期刊文献+
共找到7篇文章
< 1 >
每页显示 20 50 100
保密字与签名
1
作者 孙春秋 吴士华 《中文信息》 1992年第1期70-71,共2页
关键词 保密字 签名 计算机安全
下载PDF
蓝牙技术的安全认证机制 被引量:3
2
作者 王浩鸣 《无线电工程》 2002年第4期37-40,共4页
该文以分析蓝牙技术的特点为切入点,介绍了蓝牙技术保密字的产生与管理过程,并通过一个应用实例说明了蓝牙技术提供的优良的安全性能及其巨大的市场。
关键词 蓝牙技术 安全认证 机制 蓝牙 保密字 验证 无线链接技术 前向纠错技术 链接方式
下载PDF
CMOS常见故障排除法
3
作者 孙玉珠 《通化师范学院学报》 1998年第8期5-5,共1页
微机上的CMOS存贮器在主机处于开机状态时,由主机箱内的电源为其提供5伏的直流电.由于CMOS是一种易失性的存贮器,因此当主机处于关机状态时,CMOS需要一个5伏的锂电池供电,才能确保CMOS中存贮的数据不会丢失.
关键词 故障排除法 CMOS存贮器 保密字 微机系统 电池电压 易失性 直流电 广播电视大学 开关键 主机箱
下载PDF
信息保护的一种简易方法
4
作者 陈军 《惠州学院学报》 1997年第4期168-169,共2页
关键词 数据文件 保密字 信息保护 可执行文件 简易方法 程序文件 源程序 数据库文件 扩展名 授权者
下载PDF
Dynamics and circuit implementation of three simplified chaotic systems 被引量:1
5
作者 孙克辉 王艳丽 朱从旭 《Journal of Central South University》 SCIE EI CAS 2013年第3期663-669,共7页
To improve the performance of chaotic secure communication,three simplified chaotic systems with one variable parameter were investigated.Basic properties were analyzed including symmetry,dissipation and topological s... To improve the performance of chaotic secure communication,three simplified chaotic systems with one variable parameter were investigated.Basic properties were analyzed including symmetry,dissipation and topological structure.Complex dynamical behaviors of the systems including chaos and periodic orbits were verified by numerical simulations,Lyapunov exponents and bifurcation diagrams.Interestingly,the three systems were integrated in a common circuit,and their dynamical behaviors were easily observed by adjusting regulable resistors R28,R14 and R17,respectively,and the relations between the variable resistor and the system parameter were deduced.The circuit experiment results agree well with the simulation results.Finally,a secure communication scheme based on chaos shift keying(CSK) was presented,which lays an experiment foundation for chaotic digital secure communication. 展开更多
关键词 CHAOS single-parameter system circuit realization secure communication chaos shift keying
下载PDF
Enhancement in Ad hoc on Demand Distance Vector (AODV) Routing Protocol Security 被引量:2
6
作者 王翠荣 杨孝宗 高远 《Journal of Donghua University(English Edition)》 EI CAS 2005年第3期18-22,共5页
Ad-hoc networking has mainly been associated with military battlefield networks. Security has received considerably less attention and the issue needs to be addressed before any successful applications will appear. Du... Ad-hoc networking has mainly been associated with military battlefield networks. Security has received considerably less attention and the issue needs to be addressed before any successful applications will appear. Due to the insecure nature of the wireless link and their dynamically changing topology, wireless ad-hoc networks require a careful and security-oriented approach for designing routing protocols. In this paper, an AODV-based secure routing protocol- ENAODV is presented. A speed-optimized digital signature algorithm is integrated into the routing protocol. The protocol algorithm is implemented with NS-2. The security of the protocol is analyzed. The simulating results show that the performances of ENAODV protocol, such as average node energy consumption, packet delay and packet delivery is nearly the same as standard AODV protocol. 展开更多
关键词 act-hoc network secure routing protocol Blowfish Cryptography digital signature
下载PDF
Music Protection Based on Digital Watermarking and Encryption
7
作者 徐常凯 王耀才 《Journal of China University of Mining and Technology》 2003年第1期60-65,共6页
Two fast and robust digital watermarking schemes for compressed music format and MIDI format are put forward, which are suitable for on-line distribution through the Internet. For compressed music, the watermark is em... Two fast and robust digital watermarking schemes for compressed music format and MIDI format are put forward, which are suitable for on-line distribution through the Internet. For compressed music, the watermark is embedded in partially uncompressed domain and the embedding scheme is closely related to music content. For MIDI, the watermark is embedded in virtual notes that are generated and randomly hide among the MIDI notes. This paper also presents a method for controlling usage and protecting against copying of digital music contents and their associated players. The digital music contents and their players installed in one computer cannot be used if they are copied to another computer. Even in the same computer, the duplicated digital music contents are not usable. The usage associated to the music content will restrict the running time and times. Also the music can be played and it will be automatically updated after each playing. The digital music cannot be accessible if its permitted usage expires. 展开更多
关键词 digital watermarking ENCRYPTION copy protection usage control security key digital music
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部