期刊文献+
共找到18篇文章
< 1 >
每页显示 20 50 100
XML密钥管理规范:XKMS 被引量:4
1
作者 程小刚 杨善林 《信息网络安全》 2003年第8期56-58,共3页
日益成为互联网上数据交换标准的XML语言,正在广泛应用于各行各业作为定义数据交换标准的元语言,同时新一代的分布计算模式WebServices也基于XML定义服务的描述、信息交换和服务的发布与发现,即越来越多的重要和敏感的数据、消息会在互... 日益成为互联网上数据交换标准的XML语言,正在广泛应用于各行各业作为定义数据交换标准的元语言,同时新一代的分布计算模式WebServices也基于XML定义服务的描述、信息交换和服务的发布与发现,即越来越多的重要和敏感的数据、消息会在互联网上以XML格式进行传送,所以对于XML文档的签名、加密突显重要,XKMS规范正是可为XML的签名、加密协议XML-SIG和XML-ENC提供密钥管理的服务. 展开更多
关键词 XML 管理规范 XKMS 信息安全 密钥信息
下载PDF
银行、保险信息系统密码和密钥规范研究
2
《中国金融电脑》 2004年第6期49-50,共2页
关键词 银行 保险 信息系统 《银行、保险信息 系统码和规范研究》
下载PDF
基于超混沌系统的网络用户隐私信息加密仿真 被引量:7
3
作者 韩飞 张葛祥 《计算机仿真》 北大核心 2021年第12期295-298,405,共5页
针对当前网络用户隐私信息加密方法,未考虑数据信息的敏感性,导致隐私信息加密效果较差、抗攻击性较弱的问题,提出基于超混沌系统的网络用户隐私信息加密方法。通过对原始数据的超混沌序列实施整合改造,生成有关明文数据的隐私信息密钥... 针对当前网络用户隐私信息加密方法,未考虑数据信息的敏感性,导致隐私信息加密效果较差、抗攻击性较弱的问题,提出基于超混沌系统的网络用户隐私信息加密方法。通过对原始数据的超混沌序列实施整合改造,生成有关明文数据的隐私信息密钥,增加信息序列敏感度。引入混沌映射,采用李雅普诺夫指数方式,赋予敏感值最小的信息数据,使隐私信息依次完成迭代推送,经过迭代后的数据,生成有关子密钥的混沌序列矩阵,利用矩阵对隐私信息逐一表达,并匹配相应子密钥,实现网络用户隐私信息加密。实验结果表明,所提方法的隐私信息加密效果较好,能够有效增强隐私信息抗攻击性。 展开更多
关键词 超混沌系统 网络用户 隐私信息 吞吐信息 扰动数据
下载PDF
CryptoAuthentication:多重加密,为安全护航
4
作者 韩霜 《世界电子元器件》 2014年第11期55-55,57,共2页
市场研究机构的Gartner最新研究显示,到2015年时,将有49亿件连网设备被人们使用,这一数量将比2014年增加30%;预计到2020年时,连网供用户使用的设备数量将达到200亿件。在整个社会以越来越快的速度步入互联时代的同时,有关于隐私、知识... 市场研究机构的Gartner最新研究显示,到2015年时,将有49亿件连网设备被人们使用,这一数量将比2014年增加30%;预计到2020年时,连网供用户使用的设备数量将达到200亿件。在整个社会以越来越快的速度步入互联时代的同时,有关于隐私、知识产权等涉及个人和企业等诸多问题愈发凸显出现出来。 展开更多
关键词 产品制造商 供用户使用 市场研究机构 互联时代 设备数量 连网 ATMEL 黑客攻击 密钥信息 非对称
下载PDF
代理签字算法在智能卡认证环境中的应用
5
作者 刘培顺 何大可 《西南交通大学学报》 EI CSCD 北大核心 2002年第3期295-298,共4页
智能卡可作为理想的密钥存储介质 ,但由于资源有限 ,在其内部做公钥运算效率较低。为解决这个问题 ,结合智能卡的特点 ,给出了一个基于代理签字算法的安全解决方案。实验表明 ,与其它方案相比具有高效的特点 。
关键词 代理签字算法 认证环境 码学 智能卡 IC卡 运算 密钥信息安全 存储卡
下载PDF
基于XKMS的网上专家评审安全方案的实现 被引量:1
6
作者 甘志勇 《现代计算机》 2005年第2期20-23,共4页
电子政务的迅速发展使得信息安全和验证用户身份越来越重要,PKI技术虽然可以解决数据完整性和数字签名等关键问题,但PKI缺乏标准的体系结构,在一定程度上限制了PKI的应用。本文首先介绍了XKMS的实现流程,在此基础上以网上专家评审为例,... 电子政务的迅速发展使得信息安全和验证用户身份越来越重要,PKI技术虽然可以解决数据完整性和数字签名等关键问题,但PKI缺乏标准的体系结构,在一定程度上限制了PKI的应用。本文首先介绍了XKMS的实现流程,在此基础上以网上专家评审为例,提出了基于XKMS规范的安全解决方案,使PKI功能和应用程序可以很好地结合在一起。 展开更多
关键词 XKMS规范 网上专家评审安全方案 信息安全 用户身份 PKI功能 密钥信息服务规范
下载PDF
METHOD FOR CONSTRUCTING TAG-KEM SCHEMES WITH SHORT-MESSAGE PUBLIC-KEY ENCRYPTIONS 被引量:1
7
作者 陈原 陈丹 董庆宽 《Transactions of Nanjing University of Aeronautics and Astronautics》 EI 2009年第4期301-305,共5页
Tag key encapsulation mechanism (Tag-KEM)/data encapsulation mechanism (DEM) is a hybrid framework proposed in 2005. Tag-t(EM is one of its parts by using public-key encryption (PKE) technique to encapsulate a ... Tag key encapsulation mechanism (Tag-KEM)/data encapsulation mechanism (DEM) is a hybrid framework proposed in 2005. Tag-t(EM is one of its parts by using public-key encryption (PKE) technique to encapsulate a symmetric key. In hybrid encryptions, the long-raessage PKE is not desired due to its slow operation. A general method is presented for constructing Tag-KEM schemes with short-message PKEs. The chosen ciphertext security is proved in the random oracle model. In the method, the treatment of the tag part brings no additional ciphertext redundancy. Among all the methods for constructing Tag-KEM, the method is the first one without any validity checking on the tag part, thus showing that the Tag-KEM/DEM framework is superior to KEM+DEM one. 展开更多
关键词 information security public-key encryption chosen ciphertext security Tag-KEM scheme
下载PDF
STRONGER PROVABLE SECURE MODEL FOR KEY EXCHANGE
8
作者 任勇军 王建东 +1 位作者 徐大专 庄毅 《Transactions of Nanjing University of Aeronautics and Astronautics》 EI 2009年第4期313-319,共7页
