期刊文献+
共找到14篇文章
< 1 >
每页显示 20 50 100
牛传染性鼻气管炎病毒DNA的限制性酶切分析 被引量:9
1
作者 童光志 封启民 +3 位作者 王玫 李昌琳 王柳 张瑞珍 《中国畜禽传染病》 CSCD 1993年第5期50-51,共2页
分离自不同种、不同部位的6种牛传染性鼻气管炎病毒(IBRV)毒株经限制罂内切酶 EcoRⅠ、HindⅢ、RstⅠ和 SmalⅠ消化分析后呈现3种酶切电泳图.2株分离自精液的病毒(美精株和洛精株)4种酶切电泳图完全相同;Bartha Nu/67株与美精株和洛精... 分离自不同种、不同部位的6种牛传染性鼻气管炎病毒(IBRV)毒株经限制罂内切酶 EcoRⅠ、HindⅢ、RstⅠ和 SmalⅠ消化分析后呈现3种酶切电泳图.2株分离自精液的病毒(美精株和洛精株)4种酶切电泳图完全相同;Bartha Nu/67株与美精株和洛精株仅在 EcoRⅠ酶切图谱上有微小差异(一个酶切位点的变化),其它3种酶切图也完全相同。分离自水牛的 B7株与其它5种病毒DNA 的酶切图谱差异十分显著。2株分离自呼吸道的病毒(IBR-125和 LA 侏)与其它几株病毒差异也较明显,但二者之间也有一定的差异。 展开更多
关键词 牛病 传安性 鼻气管炎 病毒 分析
下载PDF
Protocol for Trusted Channel Based on Portable Trusted Module 被引量:1
2
作者 张大伟 韩臻 +2 位作者 蒋逸尘 杜晔 黎妹红 《China Communications》 SCIE CSCD 2013年第11期1-14,共14页
Web-based e-commerce applications need a trusted channel,which provides confidential communication,identity authentication and integrity assurance of endpoints,to guarantee the security of electronic transactions.A us... Web-based e-commerce applications need a trusted channel,which provides confidential communication,identity authentication and integrity assurance of endpoints,to guarantee the security of electronic transactions.A user-oriented trusted computing system based on Portable Trusted Module(PTM)is presented.Remote attestation is incorporated into Transport Layer Security(TLS)handshake protocol based on PTM so as to establish a trusted channel between two endpoints in network.This protocol can resist masquerading,trusted path and runtime attacks and propagate the trust in the computing system to the end user effectively.The test results of our proof-of-concept prototype show that our protocol for trusted channel is feasible for deployment in e-commerce applications on the Internet. 展开更多
关键词 trusted computing trusted module remote attestation transport layer security
下载PDF
Cluster Based Secure Dynamic Keying Technique for Heterogeneous Mobile Wireless Sensor Networks 被引量:1
3
作者 Thiruppathy Kesavan.V Radhakrishnan.S 《China Communications》 SCIE CSCD 2016年第6期178-194,共17页
In Heterogeneous Wireless Sensor Networks, the mobility of the sensor nodes becomes essential in various applications. During node mobility, there are possibilities for the malicious node to become the cluster head or... In Heterogeneous Wireless Sensor Networks, the mobility of the sensor nodes becomes essential in various applications. During node mobility, there are possibilities for the malicious node to become the cluster head or cluster member. This causes the cluster or the whole network to be controlled by the malicious nodes. To offer high level of security, the mobile sensor nodes need to be authenticated. Further, clustering of nodes improves scalability, energy efficient routing and data delivery. In this paper, we propose a cluster based secure dynamic keying technique to authenticate the nodes during mobility. The nodes with high configuration are chosen as cluster heads based on the weight value which is estimated using parameters such as the node degree, average distance, node's average speed, and virtual battery power. The keys are dynamically generated and used for providing security. Even the keys are compromised by the attackers, they are not able to use the previous keys to cheat or disuse the authenticated nodes. In addition, a bidirectional malicious node detection technique is employed which eliminates the malicious node from the network. By simulation, it is proved that the proposed technique provides efficient security with reduced energy consumption during node mobility. 展开更多
关键词 CLUSTER dynamic key HETEROGENEOUS MOBILITY wireless sensor network WEIGHT
下载PDF
Key-insulated encryption based group key management for wireless sensor network 被引量:2
4
作者 邱卫东 周耀伟 +2 位作者 朱博 郑燕飞 龚征 《Journal of Central South University》 SCIE EI CAS 2013年第5期1277-1284,共8页
