期刊文献+
共找到17篇文章
< 1 >
每页显示 20 50 100
基于GB/T 25062-2010的统一用户认证管理系统在数字图书馆中的应用浅析
1
作者 张良 吴天宇 +2 位作者 肖银涛 冯自强 陈华 《工业和信息化教育》 2016年第3期46-51,共6页
本文介绍了基于国家标准GB/T 25062-2010的统一用户认证管理系统的设计与实现以及在数字图书馆中的应用成果。首先研究了GB/T 25062-2010的发展过程和核心模型,然后重点对统一用户认证管理系统进行设计,最后介绍了该系统的实现和应用情... 本文介绍了基于国家标准GB/T 25062-2010的统一用户认证管理系统的设计与实现以及在数字图书馆中的应用成果。首先研究了GB/T 25062-2010的发展过程和核心模型,然后重点对统一用户认证管理系统进行设计,最后介绍了该系统的实现和应用情况。该系统具有很强的通用性和可扩展性,在企业应用系统开发中具有一定的参考价值。 展开更多
关键词 GB/T25062-2010 RBAC 统-认证 权限管理 软件复用
下载PDF
Fingerprint Liveness Detection Based on Multi-Scale LPQ and PCA 被引量:13
2
作者 Chengsheng Yuan Xingming Sun Rui Lv 《China Communications》 SCIE CSCD 2016年第7期60-65,共6页
Fingerprint authentication system is used to verify users' identification according to the characteristics of their fingerprints.However,this system has some security and privacy problems.For example,some artifici... Fingerprint authentication system is used to verify users' identification according to the characteristics of their fingerprints.However,this system has some security and privacy problems.For example,some artificial fingerprints can trick the fingerprint authentication system and access information using real users' identification.Therefore,a fingerprint liveness detection algorithm needs to be designed to prevent illegal users from accessing privacy information.In this paper,a new software-based liveness detection approach using multi-scale local phase quantity(LPQ) and principal component analysis(PCA) is proposed.The feature vectors of a fingerprint are constructed through multi-scale LPQ.PCA technology is also introduced to reduce the dimensionality of the feature vectors and gain more effective features.Finally,a training model is gained using support vector machine classifier,and the liveness of a fingerprint is detected on the basis of the training model.Experimental results demonstrate that our proposed method can detect the liveness of users' fingerprints and achieve high recognition accuracy.This study also confirms that multi-resolution analysis is a useful method for texture feature extraction during fingerprint liveness detection. 展开更多
关键词 fingerprint liveness detection wavelet transform local phase quantity principal component analysis support vector machine
下载PDF
An Enhanced Direct Anonymous Attestation Scheme with Mutual Authentication for Network-Connected UAV Communication Systems 被引量:3
3
作者 Liquan Chen Sijie Qian +1 位作者 Ming Lim Shihui Wang 《China Communications》 SCIE CSCD 2018年第5期61-76,共16页
In network-connected UAV(NCUAV) communication systems, user authentication is replaced by platform identity authentication and integrity check because many NC-UAVs are operated without human intervention. Direct anony... In network-connected UAV(NCUAV) communication systems, user authentication is replaced by platform identity authentication and integrity check because many NC-UAVs are operated without human intervention. Direct anonymous attestation(DAA) is an attractive cryptographic scheme that provides an elegant balance between platform authentication and anonymity. However, because of the low-level computing capability and limited transmission bandwidth in UAV, the existing DAA schemes are not suitable for NC-UAV communication systems. In this paper, we propose an enhanced DAA scheme with mutual authentication(MA-DAA scheme), which meets the security requirements of NC-UAV communication systems. The proposed MA-DAA scheme, which is based on asymmetric pairings, bundles the identities of trusted platform module(TPM) and Host to solve the malicious module changing attacks. Credential randomization, batch proof and verification, and mutual authentication are realized in the MA-DAA scheme. The computational workload in TPM and Host is reduced in order to meet the low computation and resource requirements in TPM and Host.The entire scheme and protocols are presented,and the security and efficiency of the proposed MA-DAA scheme are proved and analyzed.Our experiment results also confirm the high efficiency of the proposed scheme. 展开更多
