期刊文献+
共找到223篇文章
< 1 2 12 >
每页显示 20 50 100
Kabbalah Logic and Semantic Foundations for a Postmodern Fuzzy Set and Fuzzy Logic Theory
1
作者 Gabriel Burstein Constantin Virgil Negoita Menachem Kranz 《Applied Mathematics》 2014年第9期1375-1385,共11页
Despite half a century of fuzzy sets and fuzzy logic progress, as fuzzy sets address complex and uncertain information through the lens of human knowledge and subjectivity, more progress is needed in the semantics of ... Despite half a century of fuzzy sets and fuzzy logic progress, as fuzzy sets address complex and uncertain information through the lens of human knowledge and subjectivity, more progress is needed in the semantics of fuzzy sets and in exploring the multi-modal aspect of fuzzy logic due to the different cognitive, emotional and behavioral angles of assessing truth. We lay here the foundations of a postmodern fuzzy set and fuzzy logic theory addressing these issues by deconstructing fuzzy truth values and fuzzy set membership functions to re-capture the human knowledge and subjectivity structure in membership function evaluations. We formulate a fractal multi-modal logic of Kabbalah which integrates the cognitive, emotional and behavioral levels of humanistic systems into epistemic and modal, deontic and doxastic and dynamic multi-modal logic. This is done by creating a fractal multi-modal Kabbalah possible worlds semantic frame of Kripke model type. The Kabbalah possible worlds semantic frame integrates together both the multi-modal logic aspects and their Kripke possible worlds model. We will not focus here on modal operators and axiom sets. We constructively define a fractal multi-modal Kabbalistic L-fuzzy set as the central concept of the postmodern fuzzy set theory based on Kabbalah logic and semantics. 展开更多
关键词 L-Fuzzy SETS FUZZY SETS FUZZY logic Modal logic FUZZY semantics Kripke Possible Worlds model KABBALAH Sefirot Partzufim Tree of Life Tikkun POSTMODERNISM Deconstruction logic Humanistic Systems
下载PDF
Logic and Sense
2
作者 Urszula Wybraniec-Skardowska 《Journal of Philosophy Study》 2016年第9期554-568,共15页
In the paper, original formal-logical conception of syntactic and semantic: intensional and extensional senses of expressions of any language L is outlined. Syntax and bi-level intensional and extensional semantics o... In the paper, original formal-logical conception of syntactic and semantic: intensional and extensional senses of expressions of any language L is outlined. Syntax and bi-level intensional and extensional semantics of language L are characterized categorically: in the spirit of some Husserl's ideas of pure grammar, Le^niewski-Ajukiewicz's theory syntactic/semantic categories and in accordance with Frege's ontological canons, Bochefiski's famous motto--syntax mirrors ontology and some ideas of Suszko: language should be a linguistic scheme of ontological reality and simultaneously a tool of its cognition. In the logical conception of language L, its expressions should satisfy some general conditions of language adequacy. The adequacy ensures their unambiguous syntactic and semantic senses and mutual, syntactic, and semantic compatibility, correspondence guaranteed by the acceptance of a postulate of categorial compatibility syntactic and semantic (extensional and intensional) categories of expressions of L. From this postulate, three principles of compositionality follow: one syntactic and two semantic already known to Frege. They are treated as conditions of homomorphism partial algebra of L into algebraic models of L: syntactic, intensional, and extensional. In the paper, they are applied to some expressions with quantifiers. Language adequacy connected with the logical senses described in the logical conception of language L is, of course, an idealization, but only expressions with high degrees of precision of their senses, after due justification, may become theorems of science. 展开更多
关键词 logic of language categorial language syntactic and semantic senses intensional semantics meaning constituent of knowledge extensional semantics ontological object DENOTATION categorization syntactic and semantic compatibility algebraic models truth structural compatibility COMPOSITIONALITY
下载PDF
一种BAN-逻辑的修正 被引量:5
3
作者 郑东 王常杰 王育民 《电子科学学刊》 CSCD 2000年第4期579-584,共6页
本文指出了BAN-逻辑推理中存在的逻辑错误,提出了一种改进的BAN-逻辑。它具有精确的语义定义和正确的推理规则,当协议的初始条件正确时,逻辑推理的结论是正确的.
