期刊文献+
共找到7篇文章
< 1 >
每页显示 20 50 100
数据库加密技术的研究与实现
1
作者 屈建明 王羡欠 杨旭士 《科技风》 2008年第11期113-113,共1页
针对数据库安全问题中的加密技术加以研究,将加密技术结合到数据库中,对数据库中的敏感数据进行加密,在这种加密方式的前提下,根据密钥使用的思想,选用对称加密算法,使授权用户可以使用不同数据密钥对加密字段中敏感数据进行加密。而数... 针对数据库安全问题中的加密技术加以研究,将加密技术结合到数据库中,对数据库中的敏感数据进行加密,在这种加密方式的前提下,根据密钥使用的思想,选用对称加密算法,使授权用户可以使用不同数据密钥对加密字段中敏感数据进行加密。而数据密钥本身又由密钥加密密钥进行加密保护,同时根据密钥的生命周期按时更换系统的密钥能够达到更好的安全效果。 展开更多
关键词 数据库加 清单 密钥管理器
下载PDF
可信生物特征识别身份鉴别协议框架标准实践 被引量:1
2
作者 李俊 柴海新 +1 位作者 沈明峰 常秉俭 《信息技术与标准化》 2021年第3期38-40,共3页
围绕在移动智能终端上实现安全、便捷并且保护用户隐私的身份认证,依据GB/T 36651-2018《信息安全技术基于可信环境的生物特征识别身份鉴别协议框架》,国民认证科技(北京)有限公司研制了基于终端生物识别的网络身份认证系统。该系统由... 围绕在移动智能终端上实现安全、便捷并且保护用户隐私的身份认证,依据GB/T 36651-2018《信息安全技术基于可信环境的生物特征识别身份鉴别协议框架》,国民认证科技(北京)有限公司研制了基于终端生物识别的网络身份认证系统。该系统由运行于设备侧的鉴别器和运行于服务侧的身份鉴别服务器组成,可用于金融、政务等行业应用服务提供方利用生物特征识别技术和终端设备可信环境技术对最终用户实现安全便捷的强身份鉴别。 展开更多
关键词 信息安全技术 可信环境 生物特征识别 GB/T36651-2018 密钥管理器 身份鉴别服务器
下载PDF
基于USB Key身份识别在VPN中的研究与实现 被引量:1
3
作者 褚新 《福建电脑》 2009年第12期117-118,共2页
利用现代计算机都带有USB接口的特点,采用USB密钥管理器进行身份识别登录VPN,能够安全存储私钥、证书、口令等机密信息,私钥的产生、加密、解密均在密钥管理器完成,与传统方法相比大大提高了安全性。
关键词 VPN 身份认证 USB密钥管理器
下载PDF
Key-insulated encryption based group key management for wireless sensor network 被引量:2
4
作者 邱卫东 周耀伟 +2 位作者 朱博 郑燕飞 龚征 《Journal of Central South University》 SCIE EI CAS 2013年第5期1277-1284,共8页
The key exposure problem is a practical threat for many security applications. In wireless sensor networks (WSNs), keys could be compromised easily due to its limited hardware protections. A secure group key managemen... The key exposure problem is a practical threat for many security applications. In wireless sensor networks (WSNs), keys could be compromised easily due to its limited hardware protections. A secure group key management scheme is responsible for secure distributing group keys among valid nodes of the group. Based on the key-insulated encryption (KIE), we propose a group key management scheme (KIE-GKMS), which integrates the pair-wise key pre-distribution for WSN. The KIE-GKMS scheme updates group keys dynamically when adding or removing nodes. Moreover, the security analysis proves that the KIE-GKMS scheme not only obtains the semantic security, but also provides the forward and backward security. Finally, the theoretical analysis shows that the KIE-GKMS scheme has constant performance on both communication and storage costs in sensor nodes. 展开更多
关键词 wireless sensor network data encryption group key management forward security key-insulated encryption
下载PDF
A FUNCTION NODE-BASED MULTIPLE PAIRWISE KEYS MANAGEMENT PROTOCOL FOR WIRELESS SENSOR NETWORKS AND ENERGY CONSUMPTION ANALYSIS
5
作者 Bi Jiana Wang Hui Sun Yandong Liu Yanzhao Ji Zhenzhou 《Journal of Electronics(China)》 2009年第5期692-698,共7页
In this letter, a Function node-based Multiple Pairwise Keys Management (MPKMF) protocol for Wireless Sensor Networks (WSNs) is firstly designed, in which ordinary nodes and cluster head nodes are responsible for data... In this letter, a Function node-based Multiple Pairwise Keys Management (MPKMF) protocol for Wireless Sensor Networks (WSNs) is firstly designed, in which ordinary nodes and cluster head nodes are responsible for data collection and transmission, and function nodes are responsible for key management. There are more than one function nodes in the cluster consulting the key generation and other security decision-making. The function nodes are the second-class security