关键词 network-connected UAV trusted computing direct anonymous attestation mutual authentication trusted platform module
下载PDF
SYSTEM IDENTIFICATION METHOD OF LINEAR AND NON-LINEAR LIQUID PREPARATIVECHROMATOGRAPHIC SEPARATION
4
作者 Shu Wenli Li Zhong +1 位作者 Huang Peiquan Lin Qingsheng 《Chinese Journal of Reactive Polymers》 1997年第1期13-21,共9页
The paper proposes the identification method of linear and non-linear chromatographic system. Isotherms and lumped mass transfer coefficients of chromatography separating isomer sorbitol and mannitol on D80 adsorbent ... The paper proposes the identification method of linear and non-linear chromatographic system. Isotherms and lumped mass transfer coefficients of chromatography separating isomer sorbitol and mannitol on D80 adsorbent are determined. The analyses of root mean square error of chromatography elution curves are carried out. The results show that the system studied is non-linear and the theoretical elution curves of the non-linear chromatographic model are more accurate than those of the linear chromatographic model. Results of parameter sensitivity analyses show that elution curves of non-linear chromatographic separation are more sensitive to the variation of parameter "ai" in the adsorption isotherms than to the variation of parameter "bi" as well as lumped mass transfer coefficients. 展开更多
关键词 Non-linear Chromatography System Identification Separation.
下载PDF
E-commerce security policy analysis
5
作者 Maarina 《International Journal of Technology Management》 2014年第11期46-47,共2页
In today' s 21st century of IT, e-commerce began to develop rapidly. Among them, in the process of e-commerce implementation, it is mainly to ensure system security issues. Based primarily on this issue, we discussed... In today' s 21st century of IT, e-commerce began to develop rapidly. Among them, in the process of e-commerce implementation, it is mainly to ensure system security issues. Based primarily on this issue, we discussed issues related to certification systems, SSL protocol as well as SET protocol. In addition, the article also describes the business several other safety-related technology. 展开更多
关键词 e-commerce security authentication system SSLX agreement SET protocol
下载PDF
Children witness --a systematic research
6
作者 Li Yang 《International English Education Research》 2014年第7期40-42,共3页
In China, children witness has not been articled in three procedural laws, some scholar do not think that either children nor other person with no legal capacity should have witness qualification.In fact, although som... In China, children witness has not been articled in three procedural laws, some scholar do not think that either children nor other person with no legal capacity should have witness qualification.In fact, although some other countries do not admit the qualification of children witnesses under certain age, they do not take it as the factor to measure whether a witness has qualification or not. It is the judge who can decide whether a witness has qualification or not. Based on the these foreign countries's experience, we should not limit the qualification of children witnesses in the legislation. However, for the particularity of children's cognitive ability, we should embody this particularity when we judge children's testimony and protect children witnesses. 展开更多
关键词 Children witness witness qualification witness protection testimony scrutiny
下载PDF
Simple and Low-Cost Re-Authentication Protocol for HeNB 被引量:1
7
作者 赖成喆 李晖 +1 位作者 张跃宇 曹进 《China Communications》 SCIE CSCD 2013年第1期105-115,共11页
