期刊文献+
共找到16篇文章
< 1 >
每页显示 20 50 100
网络安全信息加密技术浅析
1
作者 孔宁 《计算机光盘软件与应用》 2011年第14期34-34,共1页
本文首先对网络安全进行了概述,并详细的分析了影响计算机网络安全的因素,在此基础上对网络安全信息加密技术给出了一些看法。
关键词 网络安全信息加密技术 数据加密 加密算法
下载PDF
基于人工智能的高校体育俱乐部会员信息安全加密算法
2
作者 王杰 《赤峰学院学报(自然科学版)》 2024年第10期11-16,共6页
为实现对数据特征的深度挖掘和高度迷惑性的加密数据生成,提高数据加密的强度和灵活性,提出一种基于人工智能的高校体育俱乐部会员信息安全加密算法。采用对称密码体制生成会员信息密钥、密文、明文等信息,将这些信息输入到卷积神经网... 为实现对数据特征的深度挖掘和高度迷惑性的加密数据生成,提高数据加密的强度和灵活性,提出一种基于人工智能的高校体育俱乐部会员信息安全加密算法。采用对称密码体制生成会员信息密钥、密文、明文等信息,将这些信息输入到卷积神经网络加密算法中,进行更深层次的特征提取和更高效的会员信息加密和解密。融合加密算法与生成对抗网络,通过生成器和判别器之间的对抗性训练,进一步提升加密算法的安全性。使用优化后的加密算法对高校体育俱乐部会员信息进行加密。通过实验验证,该方法具备追踪和定位入侵者的能力,在明文长度为1024bit时,平均加密时间能够保证在5ms之内,能够提供一个安全、高效的加密方案,确保高校体育俱乐部会员的信息能够得到有效的保护。 展开更多
关键词 人工智能 高校体育俱乐部 会员信息安全加密 对称密码体制 卷积神经网络 生成对抗网络
下载PDF
基于数字图像的信息安全加密软件的设计与实现 被引量:1
3
作者 代超 《电子技术与软件工程》 2021年第17期53-54,共2页
本文主要利用AES和LSB算法来对数字图像进行加密处理,在QT开发平台的基础上,利用C++语言来进行程序编写,将需要传输的数据信息隐藏在BMP格式的图像之中,实现对信息数据的隐写,希望本文能够对今后数据信息安全传输有一定的参考价值。
关键词 LSB算法 AES算法 信息安全加密 数字图像 加密软件设计
下载PDF
电子档案安全性研究 被引量:2
4
作者 张哲妮 《办公自动化(综合月刊)》 2012年第5期38-38,64,共2页
电子档案作为一种数字化信息,从电子文件的产生、处理、传递至归档、整理、保管、利用等各个方面都存在信息失控、信息干扰、等不利安全因素。如何对电子档案实施安全有效地保护与维护,是一项重要而复杂的工作,也是本文研究的重点。
关键词 电子档案 安全信息加密
下载PDF
基于矩阵置换运算的加密方法研究
5
作者 曹亚群 朱俊 《福建电脑》 2015年第2期14-15,共2页
加密技术在信息安全领域中得到广泛的应用,文章介绍了基于矩阵置换运算的加密方法,提出了以二进制位为单位进行加密可以提高安全性。
关键词 算法 矩阵 加密 解密 信息安全
下载PDF
计算机网络安全中虚拟网络技术的作用初探
6
作者 钟巍 《移动信息》 2023年第6期198-200,共3页
为确保虚拟网络技术在计算机网络安全中得到更好的运用,文中对虚拟网络技术的优势进行了分析,如兼容性较强、运营成本投资较低、应用范围较大等,进一步明确了计算机网络安全的影响因素,如硬件配置的协调性、可植入病毒、网络木马程序等... 为确保虚拟网络技术在计算机网络安全中得到更好的运用,文中对虚拟网络技术的优势进行了分析,如兼容性较强、运营成本投资较低、应用范围较大等,进一步明确了计算机网络安全的影响因素,如硬件配置的协调性、可植入病毒、网络木马程序等,并提出了虚拟网络技术的具体运用。以期为相关人员提供参考。 展开更多
关键词 计算机网络安全 虚拟网络技术 信息安全加密技术 隧道安全技术 身份认证技术
下载PDF
基于RSA信息安全加密系统的研究与实现 被引量:7
7
作者 郭晟南 蒋学勤 《网络安全技术与应用》 2018年第1期35-35,38,共2页
RSA公钥加密算法是目前最常用的公钥加密算法之一,基于RSA算法的信息安全加密系统可以为网络数据通信安全保障。本文首先将对RSA信息安全加密技术进行简单介绍,包括RSA信息加密技术和信息系统安全技术等,在此基础上,探讨基于RSA算法的... RSA公钥加密算法是目前最常用的公钥加密算法之一,基于RSA算法的信息安全加密系统可以为网络数据通信安全保障。本文首先将对RSA信息安全加密技术进行简单介绍,包括RSA信息加密技术和信息系统安全技术等,在此基础上,探讨基于RSA算法的安全加密系统设计与实现,主要包括加密系统设计、加密算法选择、安全性分析和系统主要功能实现等。 展开更多
关键词 RSA算法 信息安全加密技术 系统设计及实现
原文传递
基于FPGA的HMAC_SHA1_96算法设计与实现 被引量:3
8
作者 丁黄胜 陆生礼 +1 位作者 田渊 吴旭凡 《半导体技术》 CAS CSCD 北大核心 2003年第6期25-28,32,共5页
在简要介绍安全散列函数SHA1和HMAC_SHA1_96算法体系的基础上,结合FPGA芯片(Altera的APEX20KE系列)的特点,进行信息安全加密验证算法的硬件系统优化设计和验证。本文讨论了该优化设计的步骤和方法, 给出了较好的验证结果。
关键词 FPGA 安全散列函数 安全 HMAC_SHAl_96算法 信息安全加密验证算法 SHAl函数 网络安全
下载PDF
METHOD FOR CONSTRUCTING TAG-KEM SCHEMES WITH SHORT-MESSAGE PUBLIC-KEY ENCRYPTIONS 被引量:1
9
作者 陈原 陈丹 董庆宽 《Transactions of Nanjing University of Aeronautics and Astronautics》 EI 2009年第4期301-305,共5页
Tag key encapsulation mechanism (Tag-KEM)/data encapsulation mechanism (DEM) is a hybrid framework proposed in 2005. Tag-t(EM is one of its parts by using public-key encryption (PKE) technique to encapsulate a ... Tag key encapsulation mechanism (Tag-KEM)/data encapsulation mechanism (DEM) is a hybrid framework proposed in 2005. Tag-t(EM is one of its parts by using public-key encryption (PKE) technique to encapsulate a symmetric key. In hybrid encryptions, the long-raessage PKE is not desired due to its slow operation. A general method is presented for constructing Tag-KEM schemes with short-message PKEs. The chosen ciphertext security is proved in the random oracle model. In the method, the treatment of the tag part brings no additional ciphertext redundancy. Among all the methods for constructing Tag-KEM, the method is the first one without any validity checking on the tag part, thus showing that the Tag-KEM/DEM framework is superior to KEM+DEM one. 展开更多
