期刊文献+
共找到5篇文章
< 1 >
每页显示 20 50 100
基于区块链技术的物流仓储数据安全通信方法研究
1
作者 刘立栋 丁康健 《长江信息通信》 2024年第7期172-174,共3页
由于传统物流仓储数据通信过程中存在诸多安全隐患,如数据篡改、信息泄露等,研究基于区块链技术的物流仓储数据安全通信方法。部署区块链网络存储物流仓储数据,对数据通信双方进行身份认证,通过后授予区块链访问权限,结合加密算法、消... 由于传统物流仓储数据通信过程中存在诸多安全隐患,如数据篡改、信息泄露等,研究基于区块链技术的物流仓储数据安全通信方法。部署区块链网络存储物流仓储数据,对数据通信双方进行身份认证,通过后授予区块链访问权限,结合加密算法、消息路由算法及消息接收算法,实现区块链上的物流仓储数据安全通信传输。实验结果表明,在物流仓储数据通信存在伪造攻击的情况下,数据传输成功率高达98.69%,设计的方法保障通信数据安全性。 展开更多
关键词 区块链技术 物流仓储数据 数据通信 安全通信方法
下载PDF
一种机动式系统的网络通信安全设计方法 被引量:1
2
作者 康望东 柳林 许桂明 《网络安全技术与应用》 2017年第6期34-37,共4页
近年来机动式信息系统发展迅速,由于其使用要求的特殊性,网络通信安全运行是保障机动式信息系统可靠运行的最重要基础之一。机动式系统的网络通信安全涉及信息安全、链路可用等多个方面,本文从工程设计角度出发,结合系统的安全要求提出... 近年来机动式信息系统发展迅速,由于其使用要求的特殊性,网络通信安全运行是保障机动式信息系统可靠运行的最重要基础之一。机动式系统的网络通信安全涉及信息安全、链路可用等多个方面,本文从工程设计角度出发,结合系统的安全要求提出一种网络通信的安全设计方法,对机动式信息系统建设有一定的参考意义。 展开更多
关键词 机动式信息系统 信息安全 网络通信 链路可用 网络通信安全设计方法
原文传递
A Method for Transferring an Unknown Quantum State and Its Application 被引量:1
3
作者 YAN Feng-Li HUO Hai-Rui 《Communications in Theoretical Physics》 SCIE CAS CSCD 2007年第4期629-632,共4页
We suggest a method for transferring an unknown quantum state. In this method the sender Alice first applies a controlled-not operation on the particle in the unknown quantum state and an ancillary particle which she ... We suggest a method for transferring an unknown quantum state. In this method the sender Alice first applies a controlled-not operation on the particle in the unknown quantum state and an ancillary particle which she wants to send to the receiver Bob. Then she sends the ancillary particle to Bob. When Alice is informed by Bob that the ancillary particle is received, she performs a local measurement on her particle and sends Bob the outcome of the local measurement via a classical channel. Depending on the outcome Bob can restore the unknown quantum state, which Alice destroyed, on the ancillary particle successfully. As an application of this method we propose a quantum secure direct communication protocol. By introducing the decoy qubits the security of the scheme is guaranteed. 展开更多
关键词 transferring unknown quantum state secure direct communication controlled-not operation
下载PDF
Recovery from Wormhole Attack in Mobile Ad Hoc Network (MANET)
4
作者 季晓君 田畅 张毓森 《Journal of Shanghai Jiaotong university(Science)》 EI 2006年第2期188-191,196,共5页
Wormhole attack is a serious threat against MANET (mobile ad hoc network) and its routing protocols. A new approach—tunnel key node identification (TKNI) was proposed. Based on tunnel-key-node identification and prio... Wormhole attack is a serious threat against MANET (mobile ad hoc network) and its routing protocols. A new approach—tunnel key node identification (TKNI) was proposed. Based on tunnel-key-node identification and priority-based route discovery, TKNI can rapidly rebuild the communications that have been blocked by wormhole attack. Compared to previous approaches, the proposed approach aims at both static and dynamic topology environment, involves addressing visible and invisible wormhole attack modes, requires no extra hardware, has a low overhead, and can be easily applied to MANET. 展开更多
关键词 mobile ad hoc network (MANET) SECURITY wormhole attack RECOVERY
下载PDF
Authenticated Key Agreement Protocol
5
作者 Massoud Hadian Dehkordi Reza Alimoradi 《China Communications》 SCIE CSCD 2010年第5期1-8,共8页
Key agreement and identification protocols are much applicable among current protocols in cryptography. These protocols are used for a secure communication through an insecure channel in a network like Internet. Chall... Key agreement and identification protocols are much applicable among current protocols in cryptography. These protocols are used for a secure communication through an insecure channel in a network like Internet. Challenge-response identification protocol is an important identification method. In this paper, by making some slight changes in the public-key-based challenge-response identification protocol, we have introduced a new scheme in which the users in addition to authenticating each other can also agree on multiple keys. Then, this protocol's security from both aspects regarding the identification and key agreement will be analyzed. At the end, we will prove our scheme has a high security and efficiency in comparison with some famous and similar protocols. 展开更多
关键词 IDENTIFICATION multiple key agreement PAIRING challenge-response strong security
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部