期刊文献+
共找到8篇文章
< 1 >
每页显示 20 50 100
移动医疗应用程序的开发与移动安全性
1
作者 潘永红 童志镇 《中国高新科技》 2023年第23期29-31,共3页
移动医疗应用程序的开发与移动安全性密不可分。在开发这些应用程序时,确保用户医疗数据的安全性和隐私保护至关重要。这包括数据加密、访问控制和严格的合规性措施,以防止数据泄露和未经授权的访问。同时,应用程序的性能优化也很关键,... 移动医疗应用程序的开发与移动安全性密不可分。在开发这些应用程序时,确保用户医疗数据的安全性和隐私保护至关重要。这包括数据加密、访问控制和严格的合规性措施,以防止数据泄露和未经授权的访问。同时,应用程序的性能优化也很关键,以提供快速响应和流畅的用户体验。综合考虑这些因素,移动医疗应用程序可以提供高质量的医疗服务,同时确保用户数据的安全性和完整性。 展开更多
关键词 移动医疗 开发 移动安全性
下载PDF
关于移动IPv6安全问题的研究 被引量:1
2
作者 殷红 王庆生 《中国新通信》 2010年第7期15-19,共5页
移动IPv6作为一种全新的因特网络标准出现,不但继承了移动IPv4的优点,同时在安全性等方面做出了很大程度的修改和补充。对移动IPv6面临的主要安全问题以及移动IPv6的几种安全机制进行了分析。
关键词 移动IPV6 安全威胁 安全机制 移动网络协议安全性 返回路由可达过程
下载PDF
智能防疫消杀机器人安全性及有效性研究
3
作者 宋阳阳 张在爱 +5 位作者 方良艳 赵旭 宋宁宁 陈一依 王瑞 张克 《中国医疗设备》 2024年第11期12-16,26,共6页
目的探究消杀机器人安全性和有效性的研究方法,为消杀机器人评价方法的建立提供依据。方法通过调整障碍位置并固定推拉力计,测试消杀机器人的可识别障碍范围、盲区位置、物理碰撞力度,分析消杀机器人移动安全性;利用电气安全分析仪和耐... 目的探究消杀机器人安全性和有效性的研究方法,为消杀机器人评价方法的建立提供依据。方法通过调整障碍位置并固定推拉力计,测试消杀机器人的可识别障碍范围、盲区位置、物理碰撞力度,分析消杀机器人移动安全性;利用电气安全分析仪和耐压仪,分析消杀机器人电气安全性;利用粒度分析仪测试消杀机器人的超声雾化量、粒径分布,并根据《消毒技术规范》对物体表面的喷雾消杀效果进行评价。结果消杀机器人的3种避障方式对不同高度障碍物的识别能力差别大,且存在多个盲区,物理触边传感器可有效地对其盲区内的碰撞进行防护;消杀机器人可触及电压电流和介电强度符合GB 4793.1-2007的要求;消杀机器人的平均雾化粒径值<5μm,消杀效果受相对位置影响较大,对于与消杀机器人喷雾出口等高的物体表面消杀效果好,对较低的物体表面的消杀效果不理想。结论本文提出的安全有效性研究方法是可行的,可为建立消杀机器人评价方法提供依据。 展开更多
关键词 消杀机器人 移动安全性 电气安全性 超声雾化量 粒径分布 可识别障碍范围 盲区位置 物理碰撞力度
下载PDF
A Secure-Efficient Data Collection Algorithm Based on Self-Adaptive Sensing Model in Mobile Internet of Vehicles 被引量:1
4
作者 LIANG Wei RUAN Zhiqiang +1 位作者 TANG Mingdong LI Peng 《China Communications》 SCIE CSCD 2016年第2期121-129,共9页
Existing research on data collection using wireless mobile vehicle network emphasizes the reliable delivery of information.However,other performance requirements such as life cycle of nodes,stability and security are ... Existing research on data collection using wireless mobile vehicle network emphasizes the reliable delivery of information.However,other performance requirements such as life cycle of nodes,stability and security are not set as primary design objectives.This makes data collection ability of vehicular nodes in real application environment inferior.By considering the features of nodes in wireless IoV,such as large scales of deployment,volatility and low time delay,an efficient data collection algorithm is proposed for mobile vehicle network environment.An adaptive sensing model is designed to establish vehicular data collection protocol.The protocol adopts group management in model communication.The vehicular sensing node in group can adjust network sensing chain according to sensing distance threshold with surrounding nodes.It will dynamically choose a combination of network sensing chains on basis of remaining energy and location characteristics of surrounding nodes.In addition,secure data collection between sensing nodes is undertaken as well.The simulation and experiments show that the vehicular node can realize secure and real-time data collection.Moreover,the proposed algorithm is superior in vehicular network life cycle,power consumption and reliability of data collection by comparing to other algorithms. 展开更多
关键词 wireless vehicle network datacollection protocol network sensing chain self'-adaptive sensing sensing distance threshold.
