilic amino acids are located in flexible loop regions. This result supports the recent conclusion that there may be the information transfer between the three dimensional structures of mRNA and the encoded protein. 展开更多
关键词 Triplet codon Amino acid mRNA secondary structure
下载PDF
Security of Application System 被引量:1
11
作者 李小平 钟宏 +5 位作者 丁俨 向智 胡海生 吴学林 张琦 朱建学 《Journal of Beijing Institute of Technology》 EI CAS 2002年第2期198-202,共5页
A safe and reliable application system frame based on Internet and Intranet for Stock Supervision and Administration Council of China is built up. An all sided, multi tier and multi technical security method has be... A safe and reliable application system frame based on Internet and Intranet for Stock Supervision and Administration Council of China is built up. An all sided, multi tier and multi technical security method has been adopted, which includes identity recognition, data encryption, digital signature, Domino and WWW servers, access control list, directory service, certificate authorization server, IC card and so on. The recognition system based on CA server is a high efficient, convenient and reliable system. The encryption technology and security method are proved to be reliable. The recognition system is of high security and is worthy of being popularized in some places where some special security requirements need meeting. Multi tier technology can improve the security of database. Double keys method is a useful data encryption method. 展开更多
关键词 INTERNET/INTRANET identity recognition data encryption digital signature security mechanism
下载PDF
Analysis of a Class of Logical Functions over Galois and Z_m Rings 被引量:1
12
作者 陈卫红 曾洪杰 《Chinese Quarterly Journal of Mathematics》 CSCD 2002年第4期105-110,共6页
In this paper, the author analyzed some cryptographic properties of a class of logical functions, f(x,y)=(q(x),...,q(x))·y+h(x),over Galois rings and residue rings, presented the relationship between the characte... In this paper, the author analyzed some cryptographic properties of a class of logical functions, f(x,y)=(q(x),...,q(x))·y+h(x),over Galois rings and residue rings, presented the relationship between the character spectrum of f(x,y) and the character speetrum of q(x),h(x) and the relationship between the cryptographic properties of f(x,y) and the cryptographic properties of h(x). 展开更多
关键词 logical function character spectrum cryptographic properties
下载PDF
Discriminant Classification Model of DNA Sequence 被引量:1
13
作者 王显金 阳军 《Agricultural Science & Technology》 CAS 2011年第6期781-784,共4页
[Objective] The research aimed to construct the discriminant classification model of DNA sequence by combining with the biology knowledge and the mathematical method.[Method] According to the polarity nature of side c... [Objective] The research aimed to construct the discriminant classification model of DNA sequence by combining with the biology knowledge and the mathematical method.[Method] According to the polarity nature of side chain radical in the amino acid,the classification information of amino acid which represented the sequence characteristic from the content and array situation of base was extracted from the different sequences that the amino acid content was different.The four-dimension vector was used to represent.Mahalanobis distance and Fisher discriminant methods were used to classify the given sequence.[Result] In the model,the back substitution rates of sample obtained by two kinds of classification methods were both 100%,and the consistent rate of classification was 90%.[Conclusion] In the model,the calculation method was simple,and the accuracy of classification result was higher.It was superior to the discriminant classification model which was only based on the base content. 展开更多
关键词 DNA sequence CODON Discriminant analysis FREQUENCY
下载PDF
Site discrepancy of synonymous codon usage in SARS coronavirus and other viruses in Coronaviridae
14
作者 周童 顾万君 +2 位作者 马建民 孙啸 陆祖宏 《Journal of Southeast University(English Edition)》 EI CAS 2005年第2期203-206,共4页