关键词 information security public-key encryption chosen ciphertext security Tag-KEM scheme
下载PDF
A DIGITAL SIGNATURE-BASED VISUAL CRYPTOGRAPHY SCHEME FOR IMAGE DISCRIMINATION AND MANAGEMENT 被引量:1
10
作者 Han Yanyan Hu Yupu He Wencai 《Journal of Electronics(China)》 2009年第5期631-636,共6页
Visual cryptography is a cryptographic technique which emerges in the information security domain in recent years. Each of the sharing sub-keys may be a stochastic noise image or a significative image with no informat... Visual cryptography is a cryptographic technique which emerges in the information security domain in recent years. Each of the sharing sub-keys may be a stochastic noise image or a significative image with no information on the original key. But a mass of sub-keys have to be saved actually, which faces the problem of inconvenient discrimination and management. This paper presents a visual cryptography scheme based on the digital signature for image discrimination and management, applying the digital signature and the time-stamp technology to the visual cryptography scheme. The scheme both solves the problem on the storage and management of the sharing sub-keys, increases the verification of image contents, thus enhances the validity of storage and management without security effect. 展开更多
关键词 Visual cryptography Digital signature Time-stamp
下载PDF
Multiple hashes of single key with passcode for multiple accounts
11
作者 LEE Kok-wah EWE Hong-tat 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2007年第8期1183-1190,共8页
A human's e-life needs multiple offline and online accounts. It is a balance between usability and security to set keys or passwords for these multiple accounts. Password reuse has to be avoided due to the domino ... A human's e-life needs multiple offline and online accounts. It is a balance between usability and security to set keys or passwords for these multiple accounts. Password reuse has to be avoided due to the domino effect of malicious administrators and crackers. However,human memorability constrains the number of keys. Single sign-on server,key hashing,key strengthening and petname system are used in the prior arts to use only one key for multiple online accounts. The unique site keys are derived from the common master secret and specific domain name. These methods cannot be applied to offline accounts such as file encryption. We invent a new method and system applicable to offline and online accounts. It does not depend on HTTP server and domain name,but numeric 4-digit passcode,key hashing,key strengthening and hash truncation. Domain name is only needed to resist spoofing and phishing attacks of online accounts. 展开更多
关键词 MANAGEMENT Memorability Key hashing Key strengthening Multiple accounts Information security
下载PDF
Multi-Level Cryptographic Functions for the Functionalities of Open Database System
12
作者 Akinwale Taofiki Adio Adekoya Felix Adebayo Ooju Emmanuel Oluwafemi 《Computer Technology and Application》 2011年第9期730-735,共6页