The key exchange is a fundamental building block in the cryptography. Several provable security models for the key exchange protocol are proposed. To determine the exact properties required by the protocols, a single ... The key exchange is a fundamental building block in the cryptography. Several provable security models for the key exchange protocol are proposed. To determine the exact properties required by the protocols, a single unified security model is essential, The eCK , eCK and CK models are examined and the result is proved that the eCK' model is the strongest provable security model for the key exchange. The relative security strength among these models is analyzed. To support the implication or non-implication relations among these models, the formal proofs and the counter-examples are given. 展开更多
关键词 network security CRYPTOGRAPHY information security key exchange protocol
下载PDF
校园一卡通的应用与改进
9
作者 卢隽 《科技与生活》 2011年第8期155-155,共1页
本文分析了目前一卡通在高等院校中的使用维护以及存在的问题,就此问题提出几点可行性改进建议,使之尽快成为财务与后勤管理的好助手。
关键词 一卡通 网络安全 圈存 密钥信息
下载PDF
Novel method of enhancing the key amount for FH systems 被引量:1
10
作者 沈斐 宋铁成 +2 位作者 叶芝慧 刘彤 夏玮玮 《Journal of Southeast University(English Edition)》 EI CAS 2004年第4期412-417,共6页
Based on the principle of information theory, a novel scheme of unequal-interval frequency-hopping (FH) systems was proposed. For cases of spectrum overlapping systems and non-overlapping systems, the implementation m... Based on the principle of information theory, a novel scheme of unequal-interval frequency-hopping (FH) systems was proposed. For cases of spectrum overlapping systems and non-overlapping systems, the implementation methods were presented and the security performances were discussed theoretically. Firstly, the definitions of absolute and relative key amounts of FH systems, equal-interval and unequal-interval FH systems were given. Then, the absolute key amount and relative key amount were analyzed for equal-interval and unequal-interval FH systems. The results indicated that the absolute key amount had become the key point in improving the security and secrecy of FH systems, especially in today's epoch of highly developed computer science and IC design technology. Theoretical analysis and practical examples showed that the absolute key amount of unequal-interval FH systems was generally over two orders larger than that of equal-interval ones when spectrum overlapping was allowable. Therefore, there was great superiority in enhancing the security and secrecy for the scheme mentioned. 展开更多
关键词 Frequency shift keying Information theory Integrated circuits Security of data
下载PDF
在Windows 10中灵活管理数据
11
作者 郭建伟(文/图) 《电脑知识与技术(经验技巧)》 2019年第5期30-32,共3页
对于操作系统来说,如何更好地存储和管理数据,是其必须面对的问题。同之前的版本相比,Windows 10具有界面新颖、功能强大等特点。值得注意的是,在Windows 10中内置了一些新型的数据管理方式,可以帮助用户保管好自己的数据。一、实现目... 对于操作系统来说,如何更好地存储和管理数据,是其必须面对的问题。同之前的版本相比,Windows 10具有界面新颖、功能强大等特点。值得注意的是,在Windows 10中内置了一些新型的数据管理方式,可以帮助用户保管好自己的数据。一、实现目录受控访问对于敏感的数据,我们不希望别人随意接触。 展开更多
关键词 系统盘 文件夹 WINDOWS 10 磁盘空间 活动目录 存储空间 存储池 密钥信息 驱动器
下载PDF
简单操作,让Windows 7本本更好用
12
作者 郭建伟 《电脑知识与技术(经验技巧)》 2017年第2期87-90,共4页
虽然说Wndows 8/10等系统逐渐普及,但是Windows 7以其独特的魅力得到主流用户的青睐。对于很多本本用户来说,安装的都是Windows 7系统。当然,新的系统具有一些新的功能,这是Windows 7所不具备的。因此,对于众多的Windows 7本本用户来说,... 虽然说Wndows 8/10等系统逐渐普及,但是Windows 7以其独特的魅力得到主流用户的青睐。对于很多本本用户来说,安装的都是Windows 7系统。当然,新的系统具有一些新的功能,这是Windows 7所不具备的。因此,对于众多的Windows 7本本用户来说,为Windows 7增加新的功能,使其变得更加好用,无疑可以提高本本的使用效能,这里就从让Windows 7拥有新的风格的WinRE环境, 展开更多
关键词 主流用户 系统盘 文件保存 密钥信息 修复工具 WINDOWS 7 弹出菜单 批处理文件 启动项 启动菜单
下载PDF
Asymmetrical Quantum Encryption Protocol Based on Quantum Search Algorithm 被引量:2
13
作者 LUO Wenjun LIU Guanli 《China Communications》 SCIE CSCD 2014年第9期104-111,共8页
Quantum cryptography and quantum search algorithm are considered as two important research topics in quantum information science.An asymmetrical quantum encryption protocol based on the properties of quantum one-way f... Quantum cryptography and quantum search algorithm are considered as two important research topics in quantum information science.An asymmetrical quantum encryption protocol based on the properties of quantum one-way function and quantum search algorithm is proposed.Depending on the no-cloning theorem and trapdoor one-way functions of the publickey,the eavesdropper cannot extract any private-information from the