The key exposure problem is a practical threat for many security applications. In wireless sensor networks (WSNs), keys could be compromised easily due to its limited hardware protections. A secure group key managemen... The key exposure problem is a practical threat for many security applications. In wireless sensor networks (WSNs), keys could be compromised easily due to its limited hardware protections. A secure group key management scheme is responsible for secure distributing group keys among valid nodes of the group. Based on the key-insulated encryption (KIE), we propose a group key management scheme (KIE-GKMS), which integrates the pair-wise key pre-distribution for WSN. The KIE-GKMS scheme updates group keys dynamically when adding or removing nodes. Moreover, the security analysis proves that the KIE-GKMS scheme not only obtains the semantic security, but also provides the forward and backward security. Finally, the theoretical analysis shows that the KIE-GKMS scheme has constant performance on both communication and storage costs in sensor nodes. 展开更多
关键词 wireless sensor network data encryption group key management forward security key-insulated encryption
下载PDF
A Multi-homed VPN Architecture Based on Extended SOCKS+TLS Protocols
5
作者 张宝良 胡汉平 陈翔 《Journal of Shanghai Jiaotong university(Science)》 EI 2005年第3期250-255,共6页
A multi-homed VPN architecture based on extended SOCKSv5 and TLS was proposed. The architecture employs a dynamic connection mechanism for multiple proxies in the end system,i n which the security-demanded transmissio... A multi-homed VPN architecture based on extended SOCKSv5 and TLS was proposed. The architecture employs a dynamic connection mechanism for multiple proxies in the end system,i n which the security-demanded transmission connections can switch smoothly among the multiple proxies by maint aining a coherent connection context.The mechanism is transparent to application programs and can support th e building of VPN.With the cooperation of some other security components,the mechanism guarantees the reso urce availability and reliability of the end system against some attacks to the specific ports or hosts. 展开更多
关键词 multi-homed SOCKSv5 security connection context virtual private network (VPN)
下载PDF
A numerical simulation of the influence initial temperature has on the propagation characteristics of, and safe distance from, a gas explosion 被引量:12
6
作者 Jiang Bingyou Lin Baiquan +3 位作者 Shi Shulei Zhu Chuanjie tiu Qian Zhai Cheng 《International Journal of Mining Science and Technology》 SCIE EI 2012年第3期307-310,共4页
A model roadway with a cross-sectional area of 80 mm 80 mm and a length of 100 m was used to estimate the overpressure, the temperature, the density, and the combustion rate during an explosion. Auto-ReaGas software w... A model roadway with a cross-sectional area of 80 mm 80 mm and a length of 100 m was used to estimate the overpressure, the temperature, the density, and the combustion rate during an explosion. Auto-ReaGas software was used for the calculations and the initial temperatures were 248, 268, 308, or 328 K. The methaneair mixture had a fuel concentration of 9.5% and the tunnel had a filling ratio of 10%. The results show that the safe distance necessary to avoid harm from the shock wave increases with increasing initial temperature. The distance where the peak overpressure begins to rise, and where the maximum value occurs, increases as the initial temperature increases. These are almost linear functions of the initial temperature. At locations before shock wave attenuation has occurred increasing the initial temperature linearly increases the maximum temperature at each point following along the tunnel. At the same time, the peak overpressure, the maximum density, and the maximum combustion rate decrease linearly. How-ever, after the shock wave has attenuated the attenuation extent of the peak overpressure decreases with an increase in initial temperature. The influence of the initial temperature on the explosion propagation depends on the combined effects of inhibiting and enhancing factors. The research results can provide a theoretical guidance for gas explosion disaster relief and treatment in underground coal mines. 展开更多