The 3rd Generation Partnership Project(3GPP)defined a new architecture,called Home eNode B(HeNB).The 3GPP has also presented a protocol for communications between HeNB and core networks for mutual authentication.To re... The 3rd Generation Partnership Project(3GPP)defined a new architecture,called Home eNode B(HeNB).The 3GPP has also presented a protocol for communications between HeNB and core networks for mutual authentication.To reduce the authentication costs associated with communication,computation and energy,this paper proposes a simple and low-cost re-authentication protocol that does not compromise the provided security services.The proposed protocol uses as the re-authentication parameter a Master Session Key(MSK)that has already been computed in the initial authentication,and does not require the full initial authentication to be repeated.Moreover,the proposed protocol does not modify the 3GPP infrastructure,and is easily applied to the HeNB system.Finally,the security of the proposed protocol is verified by Automated Validation of Internet Security Protocols and Applications(AVISPA)and Burrows-Abadi-Needham(BAN)Logic;detailed evaluations of performance are also given.The analysis results illustrate that the proposed protocol can achieve at least 50%cost reduction in communication and 58%cost reduction in energy.The computational cost is also reduced by half compared with the initial authentication. 展开更多
关键词 HeNB AUTHENTICATION SECURITY 3GPP
下载PDF
A MEMS stronglink with multi-try function used for PC startup in authentication system
8
作者 李胜勇 陈文元 +3 位作者 张卫平 肖奇军 谈顺毅 冯敏华 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2009年第2期159-164,共6页
The stronglink with muhi-try function based on MEMS technology and the PC startup in authentication system have been designed and fabricated. The generation principle and structure of UQS code are introduced, which co... The stronglink with muhi-try function based on MEMS technology and the PC startup in authentication system have been designed and fabricated. The generation principle and structure of UQS code are introduced, which consists of two groups of metal counter-meshing gears, two pawl/ratchet mechanisms, two driving micromotors and two resetting micromotors. The energy-coupling element is a photoelectric sensor with a circular and notched plate. It is fabricated using the UV-LiGA process and precision mechanical engineering. The PC startup authentication system is controlled by BIOS program, which is written into the chip according with special format. The program in BIOS output signals controls the running of stronglink to finish the process of authentication. The device can run more than 10000 times before a stop. The driving voltage is 12 V, and the normal decoding time is 3 s. 展开更多
关键词 stronglink multi-try UQS AUTHENTICATION PC startup
下载PDF
A New Multi-platform Data Acquisition System for Power Quality Metrological Certification
9
作者 Maurizio Caciotta Stefano Di Pasquale Sabino Giametti Fabio Leccese Daniele Trinca 《Journal of Energy and Power Engineering》 2014年第7期1279-1285,共7页
In order to provide power quality monitoring activities with metrological certification, a DAS (data acquisition system) has been designed, realized and characterized. The system allows acquisition on tri-phases plu... In order to provide power quality monitoring activities with metrological certification, a DAS (data acquisition system) has been designed, realized and characterized. The system allows acquisition on tri-phases plus neutral lines picking up 499 samples per period of the fundamental at 50 Hz. To ensure certified measurements, the system gets external certified time and voltage references. The system uses a FTDI Virtual Com Port Driver to communicate data over High Speed RS232 virtual interface and it does not need any advanced programming skill. The choice to use a virtual serial communication makes the data acquisition software portable over many platforms, regardless by the development environment and by the programming language. To test the proposed device some custom software have been written in many programming language (C^#, VB6, LabView, MatLab), moreover in order to characterize the device the most common ADC (analog to digital converter) performing test have been applied. 展开更多
关键词 Power quality acquisition card multi-platform system.
