期刊文献+
共找到5篇文章
< 1 >
每页显示 20 50 100
分散式区块链技术与加密安全法的兴起
1
作者 普里马维拉·德·菲利普 王延川(译) 《民商法论丛》 2019年第2期306-356,共51页
正如分散通信系统催生了互联网,今天一种新的技术——区块链——有可能分散我们存储数据和管理信息的方式,也可能降低中间人这个社会中最重要的监管者的作用。区块链技术能够创建分散式货币、自动执行的数字合同(智能合约)和可以通过互... 正如分散通信系统催生了互联网,今天一种新的技术——区块链——有可能分散我们存储数据和管理信息的方式,也可能降低中间人这个社会中最重要的监管者的作用。区块链技术能够创建分散式货币、自动执行的数字合同(智能合约)和可以通过互联网控制的智能资产(智能财产)。区块链还能够开发更具民主性或决策参与性的新治理系统,以及在没有任何人为干预的计算机网络上操作的分散式(自治)组织。上述应用使得许多人将区块链与互联网进行比较,并作出预测,该技术会改变通信、商业甚至政治或法律领域的权力平衡,将中央权威从上述领域中转移出去。这种新兴的分散式技术既有优点又有缺点,其广泛部署将导致一个新法律子集的扩展,对之我们姑且称为加密安全法:其规则运行通过自我执行的智能合约与分散式(自治)组织加以体现。随着区块链技术被广泛采用,诸如政府机构和大型跨国公司等中央权威将会失去通过现有手段控制和塑造不同人们活动的能力。因此,怎样在现有法律理论下探索区块链技术的监管,以及新兴分散式组织形成和部署的塑造,将会得到持续的关注。 展开更多
关键词 区块链 分散化 加密安全法
原文传递
Confidential Communication Through Chaos Encryption in Wireless Sensor Network 被引量:4
2
作者 CHEN Shuai ZHONG Xian-xin 《Journal of China University of Mining and Technology》 EI 2007年第2期258-261,共4页
A new byte block cipher algorithm with discrete chaos and Feistel structure has been studied for confidential communication in wireless sensor network to improve security. After permutation,the byte block was encrypte... A new byte block cipher algorithm with discrete chaos and Feistel structure has been studied for confidential communication in wireless sensor network to improve security. After permutation,the byte block was encrypted through a Feistel structure in multiple turns and afterwards replaced again. The child keys are the composite sequence of discrete chaos and linear congruence sequences. Both the plain text and cipher text are of 8 bits. The number of keys is alterable. A nonlinear encryption function in the Feistel structure with chaos was constructed. The cipher algorithm was realized in the Micaz node,and the confidential communication experiment in wireless sensor network was completed success-fully. Additional ROM memory required for the cipher algorithm is 4144 bytes and an additional RAM memory 61 bytes. The cipher algorithm is nonlinear chaos and the Feistel structure holds the best of the RC6,DES and SKIPJACK cipher algorithms.The result shows that the algorithm needs a little memory and is safe at a high level. 展开更多
关键词 ALGORITHM ENCRYPTION CHAOS wireless sensor network Feistel structure
下载PDF
Chaotic Image Encryption Algorithm by Correlating Keys with Plaintext 被引量:6
3
作者 Zhu Congxu Sun Kehui 《China Communications》 SCIE CSCD 2012年第1期73-79,共7页
A novel image encryption scheme based on the modified skew tent map was proposed in this paper. In the key generating procedure, the algorithm generates a plaintext-dependent secret keys set. In the encryption process... A novel image encryption scheme based on the modified skew tent map was proposed in this paper. In the key generating procedure, the algorithm generates a plaintext-dependent secret keys set. In the encryption process, the diffusion operation with cipher output feedback is introduced. Thus, cipher-irmge is sensitive to both initial keys and plaintext through only one round diffusion operation. The key space is large. As a resuk, the algorithm can effectively resist differential attacks, statistical attacks, brute-force attacks, known plaintext and chosen plaintext attacks. Perforrmnce test and security analysis demonstrates that this algorithm is eficient and reliable, with high potential to be adopted for secure comnmnications. 展开更多
关键词 skew tent map chaotic system image encryption secure corrrrmnieation
下载PDF
Multi-Level Cryptographic Functions for the Functionalities of Open Database System
4
作者 Akinwale Taofiki Adio Adekoya Felix Adebayo Ooju Emmanuel Oluwafemi 《Computer Technology and Application》 2011年第9期730-735,共6页
The purpose of this paper is to design and implement a secure open database system for organizations that are increasingly opened up their information for easy access by different users. The work proposed some functio... The purpose of this paper is to design and implement a secure open database system for organizations that are increasingly opened up their information for easy access by different users. The work proposed some functionalities such as open password entry with active boxes, combined encryption methods and agent that can be incorporated into an open database system. It designed and implemented an algorithm that would not allow users to have free access into open database system. A user entering his password only needs to carefully study the sequence of codes and active boxes that describe his password and then enter these codes in place of his active boxes. The approach does not require the input code to be hidden from anyone or converted to place holder characters for security reasons. Integrating this scheme into an open database system is viable in practice in term of easy use and will improve security level of information. 展开更多
关键词 Database system CRYPTOGRAPHY agent random number PEER-TO-PEER algorithm
下载PDF
Secure encryption embedded processor design for wireless sensor network application
5
作者 霍文捷 Liu Zhenglin Zou Xuecheng 《High Technology Letters》 EI CAS 2011年第1期75-79,共5页
This paper presents a new encryption embedded processor aimed at the application requirement of wireless sensor network (WSN). The new encryption embedded processor not only offers Rivest Shamir Adlemen (RSA), Adv... This paper presents a new encryption embedded processor aimed at the application requirement of wireless sensor network (WSN). The new encryption embedded processor not only offers Rivest Shamir Adlemen (RSA), Advanced Encryption Standard (AES), 3 Data Encryption Standard (3 DES) and Secure Hash Algorithm 1 (SHA - 1 ) security engines, but also involves a new memory encryption scheme. The new memory encryption scheme is implemented by a memory encryption cache (MEC), which protects the confidentiality of the memory by AES encryption. The experi- ments show that the new secure design only causes 1.9% additional delay on the critical path and cuts 25.7% power consumption when the processor writes data back. The new processor balances the performance overhead, the power consumption and the security and fully meets the wireless sensor environment requirement. After physical design, the new encryption embedded processor has been successfully tape-out. 展开更多
关键词 embedded processor security memory encryption wireless sensor network (WSN) CACHE
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部