关键词 Initial temperatureGas explosionShock waveSafety distanceNumerical simulation
下载PDF
Chaotic synchronization based on nonlinear state-observer and its application in secure communication
7
作者 CHENMing-jie LIDian-pu ZHANGAi-jun 《Journal of Marine Science and Application》 2004年第1期64-70,共7页
Chaotic synchronization is a branch of chaotic control. Nowadays, the research and application of chaotic synchronization have become a hot topic and one of the development directions is for the research on chaos. In ... Chaotic synchronization is a branch of chaotic control. Nowadays, the research and application of chaotic synchronization have become a hot topic and one of the development directions is for the research on chaos. In this paper, a universal nonlinear stateobserver is presented for a class of universal chaotic systems to realize the chaotic synchronization, according to the theory of state-observer in the modern control theory. And theoretic analysis and simulation results have illustrated the validity of the approach. Moreover, the approach of synchronization proposed in this paper is very easy, flexible and universal with high synchronization precision.When the approach is applied to secure communication, the results are satisfying. 展开更多
关键词 chaotic synchronization nonlinear stoLe-observer synchronization error secure communication
下载PDF
A Secure-Efficient Data Collection Algorithm Based on Self-Adaptive Sensing Model in Mobile Internet of Vehicles 被引量:1
8
作者 LIANG Wei RUAN Zhiqiang +1 位作者 TANG Mingdong LI Peng 《China Communications》 SCIE CSCD 2016年第2期121-129,共9页
Existing research on data collection using wireless mobile vehicle network emphasizes the reliable delivery of information.However,other performance requirements such as life cycle of nodes,stability and security are ... Existing research on data collection using wireless mobile vehicle network emphasizes the reliable delivery of information.However,other performance requirements such as life cycle of nodes,stability and security are not set as primary design objectives.This makes data collection ability of vehicular nodes in real application environment inferior.By considering the features of nodes in wireless IoV,such as large scales of deployment,volatility and low time delay,an efficient data collection algorithm is proposed for mobile vehicle network environment.An adaptive sensing model is designed to establish vehicular data collection protocol.The protocol adopts group management in model communication.The vehicular sensing node in group can adjust network sensing chain according to sensing distance threshold with surrounding nodes.It will dynamically choose a combination of network sensing chains on basis of remaining energy and location characteristics of surrounding nodes.In addition,secure data collection between sensing nodes is undertaken as well.The simulation and experiments show that the vehicular node can realize secure and real-time data collection.Moreover,the proposed algorithm is superior in vehicular network life cycle,power consumption and reliability of data collection by comparing to other algorithms. 展开更多
关键词 wireless vehicle network datacollection protocol network sensing chain self'-adaptive sensing sensing distance threshold.