下载PDF
Security of Application System 被引量:1
10
作者 李小平 钟宏 +5 位作者 丁俨 向智 胡海生 吴学林 张琦 朱建学 《Journal of Beijing Institute of Technology》 EI CAS 2002年第2期198-202,共5页
A safe and reliable application system frame based on Internet and Intranet for Stock Supervision and Administration Council of China is built up. An all sided, multi tier and multi technical security method has be... A safe and reliable application system frame based on Internet and Intranet for Stock Supervision and Administration Council of China is built up. An all sided, multi tier and multi technical security method has been adopted, which includes identity recognition, data encryption, digital signature, Domino and WWW servers, access control list, directory service, certificate authorization server, IC card and so on. The recognition system based on CA server is a high efficient, convenient and reliable system. The encryption technology and security method are proved to be reliable. The recognition system is of high security and is worthy of being popularized in some places where some special security requirements need meeting. Multi tier technology can improve the security of database. Double keys method is a useful data encryption method. 展开更多
关键词 INTERNET/INTRANET identity recognition data encryption digital signature security mechanism
下载PDF
Improved Keystroke Authentication Accuracy Based on Statistics and Weight 被引量:2
11
作者 Li Jian Guo Xiaojing +1 位作者 Li Meiyun Li Ruifan 《China Communications》 SCIE CSCD 2012年第7期36-41,共6页
Abstract: In order to improve the recognition accuracy of key stroke authentication, a methodology based on feature extraction of keystroke sequence is presented in this paper. Firstly, the data of the users' keystr... Abstract: In order to improve the recognition accuracy of key stroke authentication, a methodology based on feature extraction of keystroke sequence is presented in this paper. Firstly, the data of the users' keystroke feature information that has too much deviation with the mean deviation is filtered out. Secondly, the probability of each input key is calculated and 10 values which do not have the best features are selected. Thirdly, they are weighed and a score evaluating the extent to which the user could be authenticated successfully is calculated. The benefit of using a third-party data set is more objective and comparable. At last, 展开更多
关键词 AUTHENTICATION BIOMETRICS keystroke dynamics
下载PDF
Children witness a systematic research
12
作者 Li Yang 《International English Education Research》 2014年第6期13-15,共3页
in China, children witness has not been articled in three procedural laws, some scholar do not think that either children nor other person with no legal capacity should have witness qualification.in fact, although som... in China, children witness has not been articled in three procedural laws, some scholar do not think that either children nor other person with no legal capacity should have witness qualification.in fact, although some other countries do not admit the qualification of children witnesses under certain age,they do not take it as the factor to measure whether a witness has qualification or not.It is the judge who can decide whether a witness has qualification or not.Based on the these foreign counlries' s experience,we should not limit the qualification of children witnesses in the legislation. However, for the particularity of children's cognitive ability,we should embody this particularity when we judge children's testimony and protect children witnesses. 展开更多
关键词 Children witness witness qualification witness protection testimony scrutiny
下载PDF
The organizational structure for environmental protection in Malaysia
13
作者 Hanim Norza Baba Kamaruzaman Jusoff 《Journal of Environmental Science and Engineering》 2009年第3期64-69,共6页
Management has addressed the critical issue of environmental protection by developing environmental management systems. The purpose of this research is to describe the organizational structure for environmental protec... Management has addressed the critical issue of environmental protection by developing environmental management systems. The purpose of this research is to describe the organizational structure for environmental protection, an attribute of environmental management systems of privately held companies, certified with MS ISO 14001. Descriptive statistics are reported for the primary data. The commonly reported attributes provide evidence of high-level commitment to environmental protection: written environmental policy statement, corporate-level environmental management function, and Board of Directors' responsibility for oversight of environmental affairs. Findings indicate that companies have educational programs and environmental goals to disseminate environmental management values throughout their organizations. 展开更多
关键词 environmental management system PROTECTION IMPACT ISO 14001
下载PDF
Signature Verification for Multiuser Online Kanji Learning System
14
作者 Jungpil Shin Junichi Sato 《Computer Technology and Application》 2012年第3期211-218,共8页
Multiuser online system is useful, but the administrator must be nervous at security problem. To solve this problem, the authors propose applying signature verification to multiuser online system. At the authors' res... Multiuser online system is useful, but the administrator must be nervous at security problem. To solve this problem, the authors propose applying signature verification to multiuser online system. At the authors' research, they attempt adding signature verification function based on DP (Dynamic Programming) matching to existing multiuser online kanji learning system. In this paper, the authors propose the construction of the advance system and methods of signature verification, and evaluate performance of those signature verification methods that difference is combination of using features. From signature verification's experimental results, the authors adopted to use writing velocity and writing speed differential as using feature to verify the writer for the system. By using signature database which is construct with 20 genuine signatures and 20 forged signatures with 40 writers and written mostly by English or Chinese literal, experimental results of signature verification records 12.71% as maximum EER (Equal Error Rate), 6.00% as minimum EER, and 8.22% as average EER. From mentioned above, the authors realized to advance the reliability and usefulness of the multiuser online kanji learning system. 展开更多
关键词 Signature verification character learning method dynamic programming.