关键词 认证协主义 ban-逻辑 逻辑推理 密码协议
下载PDF
基于BAN逻辑的SIP网络认证协议安全性研究 被引量:2
4
作者 张兆心 杜跃进 +1 位作者 方滨兴 张宏莉 《高技术通讯》 EI CAS CSCD 北大核心 2010年第11期1108-1114,共7页
利用BAN逻辑对会话初始化协议(SIP)网络采用的超文本传输协议(HTTP)摘要认证协议进行了形式化分析和推导。通过严格的逻辑推导,证明HTTP摘要认证协议存在不足,以及由此产生的伪装攻击。通过对逻辑推理结果和推导过程的分析,针对BAN逻辑... 利用BAN逻辑对会话初始化协议(SIP)网络采用的超文本传输协议(HTTP)摘要认证协议进行了形式化分析和推导。通过严格的逻辑推导,证明HTTP摘要认证协议存在不足,以及由此产生的伪装攻击。通过对逻辑推理结果和推导过程的分析,针对BAN逻辑提出增加消息抗否认性规则和消息新鲜性传递规则,增强了BAN逻辑的逻辑推理能力;针对HTTP摘要认证协议提出增加数字签名、公私钥机制、双向认证和密钥协商,提高了HTTP摘要认证协议的安全性。 展开更多
关键词 ban逻辑 SIP HTTP摘要认证协议 双向认证
下载PDF
BAN逻辑在协议分析中的密钥猜测分析缺陷 被引量:4
5
作者 杨世平 李祥 《计算机工程》 CAS CSCD 北大核心 2006年第9期126-127,130,共3页
BAN逻辑可以证明协议是否能够达到预期目标,还能够发现协议中存在的一些缺陷,为进一步改进提供参考。但是,通过一个认证协议的例子证明,该文指出,BAN逻辑对于诸如弱密钥方面存在的密钥猜测攻击的分析存在缺陷,还需结合非形化的方法来加... BAN逻辑可以证明协议是否能够达到预期目标,还能够发现协议中存在的一些缺陷,为进一步改进提供参考。但是,通过一个认证协议的例子证明,该文指出,BAN逻辑对于诸如弱密钥方面存在的密钥猜测攻击的分析存在缺陷,还需结合非形化的方法来加以解决。 展开更多
关键词 ban逻辑 认证协议 密钥猜测攻击 椭圆曲线
下载PDF
认证协议的形式逻辑分析方法——BAN类逻辑综述 被引量:2
6
作者 束妮娜 王亚弟 《计算机应用研究》 CSCD 北大核心 2002年第9期17-20,共4页
介绍了最早的认证协议形式化分析方法———BAN逻辑及扩展的BAN逻辑 ,统称为BAN类逻辑。并通过分析比较 ,指出了各种扩展的BAN逻辑对原BAN逻辑的扩展和改进之处。
关键词 认证协议 形式逻辑分析方法 ban类逻辑 信仰逻辑 密码 推理规则
下载PDF
A Secure Multi-factor Authentication Protocol for Healthcare Services Using Cloud-based SDN 被引量:1
7
作者 Sugandhi Midha Sahil Verma +4 位作者 Kavita Mohit Mittal Nz Jhanjhi Mehedi Masud Mohammed A.AlZain 《Computers, Materials & Continua》 SCIE EI 2023年第2期3711-3726,共16页
Cloud-based SDN(Software Defined Network)integration offers new kinds of agility,flexibility,automation,and speed in the network.Enterprises and Cloud providers both leverage the benefits as networks can be configured... Cloud-based SDN(Software Defined Network)integration offers new kinds of agility,flexibility,automation,and speed in the network.Enterprises and Cloud providers both leverage the benefits as networks can be configured and optimized based on the application requirement.The integration of cloud and SDN paradigms has played an indispensable role in improving ubiquitous health care services.It has improved the real-time monitoring of patients by medical practitioners.Patients’data get stored at the central server on the cloud from where it is available to medical practitioners in no time.The centralisation of data on the server makes it more vulnerable to malicious attacks and causes a major threat to patients’privacy.In recent days,several schemes have been proposed to ensure the safety of patients’data.But most of the techniques still lack the practical implementation and safety of data.In this paper,a secure multi-factor authentication protocol using a hash function has been proposed.BAN(Body Area Network)logic has been used to formally analyse the proposed scheme and ensure that no unauthenticated user can steal sensitivepatient information.Security Protocol Animator(SPAN)–Automated Validation of Internet Security Protocols and Applications(AVISPA)tool has been used for simulation.The results prove that the proposed scheme ensures secure access to the database in terms of spoofing and identification.Performance comparisons of the proposed scheme with other related historical schemes regarding time complexity,computation cost which accounts to only 423 ms in proposed,and security parameters such as identification and spoofing prove its efficiency. 展开更多
