期刊文献+
共找到4篇文章
< 1 >
每页显示 20 50 100
高适配性的电力监控主机操作指令安全性自适应检测模型
1
作者 舒斐 刘冉 +1 位作者 王树军 黄晓飞 《微型电脑应用》 2024年第11期170-173,181,共5页
电力监控主机操作指令存在的异常点会影响电力监控主机操作指令的安全性,为了提升指令安全检测效果,提出高适配性的电力监控主机操作指令安全性自适应检测模型方法。该方法根据主机操作指令特性分析结果,利用建立的多模式无线数据采集... 电力监控主机操作指令存在的异常点会影响电力监控主机操作指令的安全性,为了提升指令安全检测效果,提出高适配性的电力监控主机操作指令安全性自适应检测模型方法。该方法根据主机操作指令特性分析结果,利用建立的多模式无线数据采集设备采集电力监控主机操作指令数据;采用主成分分析(PCA)方法提取采集的指令数据特征,并在此基础上对指令数据实施降维处理,达到降低电力监控主机操作指令安全检测复杂度的目的;结合基于密度的聚类(DBSCAN)算法对提取的特征聚类,从中挖掘出异常点,基于挖掘结果构建自适应检测模型,利用该模型对挖掘的异常点检测,实现高适配性的电力监控主机操作指令安全性自适应检测。实验结果表明,通过对该方法开展检出率比较测试、检测时延比较测试,验证了该方法的可靠性高。 展开更多
关键词 高适配性 电力监控主机操作指令 安全性自适应检测模型 PCA方法
下载PDF
具有分布式打开权威的隐藏身份签名方案
2
作者 柳欣 《计算机应用》 CSCD 北大核心 2012年第3期699-704,728,共7页
基于双线性映射的隐藏身份签名方案不满足可开脱性和选择密文攻击(CCA)匿名性,而在RSA群上构造的隐藏身份签名方案具有较高的通信和运算耗费。为此,利用块消息签名技术实现了可开脱性,提出一个允许设置分布式打开权威的改进方案。改进... 基于双线性映射的隐藏身份签名方案不满足可开脱性和选择密文攻击(CCA)匿名性,而在RSA群上构造的隐藏身份签名方案具有较高的通信和运算耗费。为此,利用块消息签名技术实现了可开脱性,提出一个允许设置分布式打开权威的改进方案。改进方案通过将分布式密钥提取和可同时执行的知识证明技术应用于底层门限加密方案,有效地实现了对打开权威的权利分发。此外,为了克服传统串行注册方式无法抵抗拒绝服务攻击的不足,利用承诺的知识证明技术将注册过程增强为满足并发安全性的协议。在随机预言模型下,改进方案可证满足所要求的所有安全性质。对比实验结果表明:改进方案的签名长度更短,签名与验证算法开销更小,由可信服务器执行的门限解密过程是并发安全的且在自适应攻击者模型下满足可证安全性。 展开更多
关键词 数字签名 群签名 基于身份的签名 知识证明 门限加密 自适应安全性
下载PDF
A Secure-Efficient Data Collection Algorithm Based on Self-Adaptive Sensing Model in Mobile Internet of Vehicles 被引量:1
3
作者 LIANG Wei RUAN Zhiqiang +1 位作者 TANG Mingdong LI Peng 《China Communications》 SCIE CSCD 2016年第2期121-129,共9页
Existing research on data collection using wireless mobile vehicle network emphasizes the reliable delivery of information.However,other performance requirements such as life cycle of nodes,stability and security are ... Existing research on data collection using wireless mobile vehicle network emphasizes the reliable delivery of information.However,other performance requirements such as life cycle of nodes,stability and security are not set as primary design objectives.This makes data collection ability of vehicular nodes in real application environment inferior.By considering the features of nodes in wireless IoV,such as large scales of deployment,volatility and low time delay,an efficient data collection algorithm is proposed for mobile vehicle network environment.An adaptive sensing model is designed to establish vehicular data collection protocol.The protocol adopts group management in model communication.The vehicular sensing node in group can adjust network sensing chain according to sensing distance threshold with surrounding nodes.It will dynamically choose a combination of network sensing chains on basis of remaining energy and location characteristics of surrounding nodes.In addition,secure data collection between sensing nodes is undertaken as well.The simulation and experiments show that the vehicular node can realize secure and real-time data collection.Moreover,the proposed algorithm is superior in vehicular network life cycle,power consumption and reliability of data collection by comparing to other algorithms. 展开更多
关键词 wireless vehicle network datacollection protocol network sensing chain self'-adaptive sensing sensing distance threshold.
下载PDF
The Gap between Intractable Problem and Adaptive Chosen Ciphertext Security
4
作者 路献辉 来学嘉 何大可 《Journal of Shanghai Jiaotong university(Science)》 EI 2009年第1期90-93,共4页
To describe the design approaches of IND-CCA2 (adaptive chosen ciphertext attack) secure public key encryption schemes systematically, the gaps between different kinds of intractable problems and IND-CCA2 security a... To describe the design approaches of IND-CCA2 (adaptive chosen ciphertext attack) secure public key encryption schemes systematically, the gaps between different kinds of intractable problems and IND-CCA2 security are studied. This paper points out that the construction of IND-CCA2 secure schemes is essentially to bridge these gaps. These gaps are categorized, analyzed and measured. Finally the methods to bridge these gaps are described. This explains the existing design approaches and gives an intuition about the difficulty of designing IND-CCA2 secure public key encryption schemes based on different types of assumptions. 展开更多
关键词 public key encryption adaptive chosen ciphertext security intractable vroblem
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部