期刊文献+
共找到6篇文章
< 1 >
每页显示 20 50 100
分布式系统的网络安全性分析及策略 被引量:5
1
作者 魏洪波 晏蒲柳 +1 位作者 王海燕 周建国 《微计算机信息》 2002年第11期52-53,共2页
本文首先分析了分布式系统的网络安全隐患,并针对这些网络不安全因素提出了相应的安全策略。
关键词 分布式系统 网络安全性分析 防火墙 局域网 计算机网络 安全策略
下载PDF
网络化水声对抗研究初步(Ⅴ)——水声网络安全技术 被引量:1
2
作者 董阳泽 刘平香 《舰船科学技术》 北大核心 2008年第1期101-105,共5页
网络化水声对抗中,水声网络将是对抗双方信息的重要来源。因此,一方面对敌水声网络要设法进行破坏,而同时自身水声网络的安全则必须得到保障。分析了水声网络由于自身原因以及所处环境等带来的安全性方面的潜在威胁,借鉴WSN的研究成果,... 网络化水声对抗中,水声网络将是对抗双方信息的重要来源。因此,一方面对敌水声网络要设法进行破坏,而同时自身水声网络的安全则必须得到保障。分析了水声网络由于自身原因以及所处环境等带来的安全性方面的潜在威胁,借鉴WSN的研究成果,研究了具有针对性的安全措施,包括在水声网络各层的考虑。分析了其实施的可行性。 展开更多
关键词 网络化水声对抗 水声网络安全性分析 水声网络安全性措施
下载PDF
Toward an RSU-unavailable Lightweight Certificateless Key Agreement Scheme for VANETs 被引量:5
3
作者 SONG Jun HE Chunjiao +2 位作者 ZHANG Lei TANG Shanyu ZHANG Huanguo 《China Communications》 SCIE CSCD 2014年第9期93-103,共11页
Vehicle ad-hoc networks have developed rapidly these years,whose security and privacy issues are always concerned widely.In spite of a remarkable research on their security solutions,but in which there still lacks con... Vehicle ad-hoc networks have developed rapidly these years,whose security and privacy issues are always concerned widely.In spite of a remarkable research on their security solutions,but in which there still lacks considerations on how to secure vehicleto-vehicle communications,particularly when infrastructure is unavailable.In this paper,we propose a lightweight certificateless and oneround key agreement scheme without pairing,and further prove the security of the proposed scheme in the random oracle model.The proposed scheme is expected to not only resist known attacks with less computation cost,but also as an efficient way to relieve the workload of vehicle-to-vehicle authentication,especially in no available infrastructure circumstance.A comprehensive evaluation,including security analysis,efficiency analysis and simulation evaluation,is presented to confirm the security and feasibility of the proposed scheme. 展开更多
关键词 vehicle ad-hoc network securityand privacy lightweight authentication certificateless key agreement
下载PDF
Secure Network Coding Based on Lattice Signature 被引量:2
4
作者 SHANG Tao PEI Hengli LIU Jianwei 《China Communications》 SCIE CSCD 2014年第1期138-151,共14页
To provide a high-security guaran- tee to network coding and lower the comput- ing complexity induced by signature scheme, we take full advantage of homomorphic prop- erty to build lattice signature schemes and sec- u... To provide a high-security guaran- tee to network coding and lower the comput- ing complexity induced by signature scheme, we take full advantage of homomorphic prop- erty to build lattice signature schemes and sec- ure network coding algorithms. Firstly, by means of the distance between the message and its sig- nature in a lattice, we propose a Distance-bas- ed Secure Network Coding (DSNC) algorithm and stipulate its security to a new hard problem Fixed Length Vector Problem (FLVP), which is harder than Shortest Vector Problem (SVP) on lattices. Secondly, considering the bound- ary on the distance between the message and its signature, we further propose an efficient Bo- undary-based Secure Network Coding (BSNC) algorithm to reduce the computing complexity induced by square calculation in DSNC. Sim- ulation results and security analysis show that the proposed signature schemes have stronger unforgeability due to the natural property of lattices than traditional Rivest-Shamir-Adleman (RSA)-based signature scheme. DSNC algo- rithm is more secure and BSNC algorithm greatly reduces the time cost on computation. 展开更多
关键词 secure network coding pollution attack lattice signature fixed length vector problem
下载PDF
Key-insulated encryption based group key management for wireless sensor network 被引量:2
5
作者 邱卫东 周耀伟 +2 位作者 朱博 郑燕飞 龚征 《Journal of Central South University》 SCIE EI CAS 2013年第5期1277-1284,共8页
The key exposure problem is a practical threat for many security applications. In wireless sensor networks (WSNs), keys could be compromised easily due to its limited hardware protections. A secure group key managemen... The key exposure problem is a practical threat for many security applications. In wireless sensor networks (WSNs), keys could be compromised easily due to its limited hardware protections. A secure group key management scheme is responsible for secure distributing group keys among valid nodes of the group. Based on the key-insulated encryption (KIE), we propose a group key management scheme (KIE-GKMS), which integrates the pair-wise key pre-distribution for WSN. The KIE-GKMS scheme updates group keys dynamically when adding or removing nodes. Moreover, the security analysis proves that the KIE-GKMS scheme not only obtains the semantic security, but also provides the forward and backward security. Finally, the theoretical analysis shows that the KIE-GKMS scheme has constant performance on both communication and storage costs in sensor nodes. 展开更多
关键词 wireless sensor network data encryption group key management forward security key-insulated encryption
下载PDF
A Multi-homed VPN Architecture Based on Extended SOCKS+TLS Protocols
6
作者 张宝良 胡汉平 陈翔 《Journal of Shanghai Jiaotong university(Science)》 EI 2005年第3期250-255,共6页
A multi-homed VPN architecture based on extended SOCKSv5 and TLS was proposed. The architecture employs a dynamic connection mechanism for multiple proxies in the end system,i n which the security-demanded transmissio... A multi-homed VPN architecture based on extended SOCKSv5 and TLS was proposed. The architecture employs a dynamic connection mechanism for multiple proxies in the end system,i n which the security-demanded transmission connections can switch smoothly among the multiple proxies by maint aining a coherent connection context.The mechanism is transparent to application programs and can support th e building of VPN.With the cooperation of some other security components,the mechanism guarantees the reso urce availability and reliability of the end system against some attacks to the specific ports or hosts. 展开更多
关键词 multi-homed SOCKSv5 security connection context virtual private network (VPN)
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部