期刊文献+
共找到10篇文章
< 1 >
每页显示 20 50 100
军队计算机网络的安全性分析 被引量:2
1
作者 邱越博 《工业设计》 2011年第10期105-105,共1页
计算机网络在军队的安全建设中起着越来越重要的作用,营造一个健康安全的网络环境成为保障国防和军队安全建设的必要条件。本文分析了目前我国军队计算机网络所存在的安全隐患并提出了解决对策。
关键词 军队计算机 网络网络 安全安全性分析
下载PDF
Driving Behavior Shaping Model in Road Traffic System 被引量:2
2
作者 王武宏 《Journal of Beijing Institute of Technology》 EI CAS 2001年第3期331-336,共6页
In order to give a new way for modeling driving behavior, identifying road traffic accident causation and solving a variety of road traffic safety problems such as driving errors prevention and driving behavior analys... In order to give a new way for modeling driving behavior, identifying road traffic accident causation and solving a variety of road traffic safety problems such as driving errors prevention and driving behavior analysis, a new driving behavior shaping model is proposed, which could be used to assess the degree of effect of driving error upon road traffic safety. Driver behavior shaping model based on driving reliability and safety analysis could be used to identify the road traffic accident causation, to supply data for driver's behavior training, to evaluate driving procedures, to human factor design of road traffic system. 展开更多
关键词 driving errors driving behavior shaping factors driving reliability and safety analysis road traffic safety
下载PDF
Study of a Comprehensive Assessment Method for Coal Mine Safety Based on a Hierarchical Grey Analysis 被引量:26
3
作者 LIU Ya-jing MAO Shan-jun +1 位作者 LI Mei YAO Ji-ming 《Journal of China University of Mining and Technology》 EI 2007年第1期6-10,共5页
Coal mine safety is a complex system, which is controlled by a number of interrelated factors and is difficult to estimate. This paper proposes an index system of safety assessment based on correlated factors involved... Coal mine safety is a complex system, which is controlled by a number of interrelated factors and is difficult to estimate. This paper proposes an index system of safety assessment based on correlated factors involved in coal mining and a comprehensive evaluation model that combines the advantages of the AHP and a grey clustering method to guarantee the accuracy and objectivity of weight coefficients. First, we confirmed the weight of every index using the AHP, then did a general safety assessment by means of a grey clustering method. This model analyses the status of mining safety both qualitatively and quantitatively. It keeps management and technical groups informed of the situation of the coal production line in real time, which aids in making correct decisions based on practical safety issues. A case study in the application of the model is presented. The results show that the method is applicable and realistic with regard to the core of a coal mine's safety management. Consequently, the safe production of a mine and the awareness of advanced safe production management is accelerated. 展开更多
关键词 safety of coal mine safety assessment index system hierarchical grey analysis
下载PDF
Toward an RSU-unavailable Lightweight Certificateless Key Agreement Scheme for VANETs 被引量:5
4
作者 SONG Jun HE Chunjiao +2 位作者 ZHANG Lei TANG Shanyu ZHANG Huanguo 《China Communications》 SCIE CSCD 2014年第9期93-103,共11页
Vehicle ad-hoc networks have developed rapidly these years,whose security and privacy issues are always concerned widely.In spite of a remarkable research on their security solutions,but in which there still lacks con... Vehicle ad-hoc networks have developed rapidly these years,whose security and privacy issues are always concerned widely.In spite of a remarkable research on their security solutions,but in which there still lacks considerations on how to secure vehicleto-vehicle communications,particularly when infrastructure is unavailable.In this paper,we propose a lightweight certificateless and oneround key agreement scheme without pairing,and further prove the security of the proposed scheme in the random oracle model.The proposed scheme is expected to not only resist known attacks with less computation cost,but also as an efficient way to relieve the workload of vehicle-to-vehicle authentication,especially in no available infrastructure circumstance.A comprehensive evaluation,including security analysis,efficiency analysis and simulation evaluation,is presented to confirm the security and feasibility of the proposed scheme. 展开更多