public-keys and the ciphertext.Introducing key-generation randomized logarithm to improve security of our proposed protocol,i.e.,one privatekey corresponds to an exponential number of public-keys.Using unitary operations and the single photon measurement,secret messages can be directly sent from the sender to the receiver.The security of the proposed protocol is proved that it is informationtheoretically secure.Furthermore,compared the symmetrical Quantum key distribution,the proposed protocol is not only efficient to reduce additional communication,but also easier to carry out in practice,because no entangled photons and complex operations are required. 展开更多
关键词 quantum cryptography asymmetrical encryption information-theoreticalsecurity quantum search algorithms
下载PDF
Enhanced biometric encryption algorithm for private key protection in BioPKI system
14
作者 Cheol-Joo Chae Kwang-Nam Choi +2 位作者 Kiseok Choi Jae-Soo Kim Yong Ju Shin 《Journal of Central South University》 SCIE EI CAS 2014年第11期4286-4290,共5页
Protection of private key is the most critical part in public key infrastructure(PKI) system since it depends on the confidentiality of private key. Thread of password detection has been known as the vulnerability in ... Protection of private key is the most critical part in public key infrastructure(PKI) system since it depends on the confidentiality of private key. Thread of password detection has been known as the vulnerability in this PKI system. Recently, studies have been conducted on Bio PKI system that uses the biometric information of users in order to replace the password type of private key protection in PKI system. However, Bio PKI system also has vulnerability in that biometric information used for protection of private key cannot be reused once it is stolen or lost. So, we propose the method to protect the private key using FIDSEQi which binds sequence to biometric information. The proposed method enhances reusability of biometric information and presents higher attack complexity than the method of authentication by cross matching single biometric information. 展开更多
关键词 BioPKI system fingerprint biometric encryption secret share
下载PDF
Quantum Key Distribution without Signal Disturbance Monitoring
15
《Bulletin of the Chinese Academy of Sciences》 2015年第4期235-235,共1页
Researchers from the CAS Key Laboratory of Quantum Information,University of Science and Technology of China have just achieved a significant progress in quantum key distribution research.Based on the self-developed a... Researchers from the CAS Key Laboratory of Quantum Information,University of Science and Technology of China have just achieved a significant progress in quantum key distribution research.Based on the self-developed active switching technology,they successfully conducted the world's longest-more than 90km-round-robin differential phase shift(RRDPS)quantum key distribution experiment. 展开更多
关键词 switching robin disturbance intellectual verified correctly Photonics compromise interferometer independence
下载PDF
Three-step semiquantum secure direct communication protocol 被引量:12
16
作者 ZOU XiangFu QIU DaoWen 《Science China(Physics,Mechanics & Astronomy)》 SCIE EI CAS 2014年第9期1696-1702,共7页
Quantum secure direct communication is the direct communication of secret messages without need for establishing a shared secret key first.In the existing schemes,quantum secure direct communication is possible only w... Quantum secure direct communication is the direct communication of secret messages without need for establishing a shared secret key first.In the existing schemes,quantum secure direct communication is possible only when both parties are quantum.In this paper,we construct a three-step semiquantum secure direct communication(SQSDC)protocol based on single photon sources in which the sender Alice is classical.In a semiquantum protocol,a person is termed classical if