下载PDF
A Protocol for Bidirectional Quantum Secure Communication Based on Genuine Four-Particle Entangled States
9
作者 高干 王丽萍 《Communications in Theoretical Physics》 SCIE CAS CSCD 2010年第9期447-451,共5页
By swapping the entanglement of genuine four-particle entangled states,we propose a bidirectional quantumsecure communication protocol.The biggest merit of this protocol is that the information leakage does not exist.... By swapping the entanglement of genuine four-particle entangled states,we propose a bidirectional quantumsecure communication protocol.The biggest merit of this protocol is that the information leakage does not exist.Inaddition,the ideas of the 'two-step' transmission and the block transmission are employed in this protocol.In order toanalyze the security of the second sequence transmission,decoy states are used. 展开更多
关键词 Jbidirectional quantum secure communication x-type state information leakage
下载PDF
Node cooperation based location secure verification algorithm in wireless sensor networks localization 被引量:2
10
作者 唐弢 Guo Qing +1 位作者 Li Hanqing Peng Bao 《High Technology Letters》 EI CAS 2012年第4期376-381,共6页
For the application of wireless sensor networks in the military field, one of the main challenges is security. To solve the problem of verifying the location claim for a node, a new location verifica- tion algorithm c... For the application of wireless sensor networks in the military field, one of the main challenges is security. To solve the problem of verifying the location claim for a node, a new location verifica- tion algorithm called node cooperation based location secure verification (NCBLSV) algorithm is proposed. NCBLSV could verify malicious nodes by contrasting neighbor nodes and nodes under beam width angle using an adaptive array antenna at a base point. Simulation experiments are con- ducted to evaluate the performance of this algorithm by varying the communication range and the an- tenna beam width angle. Results show that NCBLSV algorithm has high probability of successful ma- licious nodes detection and low probability of false nodes detection. Thus, it is proved that the NCBLSV algorithm is useful and necessary in the wireless sensor networks security. 展开更多
关键词 wireless sensor networks WSNs) node localization SECURE position verifica-tion adaptive array antenna
下载PDF
Development of a Genetic Algorithm for Evaluating the Performance of Overhead Power Distribution Lines and Proposing Solutions to Improve Distribution Line Safety
11
作者 Fabio Romero Alden U. Antunes +4 位作者 Dario Takahata Andre Meffe Carlos C. B. Oliveira Femando L. Lange Hamilton Souza 《Journal of Energy and Power Engineering》 2015年第1期78-82,共5页
This paper aims to present and discuss the use of a power flow methodology based on Gauss elimination method to evaluate the performance of distribution network taking into account the neutral conductor absence at spe... This paper aims to present and discuss the use of a power flow methodology based on Gauss elimination method to evaluate the performance of distribution network taking into account the neutral conductor absence at specific sections, and a development of a methodology based on GA (genetic algorithm) capable of evaluating alternative solutions in different bars of the feeder, in order to propose appropriate solutions to improve the distribution network safety. Besides the technical aspects, the proposed GA methodology takes into account the economic feasibility analysis. The results of power flow simulations have shown that the presence of single-phase transformers along with the absence of the neutral conductor at specific sections of the MV (medium voltage) network may increase the Vng (neutral-to-ground voltage) levels of the feeders involved, jeopardizing the system's safety. On the other hand, the solutions proposed by the GA methodology may reduce the network Vng levels and improve the safety conditions, providing values close to the ones found before the neutral conductor theft. 展开更多
关键词 Genetic algorithm power flow distribution line safety power flow simulation
下载PDF
Real-Time Distributed Fiber Optic Sensor for Security Systems: Performance, Event Classification and Nuisance Mitigation 被引量:36
12
作者 Seedahmed S. MAHMOUD Yuvaraja VISAGATHILAGAR Jim KATSIFOLIS 《Photonic Sensors》 SCIE EI CAS 2012年第3期225-236,共12页