The purpose of this paper is to design and implement a secure open database system for organizations that are increasingly opened up their information for easy access by different users. The work proposed some functio... The purpose of this paper is to design and implement a secure open database system for organizations that are increasingly opened up their information for easy access by different users. The work proposed some functionalities such as open password entry with active boxes, combined encryption methods and agent that can be incorporated into an open database system. It designed and implemented an algorithm that would not allow users to have free access into open database system. A user entering his password only needs to carefully study the sequence of codes and active boxes that describe his password and then enter these codes in place of his active boxes. The approach does not require the input code to be hidden from anyone or converted to place holder characters for security reasons. Integrating this scheme into an open database system is viable in practice in term of easy use and will improve security level of information. 展开更多
关键词 Database system CRYPTOGRAPHY agent random number PEER-TO-PEER algorithm
下载PDF
A Scheme to Share Information via Employing Discrete Algorithm to Quantum States
13
作者 康国栋 方卯发 《Communications in Theoretical Physics》 SCIE CAS CSCD 2011年第2期239-243,共5页
We propose a protocol for information sharing between two legitimate parties (Bob and Alice) via public-key cryptography. In particular, we specialize the protocol by employing discrete algorithm under mod that maps... We propose a protocol for information sharing between two legitimate parties (Bob and Alice) via public-key cryptography. In particular, we specialize the protocol by employing discrete algorithm under mod that maps integers to quantum states via photon rotations. Based on this algorithm, we find that the protocol is secure under various classes of attacks. Specially, owe to the algorithm, the security of the classical privacy contained in the quantum public-key and the corresponding ciphertext is guaranteed. And the protocol is robust against the impersonation attack and the active wiretapping attack by designing particular checking processing, thus the protocol is valid. 展开更多
关键词 discrete algorithm under mod public-key cryptography SECURITY
下载PDF
Quasi-3-D Au mushrooms with programmable morphology for high-capacity flexible plasmonic encoding 被引量:1
14
作者 Dong Li Yinghui Sun +7 位作者 Yawen Wang Bo Zhao Wenkai Liang Yuanlan Liu Heng Gao Yaqi Ye Jiating Li Lin Jiang 《Science China Materials》 SCIE EI CAS CSCD 2022年第8期2227-2234,共8页
Plasmonic encoding composed of metallic nanostructures makes a great contribution to the practical application of information encryption.However,most reports have so far shown the preparation of single or binary plasm... Plasmonic encoding composed of metallic nanostructures makes a great contribution to the practical application of information encryption.However,most reports have so far shown the preparation of single or binary plasmonic encoding patterns because of the technical difficulty of assembling multiplex nanostructures on a single platform,which cannot satisfy the requirements of high encoding capacity for increasing information security.Herein,we developed a strategy based on plasma etching combined with in-situ growth to fabricate patterned arrays of quasi-three-dimensional(3-D)plasmonic Au nano-mushrooms with controlled morphologies,and successfully realized ideal high-capacity plasmonic encoding by arranging Au nano-mushrooms on one platform.On this basis,such multiplex encoding patterns have been transferred to the flexible substrate to realize the triple-mode encryption of the Morse code of"FUNSOM",indicating great prospects in the applications of information encryption and data storage. 展开更多