he(she)can measure,prepare and send quantum states only with the fixed orthogonal quantum basis{|0,|1}.The security of the proposed SQSDC protocol is guaranteed by the complete robustness of semiquantum key distribution protocols and the unconditional security of classical one-time pad encryption.Therefore,the proposed SQSDC protocol is also completely robust.Complete robustness indicates that nonzero information acquired by an eavesdropper Eve on the secret message implies the nonzero probability that the legitimate participants can find errors on the bits tested by this protocol.In the proposed protocol,we suggest a method to check Eves disturbing in the doves returning phase such that Alice does not need to announce publicly any position or their coded bits value after the photons transmission is completed.Moreover,the proposed SQSDC protocol can be implemented with the existing techniques.Compared with many quantum secure direct communication protocols,the proposed SQSDC protocol has two merits:firstly the sender only needs classical capabilities;secondly to check Eves disturbing after the transmission of quantum states,no additional classical information is needed. 展开更多
关键词 quantum secure direct communication semiquantum complete robustness security
原文传递
Public-key encryption and authentication of quantum information 被引量:7
17
作者 LIANG Min YANG Li 《Science China(Physics,Mechanics & Astronomy)》 SCIE EI CAS 2012年第9期1618-1629,共12页
Public-key cryptosystems for quantum messages are considered from two aspects:public-key encryption and public-key authentication.Firstly,we propose a general construction of quantum public-key encryption scheme,and t... Public-key cryptosystems for quantum messages are considered from two aspects:public-key encryption and public-key authentication.Firstly,we propose a general construction of quantum public-key encryption scheme,and then construct an informationtheoretic secure instance.Then,we propose a quantum public-key authentication scheme,which can protect the integrity of quantum messages.This scheme can both encrypt and authenticate quantum messages.It is information-theoretic secure with regard to encryption,and the success probability of tampering decreases exponentially with the security parameter with regard to authentication.Compared with classical public-key cryptosystems,one private-key in our schemes corresponds to an exponential number of public-keys,and every quantum public-key used by the sender is an unknown quantum state to the sender. 展开更多
关键词 quantum cryptography AUTHENTICATION quantum public-key private quantum channel
原文传递
Single-photon detection and its applications 被引量:8
18
作者 LIANG Yan ZENG HePing 《Science China(Physics,Mechanics & Astronomy)》 SCIE EI CAS 2014年第7期1218-1232,共15页
A single-photon detector is an extremely sensitive device capable of registering photons,offering essential technical support for optics quantum information applications.We review herein our recent experimental progre... A single-photon detector is an extremely sensitive device capable of registering photons,offering essential technical support for optics quantum information applications.We review herein our recent experimental progress in the development and application of single-photon detection techniques.Techniques based on advanced self-differencing,low-pass filtering,frequency up-conversion and photon-number-resolving are introduced for attaining high-speed,high-efficiency,low-noise single-photon detection at infrared wavelengths.The advantages of high-speed single-photon detection are discussed in some applications,such as the laser ranging and quantum key distribution.The photon-number-resolving detection is shown to support efficient quantum random number generation. 展开更多
关键词 quantum optics PHOTODETECTION avalanche photodiode frequency up-conversion
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部