关键词 vehicle ad-hoc network securityand privacy lightweight authentication certificateless key agreement
下载PDF
Security Analysis and Improvement of TNC IF-T Protocol Binding to TLS 被引量:1
5
作者 肖跃雷 王育民 庞辽军 《China Communications》 SCIE CSCD 2013年第7期85-92,共8页
The TNC IF-T Protocol Binding to TLS(TIPBT) is specified by Trusted Computing Group(TCG) for TNC assessment exchanges.However,the TIPBT cannot be analysed by current Strand Space Model(SSM) because of the different re... The TNC IF-T Protocol Binding to TLS(TIPBT) is specified by Trusted Computing Group(TCG) for TNC assessment exchanges.However,the TIPBT cannot be analysed by current Strand Space Model(SSM) because of the different requirements from the traditional security protocols.In order to solve this problem,first,we give an extension of the SSM and point out the TIPBT cannot prevent Man-in-the-Middle(MITM) attacks in some cases based on the extended SSM.Then,we improve the TIPBT and show that the improved TIPBT can resist MITM attacks in the extended SSM. 展开更多
关键词 computer application MITM attacks SSM TIPBT
下载PDF
Safety Aspects of Sustainable Storage Dams and Earthquake Safety of Existing Dams 被引量:2
6
作者 Martin Wieland 《Engineering》 SCIE EI 2016年第3期325-331,共7页
The basic element in any sustainable dam project is safety, which includes the following safety elements: O structural safety, dam safety monitoring, operational safety and maintenance, and emergency planning. Lon... The basic element in any sustainable dam project is safety, which includes the following safety elements: O structural safety, dam safety monitoring, operational safety and maintenance, and emergency planning. Long-term safety primarily includes the analysis of all hazards affecting the project; that is, hazards from the natural environment, hazards from the man-made environment, and project-specific and site-specific hazards. The special features of the seismic safety of dams are discussed. Large dams were the first structures to be systematically designed against earthquakes, starting in the 1930s. How- ever, the seismic safety of older dams is unknown, as most were designed using seismic design criteria and methods of dynamic analysis that are considered obsolete today. Therefore, we need to reevaluate the seismic safety of existing dams based on current state-of-the-art practices and rehabilitate deficient dams. For large dams, a site-specific seismic hazard analysis is usually recommended. Today, large dams and the safety-relevant elements used for controlling the reservoir after a strong earthquake must be able to withstand the ground motions of a safety evaluation earthquake. The ground motion parameters can be determined either by a probabilistic or a deterministic seismic hazard analysis. During strong earthquakes, inelastic deformations may occur in a dam; therefore, the seismic analysis has to be car- ried out in the time domain. Furthermore, earthquakes create multiple seismic hazards for dams such as ground shaking, fault movements, mass movements, and others. The ground motions needed by the dam engineer are not real earthquake ground motions but models of the ground motion, which allow the safe design of dams. It must also be kept in mind that darn safety evaluations must be carried out several times during the long life of large storage dams. These features are discussed in this paper. 展开更多
关键词 DAMS Earthquake design Earthquake safety Existing dams Design criteria Seismic hazard SUSTAINABILITY Service life
下载PDF
Security Analysis and Enhanced Design of a Dynamic Block Cipher 被引量:3
7
作者 ZHAO Guosheng WANG Jian 《China Communications》 SCIE CSCD 2016年第1期150-160,共11页
There are a lot of security issues in block cipher algorithm.Security analysis and enhanced design of a dynamic block cipher was proposed.Firstly,the safety of ciphertext was enhanced based on confusion substitution o... There are a lot of security issues in block cipher algorithm.Security analysis and enhanced design of a dynamic block cipher was proposed.Firstly,the safety of ciphertext was enhanced based on confusion substitution of S-box,thus disordering the internal structure of data blocks by four steps of matrix transformation.Then,the diffusivity of ciphertext was obtained by cyclic displacement of bytes using column ambiguity function.The dynamic key was finally generated by using LFSR,which improved the stochastic characters of secret key in each of round of iteration.The safety performance of proposed algorithm was analyzed by simulation test.The results showed the proposed algorithm has a little effect on the speed of encryption and decryption while enhancing the security.Meanwhile,the proposed algorithm has highly scalability,the dimension of S-box and the number of register can be dynamically extended according to the security requirement. 展开更多
