期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
基于IPv6的Internet存储服务模型
1
作者 吴英 徐敬东 +1 位作者 吴功宜 刘璟 《计算机工程》 CAS CSCD 北大核心 2008年第20期98-100,共3页
针对用户对远程数据存储与异地数据备份的需求增加,提出一种基于IPv6协议的Internet存储服务模型。设计应用层的Internet存储访问协议,结合IPv6协议的安全性特点设计安全存储模型,为下一代互联网提供一种标准、安全的远程存储服务。
关键词 Internet存储服务 Internet存储访问协议 IPv6安全存储模型
下载PDF
移动智能终端信息防泄漏模型的研究及应用 被引量:8
2
作者 陈超群 李志华 +1 位作者 闫成雨 胡振宇 《计算机工程与设计》 北大核心 2016年第10期2632-2638,共7页
针对移动智能终端信息防泄漏问题,提出轻量级SMS4加密算法、基于设备动态特征和用户身份信息的双向双因子认证技术。基于上述研究,与透明加/解密技术相结合,进一步提出一种移动智能终端信息防泄漏安全存储模型。以Android客户端、云存... 针对移动智能终端信息防泄漏问题,提出轻量级SMS4加密算法、基于设备动态特征和用户身份信息的双向双因子认证技术。基于上述研究,与透明加/解密技术相结合,进一步提出一种移动智能终端信息防泄漏安全存储模型。以Android客户端、云存储服务器端为例,研发一个基于上述安全存储模型的应用系统,系统能够保证文件一旦离开移动智能终端就以密文形式存在,只有重新回到移动智能终端时才能被解密成明文,实现对用户文件的全生命周期保护。 展开更多
关键词 移动智能终端 轻量级SMS4加密算法 双因子双向认证 透明加/解密 安全存储模型 数据防泄漏
下载PDF
Quantum position verification in bounded-attack-frequencymodel
3
作者 Fei Gao Bin Liu QiaoYan Wen 《Science China(Physics,Mechanics & Astronomy)》 SCIE EI CAS CSCD 2016年第11期17-27,共11页
In 2011, Buhrman et al. proved that it is impossible to design an unconditionally secure quantum position verification(QPV)protocol if the adversaries are allowed to previously share unlimited entanglements. Afterward... In 2011, Buhrman et al. proved that it is impossible to design an unconditionally secure quantum position verification(QPV)protocol if the adversaries are allowed to previously share unlimited entanglements. Afterwards, people started to design secure QPV protocols in practical settings, e.g. the bounded-storage model, where the adversaries' pre-shared entangled resources are supposed to be limited. Here we focus on another practical factor that it is very difficult for the adversaries to perform attack operations with unlimitedly high frequency. Concretely, we present a new kind of QPV protocols, called non-simultaneous QPV.And we prove the security of a specific non-simultaneous QPV protocol with the assumption that the frequency of the adversaries' attack operations is bounded, but no assumptions on their pre-shared entanglements or quantum storage. Actually, in our nonsimultaneous protocol, the information whether there comes a signal at present time is also a piece of command. It renders the adversaries "blind", that is, they have to execute attack operations with unlimitedly high frequency no matter whether a signal arrives, which implies the non-simultaneous QPV is also secure in the bounded-storage model. 展开更多
关键词 quantum cryptography position-based cryptography quantum position verification
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部