期刊文献+
共找到5篇文章
< 1 >
每页显示 20 50 100
保密通信网电路信息融合故障跟踪诊断系统 被引量:1
1
作者 宋建华 《自动化技术与应用》 2022年第9期90-94,共5页
传统电路故障跟踪诊断系统存在前期预警准确率低,电路输出信任度较低的问题。为此,设计通信网电路信息融合故障跟踪诊断系统。根据数据、特征、决策层次分别进行信息融合、诊断,使获取电路输出信任度最大化,即准确的完成故障跟踪诊断。... 传统电路故障跟踪诊断系统存在前期预警准确率低,电路输出信任度较低的问题。为此,设计通信网电路信息融合故障跟踪诊断系统。根据数据、特征、决策层次分别进行信息融合、诊断,使获取电路输出信任度最大化,即准确的完成故障跟踪诊断。通过采样模块、数据处理模块、中断服务模块等构成主程序流程,建立保密通信网电路信息融合故障跟踪诊断系统。结果表明,此系统实际应用性更强,故障诊断更精准。说明设计的系统具有较好的应用价值。 展开更多
关键词 通信网电路 信息融合 故障诊断 保密通信网
下载PDF
保密通信网的互连互通技术研究
2
作者 杨新 张建中 方关宝 《信息安全与通信保密》 1993年第2期22-24,59,共4页
本文探讨了保密通信网互连互通需要解决的问题,提出保密通信网络的密级分层结构是解决保密通信网互连互通的有效途径。采用密级分层结构,能够允许密级不同的保密通信网良好互连,密级不同的端用户系统顺利互通。这也是保密通信系统一体... 本文探讨了保密通信网互连互通需要解决的问题,提出保密通信网络的密级分层结构是解决保密通信网互连互通的有效途径。采用密级分层结构,能够允许密级不同的保密通信网良好互连,密级不同的端用户系统顺利互通。这也是保密通信系统一体化建设的必由之路。 展开更多
关键词 保密通信网 保密通信系统 互连网络 网络安全协议 端用户 网关设备 气隙法 网络互连 网络资源 安全保密
原文传递
Comment:Comments on “How to repair the Hill cipher”
3
作者 Y.RANGEL-ROMERO R.VEGA-GARCíA +7 位作者 A.MENCHACA-MéNDEZ D.ACOLTZI-CERVANTES L.MARTíNEZ-RAMOS M.MECATE-ZAMBRANO F.MONTALVO-LEZAMA J.BARRóN-VIDALES N.CORTEZ-DUARTE F.RODRíGUEZ-HENRíQUEZ 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2008年第2期211-214,共4页
A modification of the Hill cipher algorithm was recently proposed by Ismail et al.(2006),who claimed that their new scheme could offer more security than the original one due to an extra non-linearity layer introduced... A modification of the Hill cipher algorithm was recently proposed by Ismail et al.(2006),who claimed that their new scheme could offer more security than the original one due to an extra non-linearity layer introduced via an elaborated key gen-eration mechanism.That mechanism produces one different encryption key for each one of the plaintext blocks.Nevertheless,we show in this paper that their method still has severe security flaws whose weaknesses are essentially the same as that already found in the original Hill cipher scheme. 展开更多
关键词 Hill cipher Symmetric encryption Image encryption
下载PDF
A Password-Based Secure Communication Scheme in Battlefields for Internet of Things 被引量:1
4
作者 张华 高飞 +1 位作者 温巧燕 金正平 《China Communications》 SCIE CSCD 2011年第1期72-78,共7页
Mobile Ad hoc NETwork (MANET) is a part of the Internet of Things (IoT). In battlefield communication systems, ground soldiers, tanks, and unmanned aerial vehicles comprise a heterogeneous MANET. In 2006, Byun et ... Mobile Ad hoc NETwork (MANET) is a part of the Internet of Things (IoT). In battlefield communication systems, ground soldiers, tanks, and unmanned aerial vehicles comprise a heterogeneous MANET. In 2006, Byun et al. proposed the first constant-round password-based group key ex- change with different passwords for such net- works. In 2008, Nam et al. discovered the short- comings of the scheme, and modified it. But the works only provide the group key. In this paper, we propose a password-based secure communication scheme for the loT, which could be applied in the battlefield communication systems and support dy- namic group, in which the nodes join or leave. By performing the scheme, the nodes in the heteroge- neous MANET can realize secure broadcast, secure unicast, and secure direct communication across realms. After the analyses, we demonstrate that the scheme is secure and efficient. 展开更多
关键词 Internet of Things PASSWORD BROADCAST UNICAST direct communication across realms
下载PDF
Public key based uniform access framework in 3G systems
5
作者 王弈 谷大武 白英彩 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2006年第4期404-408,共5页
This paper compares two types of access methods in 3G telecommunication systems, registration based access method and alternative access method. Through analyzing their common ground, we establish a public-key based u... This paper compares two types of access methods in 3G telecommunication systems, registration based access method and alternative access method. Through analyzing their common ground, we establish a public-key based uniform access framework, which combines different access methods into one unified model and provides more scalability and flexibility. Then an improved wireless authentication protocol is introduced into the framework, which gives an example of how unification is obtained by using public key technology. Since original protocol has flaws, an improved one is proposed based on security investigation. Improved authentication protocol overcomes the weakness of the original one, and maintains all the security features owned by old protocol. Finally, the feasibility of this framework is analyzed with consideration of current development in mobile telecommunication fields and the future trend of 3G systems. The result shows that public key technology has a promising future in 3G and Beyond 3G systems. It points out a new way for key management in future telecommunication systems. 展开更多
关键词 3G telecommunication systems public Key cryptosystem network access
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部