center because of the characteristics of the distributed WSNs. Secondly, It is also described that the formation of function nodes and cluster heads under the control of the former, and five kinds of keys, i.e., individual key, pairwise keys, cluster key, management key, and group key. Finally, performance analysis and experiments show that, the protocol is superior in communication and energy consumption. The delay of establishing the cluster key meets the requirements, and a multiple pairwise key which adopts the coordinated security authentication scheme is provided. 展开更多
关键词 Wireless Sensor Networks (WSNs) Function nodes Key management Energy consumption
下载PDF
Distributed Key Management Scheme against Sybil Attacks of Wireless Sensor Network
6
作者 Xu Junfeng Wang Yongjian 《China Communications》 SCIE CSCD 2012年第5期55-63,共9页
Wireless sensor network nodes (WSN nodes) have limited computing power, storage ca-pacity, conmmunication capabilities and energy and WSN nodes are easy to be paralyzed by Sybil at- tack. In order to prevent Sybil a... Wireless sensor network nodes (WSN nodes) have limited computing power, storage ca-pacity, conmmunication capabilities and energy and WSN nodes are easy to be paralyzed by Sybil at- tack. In order to prevent Sybil attacks, a new key distribution scheme for wireless sensor networks is presented. In this scheme, the key inforrmtion and node ID are associated, and then the attacker is dif-ficult to forge identity ID and the key inforrmtion corresponding to ID can not be forged. This scheme can use low-power to resist the Syhil attack and give full play to the resource advantages of the cluster head. The computing, storage and corrn^ni- cation is rminly undertaken by the cluster head o- verhead to achieve the lowest energy consumption and resist against nodes capture attack. Theoretical analysis and experimental results show that com- pared with the traditional scheme presented in Ref. [14], the capture rate of general nodes of cluster re-duces 40%, and the capture rate of cluster heads reduces 50%. So the scheme presented in this pa-per can improve resilience against nodes capture at- tack and reduce node power consumption. 展开更多
关键词 WSN sybil attack key distribution CLUSTER
下载PDF
A Loss-Tolerant Group Key Management Scheme with Revocation Capability for Wireless Sensor Network
7
作者 李林春 李建华 +1 位作者 易平 潘军 《Journal of Shanghai Jiaotong university(Science)》 EI 2009年第2期162-167,共6页
A new group key management scheme against the unreliable wireless communication channel and unsafe environment was proposed for wireless sensor network(WSN).In the proposed scheme,broadcast polynomial, generated over ... A new group key management scheme against the unreliable wireless communication channel and unsafe environment was proposed for wireless sensor network(WSN).In the proposed scheme,broadcast polynomial, generated over finite field F_q based on the secret sharing,was employed to revoke compromised sensor nodes.In order to tolerate key-update message loss,group session keys were generated as one-way hash chain sequence and distributed in advance.The analysis showes that the scheme has better performance in terms of the computation and communication overhead. 展开更多
关键词 management one-way hash chain broadcast polynomial node revocation loss-tolerant
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部