关键词 cryptography block cipher encryption algorithm safety analysis
下载PDF
Enhancing Hospital Management of High-risk Medications by Computer PDCA-Cycle
8
作者 Qiulian Liu 《International Journal of Technology Management》 2013年第3期109-111,共3页
Objective: To imensify management on high-alert Medications, ensure clinical medication safety. Methods: Statistical analysis was applied between before and after the implementation of PDCA-cycle in the management o... Objective: To imensify management on high-alert Medications, ensure clinical medication safety. Methods: Statistical analysis was applied between before and after the implementation of PDCA-cycle in the management of high-alert Medications. Results: After PDCA- cycle, the rate of management of high-alert Medications increased from 59.5% to 94.6% (P〈0.01), Conclusion: Our study suggested that the PDCA-cycle play an important role in the management of high-alert Medications, and then can increase the level of safety on management and utilization of medicine. 展开更多
关键词 PDCA-cycle high-alert medications safety
下载PDF
A blind quantum signature protocol using the GHZ states 被引量:10
9
作者 WANG MingMing CHEN XiuBo YANG YiXian 《Science China(Physics,Mechanics & Astronomy)》 SCIE EI CAS 2013年第9期1636-1641,共6页
Recently,some blind quantum signature(BQS) protocols have been proposed.But the previous schemes have security and efficiency problems.Based on the entangled Greenberger-Horne-Zeilinger(GHZ) states,a new weak BQS prot... Recently,some blind quantum signature(BQS) protocols have been proposed.But the previous schemes have security and efficiency problems.Based on the entangled Greenberger-Horne-Zeilinger(GHZ) states,a new weak BQS protocol is proposed.Compared with some existing schemes,our protocol has 100% efficiency.Besides,the protocol is simple and easy to implement.The security of the protocol is guaranteed by the correlation of the GHZ particles held by each participant.In our protocol,the signatory is kept blind from the content of the message.According to the security analysis,the signatory cannot disavowal his/her signature while the signature cannot be forged by others. 展开更多
关键词 blind quantum signature GHZ state EFFICIENCY SECURITY
原文传递
Reflections on the security proofs of Boneh-Franklin identity-based encryption scheme 被引量:1
10
作者 CHEN Yu CHEN LiQun LIN DongDai 《Science China Mathematics》 SCIE 2013年第7期1385-1401,共17页
In this paper, we first review the existing proofs of the Boneh-Franklin identity-based encryption scheme (BF-IBE for short), and show how to admit a new proof by slightly modifying the specifications of the hash func... In this paper, we first review the existing proofs of the Boneh-Franklin identity-based encryption scheme (BF-IBE for short), and show how to admit a new proof by slightly modifying the specifications of the hash functions of the original BF-IBE. Compared with prior proofs, our new proof provides a tighter security reduction and minimizes the use of random oracles, thus indicates BF-IBE has better provable security with our new choices of hash functions. The techniques developed in our proof can also be applied to improving security analysis of some other IBE schemes. As an independent technical contribution, we also give a rigorous proof of the Fujisaki-Okamoto (FO) transformation in the case of CPA-to-CCA, which demonstrates the efficiency of the FO-transformation (CPA-to-CCA), in terms of the tightness of security reduction, has long been underestimated. This result can remarkably benefit the security proofs of encryption schemes using the FO-transformation for CPA-to-CCA enhancement. 展开更多
关键词 identity-based encryption Fujisaki-Okamoto transformation provable security cascading reduction
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部