关键词 PLASMONIC ENCODING high capacity FLEXIBLE information protection
原文传递
Cryptanalysis of Hwang et al.'s Improved Encryption Scheme 被引量:2
15
作者 Dezhi Gao Xiangqian Liang 《Journal of Systems Science and Information》 2009年第2期159-163,共5页
Recently, Tseng et al. proposed authenticated encryption scheme with message recovery using self-certified public keys. Hwang et al. proposed an attack to show that the Tseng et al.'s scheme was not secure. And Hwang... Recently, Tseng et al. proposed authenticated encryption scheme with message recovery using self-certified public keys. Hwang et al. proposed an attack to show that the Tseng et al.'s scheme was not secure. And Hwang et al. proposed an improved scheme and claimed to that the new scheme satisfy the security requirement. However, we will show that the improved signature proposed by Hwang et al. is still insecure. 展开更多
关键词 CRYPTOGRAPHY authenticated encryption signature scheme message recovery self-certified key
原文传递
Facile fabrication of encryption composite materials with trilayer quasi-amorphous heterostructure
16
作者 Fantao Meng Malik Muhammad Umair +2 位作者 Shufen Zhang Yao Meng Bingtao Tang 《Science China Materials》 SCIE EI CAS CSCD 2021年第4期909-919,共11页
Encryption materials represent a major direction of information security,but it is challenging to realize the ideal security combining the complete hiding of complex coding,stability in transmission,camouflage,and rel... Encryption materials represent a major direction of information security,but it is challenging to realize the ideal security combining the complete hiding of complex coding,stability in transmission,camouflage,and reliable decoding.Herein,we report an innovative strategy for rationally constructing encryption composite materials with high security and portability.Compared with common colloidal photonic watermarks,our encrypted optical devices are composed of thermoplastic polyurethanes(TPU)protective layers,polystyrene(PS)switching layers and a Cd S coding layer.The optical shielding properties and phase state transition of PS layers enable high-level encoding and decoding security through thermal activation of light transmittance control.Meanwhile,the Cd S layer can be clearly revealed in decoding mode because of the high refractive index.Besides,the confinement protection of integrated TPU films prevents the trilayer quasi-amorphous heterostructure from damage.To establish the practical advantage,portable information carriers can be prepared for camouflage.Accordingly,the reliable encoding and decoding system,and ability to integrate with easy-to-carry products,make our composites a potentially high-security encryption device for anti-fraud technology. 展开更多
关键词 quasi-amorphous structures structural color ENCRYPTION
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部