The synonymous codon usage in the translational initiation and termination regions of genes of severe acute respiratory syndrome (SARS) coronavirus and five other viruses in Coronaviridae was systematically analyzed.T... The synonymous codon usage in the translational initiation and termination regions of genes of severe acute respiratory syndrome (SARS) coronavirus and five other viruses in Coronaviridae was systematically analyzed.The results indicate that most minor codons for these coronaviruses are preferentially used in the initial and terminal region.The minor codons preferentially used in the initial region are thought to have a negative effect on gene expression,which can be explained by the minor codon modulator hypothesis.It also indicates that the minor codons preferentially used in the terminal region may regulate the level of gene expression.The proposed results strongly imply that the minor codon modulator hypothesis can be applied to both some bacteria and some viruses. 展开更多
关键词 codon usage severe acute respiratory syndrome (SARS) CORONAVIRUS gene expression site discrepancy
下载PDF
STRONGER PROVABLE SECURE MODEL FOR KEY EXCHANGE
15
作者 任勇军 王建东 +1 位作者 徐大专 庄毅 《Transactions of Nanjing University of Aeronautics and Astronautics》 EI 2009年第4期313-319,共7页
The key exchange is a fundamental building block in the cryptography. Several provable security models for the key exchange protocol are proposed. To determine the exact properties required by the protocols, a single ... The key exchange is a fundamental building block in the cryptography. Several provable security models for the key exchange protocol are proposed. To determine the exact properties required by the protocols, a single unified security model is essential, The eCK , eCK and CK models are examined and the result is proved that the eCK' model is the strongest provable security model for the key exchange. The relative security strength among these models is analyzed. To support the implication or non-implication relations among these models, the formal proofs and the counter-examples are given. 展开更多
关键词 network security CRYPTOGRAPHY information security key exchange protocol
下载PDF
Proxy signature scheme for ID-based original signers and certificate-based proxy signers
16
作者 辛向军 孙垒 《Journal of Southeast University(English Edition)》 EI CAS 2008年第3期318-321,共4页
To realize delegation between different users in a mixed cryptosystem,a proxy signature scheme for ID-based original signers and certificated-based proxy signers(PSS-ID-CER)is defined.Using the bilinear properties o... To realize delegation between different users in a mixed cryptosystem,a proxy signature scheme for ID-based original signers and certificated-based proxy signers(PSS-ID-CER)is defined.Using the bilinear properties of the pairings and the characters of key generations of certificate-based cryptosystems and ID-based cryptosystems,a construction for such a scheme is also presented.To prove the security of the proposed scheme,a general security model for this scheme under adaptive chosen-PKG,chosen-ID,chosen-delegation,chosen-ProxySigner-public-key,chosen-proxy-key and chosen-message attack is defined.The proposed scheme is provably secure under the random oracle model and the hardness assumption of computational Diffie-Hellman problem. 展开更多
关键词 proxy signature ID-based cryptosystem bilinear pairings
下载PDF
DNA Sequence Classification Based on the Side Chain Radical Polarity of Amino Acids
17
作者 王显金 《Agricultural Science & Technology》 CAS 2014年第5期751-755,共5页
The features of DNA sequence fragments were extracted from the distribution density of the condons in the individual cases of DNA sequence fragments. Based on the polarity of side chain radicals of amino acids molecul... The features of DNA sequence fragments were extracted from the distribution density of the condons in the individual cases of DNA sequence fragments. Based on the polarity of side chain radicals of amino acids molecules, the amino acids were classified into five categories, and the frequencies of these five categories were calculated. This kind of feature extraction based on the biological meanings not only took the content of basic groups into consideration, but also considered the marshal ing sequence of the basic groups. The hierarchical clustering analysis and BP neural network were used to classify the DNA sequence fragments. The results showed that the classification results of these two kinds of algo-rithms not only had high accuracy, but also had high consistence, indicating that this kind of feature extraction was superior over the traditional feature extraction which only took the features of basic groups into consideration. 展开更多
