期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
智能语音技术发展对公共通信安全的影响研究 被引量:3
1
作者 莫凡 周神保 《广东通信技术》 2019年第6期26-29,共4页
人工智能是当前各界关注的热点,其中智能语音是人工智能领域的研究重点之一,存在广阔的发展前景。声音编辑合成、人机通过对话交互等智能语音产品将伴随技术进步不断出现在生活场景当中。智能语音技术为人们带来便利的同时,也降低了诈... 人工智能是当前各界关注的热点,其中智能语音是人工智能领域的研究重点之一,存在广阔的发展前景。声音编辑合成、人机通过对话交互等智能语音产品将伴随技术进步不断出现在生活场景当中。智能语音技术为人们带来便利的同时,也降低了诈骗分子实施犯罪活动的成本、致使部分传统的识别手段失效、提高作案成功率,可能对公共通信安全等领域带来持续性的新挑战。 展开更多
关键词 人工智能 智能语音 公共通信安全
下载PDF
ASIP for Elliptic Curve Cryptography Based on VLIW Architecture 被引量:1
2
作者 YANG Xiaohui DAI Zibin ZHANG Jun ZHANG Yongfu 《China Communications》 SCIE CSCD 2010年第4期161-166,共6页
The requirement of the flexible and effective implementation of the Elliptic Curve Cryptography (ECC) has become more and more exigent since its dominant position in the public-key cryptography application.Based on an... The requirement of the flexible and effective implementation of the Elliptic Curve Cryptography (ECC) has become more and more exigent since its dominant position in the public-key cryptography application.Based on analyzing the basic structure features of Elliptic Curve Cryptography (ECC) algorithms,the parallel schedule algorithm of point addition and doubling is presented.And based on parallel schedule algorithm,the Application Specific Instruction-Set Co-Processor of ECC that adopting VLIW architecture is also proposed in this paper.The coprocessor for ECC is implemented and validated using Altera’s FPGA.The experimental result shows that our proposed coprocessor has advantage in high performance and flexibility. 展开更多
关键词 Elliptic Curve Cryptography Application Specific Instruction-Set Processor VLIW Architecture
下载PDF
Authenticated Key Agreement Protocol
3
作者 Massoud Hadian Dehkordi Reza Alimoradi 《China Communications》 SCIE CSCD 2010年第5期1-8,共8页
Key agreement and identification protocols are much applicable among current protocols in cryptography. These protocols are used for a secure communication through an insecure channel in a network like Internet. Chall... Key agreement and identification protocols are much applicable among current protocols in cryptography. These protocols are used for a secure communication through an insecure channel in a network like Internet. Challenge-response identification protocol is an important identification method. In this paper, by making some slight changes in the public-key-based challenge-response identification protocol, we have introduced a new scheme in which the users in addition to authenticating each other can also agree on multiple keys. Then, this protocol's security from both aspects regarding the identification and key agreement will be analyzed. At the end, we will prove our scheme has a high security and efficiency in comparison with some famous and similar protocols. 展开更多
关键词 IDENTIFICATION multiple key agreement PAIRING challenge-response strong security
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部