The success of any perimeter intrusion detection system depends on three important performance parameters: the probability of detection (POD), the nuisance alarm rate (NAR), and the false alarm rate (FAR). The ... The success of any perimeter intrusion detection system depends on three important performance parameters: the probability of detection (POD), the nuisance alarm rate (NAR), and the false alarm rate (FAR). The most fundamental parameter, POD, is normally related to a number of factors such as the event of interest, the sensitivity of the sensor, the installation quality of the system, and the reliability of the sensing equipment. The suppression of nuisance alarms without degrading sensitivity in fiber optic intrusion detection systems is key to maintaining acceptable performance. Signal processing algorithms that maintain the POD and eliminate nuisance alarms are crucial for achieving this. In this paper, a robust event classification system using supervised neural networks together with a level crossings (LCs) based feature extraction algorithm is presented for the detection and recognition of intrusion and non-intrusion events in a fence-based fiber-optic intrusion detection system. A level crossings algorithm is also used with a dynamic threshold to suppress torrential rain-induced nuisance alarms in a fence system. Results show that rain-induced nuisance alarms can be suppressed for rainfall rates in excess of 100mm/hr with the simultaneous detection of intrusion events. The use of a level crossing based detection and novel classification algorithm is also presented for a buried pipeline fiber optic intrusion detection system for the suppression of nuisance events and discrimination of intrusion events. The sensor employed for both types of systems is a distributed bidirectional fiber-optic Mach-Zehnder (MZ) interferometer. 展开更多
关键词 Adaptive level crossings fiber optic sensor intrusion detection nuisance alarm
原文传递
Key Rate of Practical Quantum Communication Network
13
作者 黄娜 焦荣珍 《Communications in Theoretical Physics》 SCIE CAS CSCD 2017年第8期201-205,共5页
The security properties of quantum key distribution(QKD) system are analyzed with the practical light source using decoy state method. The secure key rate with the change of transmission distance is computed under the... The security properties of quantum key distribution(QKD) system are analyzed with the practical light source using decoy state method. The secure key rate with the change of transmission distance is computed under the condition of ideal system, infinite light source system, untrusted light source and passive system. The influence of the fluctuation of transmission rate on the security characteristics of the system is discussed. Our numerical simulation results offer a useful reference for the practical QKD experiment. 展开更多
关键词 quantum key distribution decoy state untrusted source statistical fluctuation
原文传递
Lithium-ion spontaneous exchange and synergistic transport in ceramic-liquid hybrid electrolytes for highly efficient lithium-ion transfer
14
作者 Kai Shi Likun Chen +11 位作者 Zipei Wan Jie Biao Guiming Zhong Xue Li Lu Yang Jiabin Ma Wei Lv Fuzeng Ren Hongqi wang Yong Yang Feiyu Kang Yan-Bing He 《Science Bulletin》 SCIE EI CSCD 2022年第9期946-954,M0004,共10页
Ceramic electrolytes are important in ceramic-liquid hybrid electrolytes(CLHEs),which can effectively solve the interfacial issues between the electrolyte and electrodes in solid-state batteries and provide a highly e... Ceramic electrolytes are important in ceramic-liquid hybrid electrolytes(CLHEs),which can effectively solve the interfacial issues between the electrolyte and electrodes in solid-state batteries and provide a highly efficient Li-ion transfer for solid–liquid Li metal batteries.Understanding the ionic transport mechanisms in CLHEs and the corresponding role of ceramic electrolytes is crucial for a rational design strategy.Herein,the Li-ion transfer in the ceramic electrolytes of CLHEs was confirmed by tracking the 6Li and 7Li substitution behavior through solid-state nuclear magnetic resonance spectroscopy.The ceramic and liquid electrolytes simultaneously participate in Li-ion transport to achieve highly efficient Li-ion transfer in CLHEs.A spontaneous Li-ion exchange was also observed between ceramic and liquid electrolytes,which serves as a bridge that connects the ceramic and liquid electrolytes,thereby greatly strengthening the continuity of Li-ion pathways in CLHEs and improving the kinetics of Li-ion transfer.The importance of an abundant solid–liquid interface for CLHEs was further verified by the enhanced electrochemical performance in LiFePO4/Li and LiNi0.8Co0.1Mn0.1O2/Li batteries from the generated interface.This work provides a clear understanding of the Li-ion transport pathway in CLHEs that serves as a basis to build a universal Li-ion transport model of CLHEs. 展开更多
关键词 Ceramic-liquid hybrid electrolyte Ceramic electrolyte Liquid electrolyte Li-ion exchange Li-ion transfer pathway
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部