关键词 CODON FREQUENCY Hierarchical clustering analysis BP neural network
下载PDF
FORMAL PROOF OF RELATIVE STRENGTH OF SECURITY AMONG ECK2007 MODEL AND OTHER PROOF MODELS FOR KEY AGREEMENT PROTOCOLS 被引量:2
18
作者 夏金月 王建东 +2 位作者 方黎明 任勇军 卞仕柱 《Transactions of Nanjing University of Aeronautics and Astronautics》 EI 2008年第4期282-288,共7页
The differences among the extended Canetti & Krawezyk 2007 model (ECK2007) and other four models, i.e., the Bellare & Rogaway (1993, 1995)models (BR93,BR95), the Bellare, Pointcheval & Rogaway (2000) model ... The differences among the extended Canetti & Krawezyk 2007 model (ECK2007) and other four models, i.e., the Bellare & Rogaway (1993, 1995)models (BR93,BR95), the Bellare, Pointcheval & Rogaway (2000) model (BPR2000) and the Canetti & Krawczyk (2001) model (CK2001) are given. The relative strength of security among these models is analyzed. To support the implication or non-implication relation among these models, the formal proof or the counter-example is provided. 展开更多
关键词 CRYPTOGRAPHY security data key agreement protocol proof model
下载PDF
Analysis of Synonymous Codon Usage in Aeropyrum pernix K1 and Other Crenarchaeota Microorganisms 被引量:2
19
作者 江澎 孙啸 陆祖宏 《Journal of Genetics and Genomics》 SCIE CAS CSCD 北大核心 2007年第3期275-284,共10页
In this study, a comparative analysis of the codon usage bias was performed in Aeropyrum pernix K1 and two other phylogenetically related Crenarchaeota microorganisms (i.e., Pyrobaculum aerophilum str. IM2 and Sulfol... In this study, a comparative analysis of the codon usage bias was performed in Aeropyrum pernix K1 and two other phylogenetically related Crenarchaeota microorganisms (i.e., Pyrobaculum aerophilum str. IM2 and Sulfolobus acidocaldarius DSM 639). The results indicated that the synonymous codon usage in A. pernix K1 was less biased, which was highly correlated with the GC3s value. The codon usage patterns were phylogenetically conserved among these Crenarchaeota microorganisms. Comparatively, it is the species function rather than the gene function that determines their gene codon usage patterns. A. pernix K1, P. aerophilum str. IM2, and S. acidocaldarius DSM 639 live in differently extreme conditions. It is presumed that the hving environment played an important role in determining the codon usage pattern of these microorganisms. Besides, there was no strain-specific codon usage among these microorganisms. The extent of codon bias in A. pernix K1 and S. acidocaldarius DSM 639 were highly correlated with the gene expression level, but no such association was detected in P. aerophilum str. IM2 genomes. 展开更多
关键词 codon usage bias relative synonymous codon usage (RSCU) Aeropyrum pernix K1
下载PDF
Modified Benes network architecture for WiMAX LDPC decoder 被引量:1
20
作者 徐勐 吴建辉 张萌 《Journal of Southeast University(English Edition)》 EI CAS 2011年第2期140-143,共4页
A modified Benes network is proposed to be used as an optimal shuffle network in worldwide interoperability for microwave access (WiMAX) low density parity check (LDPC) decoders, When the size of the input is not ... A modified Benes network is proposed to be used as an optimal shuffle network in worldwide interoperability for microwave access (WiMAX) low density parity check (LDPC) decoders, When the size of the input is not a power of two, the modified Benes network can achieve the most optimal performance. This modified Benes network is non-blocking and can perform any sorts of permutations, so it can support 19 modes specified in the WiMAX system. Furthermore, an efficient algorithm to generate the control signals for all the 2 × 2 switches in this network is derived, which can reduce the hardware complexity and overall latency of the modified Benes network. Synthesis results show that the proposed control signal generator can save 25.4% chip area and the overall network latency can be reduced by 36. 2%. 展开更多
关键词 worldwide interoperability for microwave access(WiMAX) quasi-cycle low density parity check (QC-LDPC) LDPC decoder Benes network
下载PDF
上一页 1 2 14 下一页 到第
使用帮助 返回顶部