期刊文献+
共找到5篇文章
< 1 >
每页显示 20 50 100
基于分发信任的密钥管理服务安全模型的研究与改进
1
作者 朱洁 杨德军 《计算机安全》 2008年第4期41-43,共3页
通过移动Adhoc网络的特点分析其存在的安全威胁;探讨了Ad hoc网络的安全目标与安全策略;对安全策略中最重要的密钥管理服务进行研究。在比较(n,k)门限加密模型与(n,t+1)门限加密模型的基础上,提出了一种基于分发信任的密钥管理服务安全... 通过移动Adhoc网络的特点分析其存在的安全威胁;探讨了Ad hoc网络的安全目标与安全策略;对安全策略中最重要的密钥管理服务进行研究。在比较(n,k)门限加密模型与(n,t+1)门限加密模型的基础上,提出了一种基于分发信任的密钥管理服务安全模型的改进方法,可有利于服务时间的减少以及合作证书成功率的提高。 展开更多
关键词 AD HOC网络 安全策略 密钥管理服务 分发信任 门限密码技术
下载PDF
信任模型在无线传感器网络入侵检测中的应用 被引量:3
2
作者 康松林 王彦东 李慧 《计算机工程与应用》 CSCD 2012年第5期89-92,共4页
主要针对信任模型在无线传感器网络入侵检测中应用的关键技术进行了研究,建立以信任值的计算、更新和分发为核心内容的检测模型。为了调节节点的历史行为与目前行为对信任值更新结果的影响,防止恶意节点先积累高信任值然后破坏网络行为... 主要针对信任模型在无线传感器网络入侵检测中应用的关键技术进行了研究,建立以信任值的计算、更新和分发为核心内容的检测模型。为了调节节点的历史行为与目前行为对信任值更新结果的影响,防止恶意节点先积累高信任值然后破坏网络行为的发生,信任计算中引入了更新权值。采用甄别机制以提高对恶意节点及其行为的鉴别。经仿真,结果表明模型可抵御中间人攻击等常见攻击。 展开更多
关键词 信任模型 更新权值 信任计算 甄别机制 信任分发
下载PDF
移动Ad hoc中门限密码模型的研究与改进 被引量:1
3
作者 朱洁 杨德军 《计算机与现代化》 2008年第12期117-120,共4页
Ad hoc网络是一种多跳移动无线网络。本文分析了对其广泛应用起关键作用的安全性问题,探讨了Ad hoc网络的安全目标与安全机制。通过对安全机制中最重要的密钥管理服务进行研究,在比较已有门限密码技术的基础上,提出了基于分发信任的门... Ad hoc网络是一种多跳移动无线网络。本文分析了对其广泛应用起关键作用的安全性问题,探讨了Ad hoc网络的安全目标与安全机制。通过对安全机制中最重要的密钥管理服务进行研究,在比较已有门限密码技术的基础上,提出了基于分发信任的门限密码技术的安全模型改进,有利于服务时间的减少以及合作证书成功率的提高。 展开更多
关键词 AD HOC网络 安全策略 密钥管理服务 分发信任 门限密码技术
下载PDF
Quantum Key Distribution Network: Optimal Secret- Key- Aware Routing Method for Trust Relaying 被引量:2
4
作者 Chao Yang Hongqi Zhang Jinhai Su 《China Communications》 SCIE CSCD 2018年第2期33-45,共13页
Since the QKD network can overcome the distance limitation and expand the point-to-point QKD system to a multi-user key distribution system, some testing QKD networks have been built. However, all of this previous res... Since the QKD network can overcome the distance limitation and expand the point-to-point QKD system to a multi-user key distribution system, some testing QKD networks have been built. However, all of this previous research seldom focused on the routing mechanism of QKD network in detail. Therefore, this paper focuses on the routing issue in trust relaying QKD network, builds a model of the trust relaying QKD network and proposes a secret-key-aware routing method. In our method, a dynamic model for the residual local key is proposed to forecast the residual local key quantity of each QKD link more accurately, and the cost of QKD link and relaying path are defined by multiple affecting factors, e.g. the generation, consumption rate and the local key depletion index. The proposed method is implemented and evaluated in a simulation environment. The simulation results show that our routing method can increase the success rate of key exchange, make all the QKD links participate key exchange with almost equal opportunity to achieve load balance, and trade off the local key generation and consumption of each QKD link. Therefore, our proposed method can contribute to effectively improve the holistic performance of the trust relaying QKD network. 展开更多
关键词 quantum key distribution QKDnetwork routing algorithm
下载PDF
Fluctuations of Internal Transmittance in Security of Measurement-Device-Independent Quantum Key Distribution with an Untrusted Source
5
作者 汪洋 鲍皖苏 +3 位作者 陈瑞柯 周淳 江木生 李宏伟 《Communications in Theoretical Physics》 SCIE CAS CSCD 2017年第8期206-214,共9页
Measurement-device-independent quantum key distribution(MDI-QKD) is immune to detector side channel attacks, which is a crucial security loophole problem in traditional QKD. In order to relax a key assumption that the... Measurement-device-independent quantum key distribution(MDI-QKD) is immune to detector side channel attacks, which is a crucial security loophole problem in traditional QKD. In order to relax a key assumption that the sources are trusted in MDI-QKD, an MDI-QKD protocol with an untrusted source has been proposed. For the security of MDI-QKD with an untrusted source, imperfections in the practical experiment should also be taken into account. In this paper, we analyze the effects of fluctuations of internal transmittance on the security of a decoy-state MDI-QKD protocol with an untrusted source. Our numerical results show that both the secret key rate and the maximum secure transmission distance decrease when taken fluctuations of internal transmittance into consideration. Especially, they are more sensitive when Charlie's mean photon number per pulse is smaller. Our results emphasize that the stability of correlative optical devices is important for practical implementations. 展开更多
关键词 quantum key distribution measurement-device-independent untrusted source fluctuations ofinternal transmittance
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部