下载PDF
Suggestion of Criteria and Certification Process to Secure the Safety of Railway Software
15
作者 Eui Jin Joung 《Journal of Energy and Power Engineering》 2012年第5期809-816,共8页
One of the significant differences between the digital system and the analog system is software. The software takes charge of the functions and the management of the digital system. Nowadays railway equipment has begu... One of the significant differences between the digital system and the analog system is software. The software takes charge of the functions and the management of the digital system. Nowadays railway equipment has begun to be designed and implemented based on digital technology with online and real time performance to achieve high speed and high density operation. The software is designed, coded and implemented into the system, and controls hardware components in order to satisfy the functional requirements of the system. As the functions that are implemented by software are increased, it becomes very difficult to predict the soil-ware failures because of its complexity. Therefore, it has become one of the key issues how to assure that the sottware is reliable, safe and secure. In this paper, the safety criteria are suggested to secure the software safety for the field of railway system. Characteristic of railway software and review safety related standards are analyzed. The authors also suggest development methodology and certification procedure for the developer and assessor to easily make safety critical railway software with following the safety criteria. 展开更多
关键词 Railway software safety critical safety criteria development methodology certification.
下载PDF
Public-key encryption and authentication of quantum information 被引量:7
16
作者 LIANG Min YANG Li 《Science China(Physics,Mechanics & Astronomy)》 SCIE EI CAS 2012年第9期1618-1629,共12页
Public-key cryptosystems for quantum messages are considered from two aspects:public-key encryption and public-key authentication.Firstly,we propose a general construction of quantum public-key encryption scheme,and t... Public-key cryptosystems for quantum messages are considered from two aspects:public-key encryption and public-key authentication.Firstly,we propose a general construction of quantum public-key encryption scheme,and then construct an informationtheoretic secure instance.Then,we propose a quantum public-key authentication scheme,which can protect the integrity of quantum messages.This scheme can both encrypt and authenticate quantum messages.It is information-theoretic secure with regard to encryption,and the success probability of tampering decreases exponentially with the security parameter with regard to authentication.Compared with classical public-key cryptosystems,one private-key in our schemes corresponds to an exponential number of public-keys,and every quantum public-key used by the sender is an unknown quantum state to the sender. 展开更多
关键词 quantum cryptography AUTHENTICATION quantum public-key private quantum channel
原文传递
An Authenticated Group Key Distribution Scheme for Wireless Sensor Networks
17
作者 李林春 李建华 +1 位作者 李生红 潘军 《Journal of Shanghai Jiaotong university(Science)》 EI 2009年第3期354-358,共5页
In wireless sensor networks (WSNs), group key distribution is the core of secure communications since sensor nodes usually form groups and cooperate with each other in sensing data collection and in-network processi... In wireless sensor networks (WSNs), group key distribution is the core of secure communications since sensor nodes usually form groups and cooperate with each other in sensing data collection and in-network processing. In this paper, we present a scalable authenticated scheme for group key distribution based on a combinatorial exclusion basis system (EBS) for efficiency and one-way hash chains for authentication. The proposed scheme guarantees a lightweight authenticated group key updating procedure and is efficient in terms of storage, communication and computation overheads. 展开更多
关键词 group key distribution AUTHENTICATION exclusion basis system one-way hash chain
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部