下载PDF
Cluster Based Secure Dynamic Keying Technique for Heterogeneous Mobile Wireless Sensor Networks 被引量:1
5
作者 Thiruppathy Kesavan.V Radhakrishnan.S 《China Communications》 SCIE CSCD 2016年第6期178-194,共17页
In Heterogeneous Wireless Sensor Networks, the mobility of the sensor nodes becomes essential in various applications. During node mobility, there are possibilities for the malicious node to become the cluster head or... In Heterogeneous Wireless Sensor Networks, the mobility of the sensor nodes becomes essential in various applications. During node mobility, there are possibilities for the malicious node to become the cluster head or cluster member. This causes the cluster or the whole network to be controlled by the malicious nodes. To offer high level of security, the mobile sensor nodes need to be authenticated. Further, clustering of nodes improves scalability, energy efficient routing and data delivery. In this paper, we propose a cluster based secure dynamic keying technique to authenticate the nodes during mobility. The nodes with high configuration are chosen as cluster heads based on the weight value which is estimated using parameters such as the node degree, average distance, node's average speed, and virtual battery power. The keys are dynamically generated and used for providing security. Even the keys are compromised by the attackers, they are not able to use the previous keys to cheat or disuse the authenticated nodes. In addition, a bidirectional malicious node detection technique is employed which eliminates the malicious node from the network. By simulation, it is proved that the proposed technique provides efficient security with reduced energy consumption during node mobility. 展开更多
关键词 CLUSTER dynamic key HETEROGENEOUS MOBILITY wireless sensor network WEIGHT
下载PDF
Pseudo-Location Updating System for Privacy-Preserving Location-Based Services
6
作者 牛犇 朱晓妍 +1 位作者 池浩田 李晖 《China Communications》 SCIE CSCD 2013年第9期1-12,共12页
With the rapid development of location-aware devices such as smart phones,Location-Based Services(LBSs) are becoming increasingly popular. Users can enjoy convenience by sending queries to LBS servers and obtaining se... With the rapid development of location-aware devices such as smart phones,Location-Based Services(LBSs) are becoming increasingly popular. Users can enjoy convenience by sending queries to LBS servers and obtaining service information that is nearby.However, these queries may leak the users' locations and interests to the un-trusted LBS servers, leading to serious privacy concerns. In this paper, we propose a Privacy-Preserving Pseudo-Location Updating System(3PLUS) to achieve k-anonymity for mobile users using LBSs. In 3PLUS, without relying on a third party, each user keeps pseudo-locations obtained from both the history locations and the encountered users, and randomly exchanges one of them with others when encounters occur. As a result, each user's buffer is disordered. A user can obtain any k locations from the buffer to achieve k-anonymity locally. The security analysis shows the security properties and our evaluation results indicate that the user's privacy is significantly improved. 展开更多
关键词 pseudo-location K-ANONYMITY pri-vacy LBS
下载PDF
China’s National Research Project on Future Internet: Objectives, Ideas, and Progresses
7
作者 Zhang Hongke Luo Hongbin 《China Communications》 SCIE CSCD 2009年第1期128-138,共11页
The Internet today was designed in 1970s and is suffering various serious issues such as security, mobility and scalability. In order to deal with these issues, a national research project, supported by the prestigiou... The Internet today was designed in 1970s and is suffering various serious issues such as security, mobility and scalability. In order to deal with these issues, a national research project, supported by the prestigious National Basic Research Program (also called the "973 program") of China, was launched in May 2007. This project adopts a clean-slate approach and aims to design a novel future Internet that not only inherits the merit of the Internet today but also overcomes the drawbacks of the current Internet. In this paper, we make an overview of this project with a focus on its objectives, basic ideas, and progresses. Although this is a basic research project, its success will bring significant benefits to China as well as all other countries in the world. 展开更多
关键词 future Internet Internet architecture SECURITY SCALABILITY MOBILITY
下载PDF
Technology Trends and Architecture Research for Future Mobile Internet
8
作者 吴建平 李贺武 +3 位作者 孙文琦 吴茜 江卓 赵玮 《China Communications》 SCIE CSCD 2013年第6期14-27,共14页
With the rapid development of wireless transmission technologies and the proliferation of mobile terminals, the mobile Internet has experienced exponential growth in recent years. However, at the same time, it is also... With the rapid development of wireless transmission technologies and the proliferation of mobile terminals, the mobile Internet has experienced exponential growth in recent years. However, at the same time, it is also facing more challenges, particularly regarding bandwidth, address space, security, mobility, and energy. In this article, we analyse the five abovementioned challenges and then survey related technology trends. We also describe the progress of architecture research aimed at the future mobile Internet. We reach the conclusion that a single technology cannot solve all the problems of mobile Internet, and future research should focus more on how to make architectures and technologies work together more effectively. 展开更多
关键词 mobile Internet network architecture IPV6
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部