关键词 Multi-factor authentication hash function ban logic SPANAVISPA
下载PDF
Secure and Anonymous Three-Factor Authentication Scheme for Remote Healthcare Systems 被引量:1
8
作者 Munayfah Alanazi Shadi Nashwan 《Computer Systems Science & Engineering》 SCIE EI 2022年第8期703-725,共23页
Wireless medical sensor networks(WMSNs)play a significant role in increasing the availability of remote healthcare systems.The vital and physiological data of the patient can be collected using the WMSN via sensor nod... Wireless medical sensor networks(WMSNs)play a significant role in increasing the availability of remote healthcare systems.The vital and physiological data of the patient can be collected using the WMSN via sensor nodes that are placed on his/her body and then transmitted remotely to a healthcare professional for proper diagnosis.The protection of the patient’s privacy and their data from unauthorized access is a major concern in such systems.Therefore,an authentication scheme with a high level of security is one of the most effective mechanisms by which to address these security concerns.Many authentication schemes for remote patient monitoring have been proposed recently.However,the majority of these schemes are extremely vulnerable to attacks and are unsuitable for practical use.This paper proposes a secure three-factor authentication scheme for a patient-monitoring healthcare system that operates remotely using a WMSN.The proposed authentication scheme is formally verified using the Burrows,Abadi and Needham’s(BAN)logic model and an automatic cryptographic protocol verifier(ProVerif)tool.We show that our authentication scheme can prevent relevant types of security breaches in a practical context according to the discussed possible attack scenarios.Comparisons of the security and performance are carried out with recently proposed authentication schemes.The results of the analysis show that the proposed authentication scheme is secure and practical for use,with reasonable storage space,computation,and communication efficiency. 展开更多
关键词 Mutual authentication biometric feature perfect forward secrecy user anonymity proVerif tool ban logic model
下载PDF
社交网络下智能手机轻型安全认证协议的BAN逻辑安全性分析 被引量:1
9
作者 林荣智 苗耀锋 《电子设计工程》 2018年第16期99-102,106,共5页
传统公钥加密认证方式具有较高的计算需求,从而对智能终端提出了全新的挑战。因为现代手机网络具有社交网络功能,所以就提出了一种社交网络下智能手机轻型安全认协议。通过相应的逻辑推导,表示认证协议协议具有一定的缺陷,会出现伪装攻... 传统公钥加密认证方式具有较高的计算需求,从而对智能终端提出了全新的挑战。因为现代手机网络具有社交网络功能,所以就提出了一种社交网络下智能手机轻型安全认协议。通过相应的逻辑推导,表示认证协议协议具有一定的缺陷,会出现伪装攻击。之后对其进行分析,使用BAN逻辑安全性实现安全认证协议的加密方式,根据用户常用的联系人数量较少的特点避免了协议出现大规模密钥发布和管理的问题。通过实验研究结果表示,所提出的协议能够在智能手机中运行,并且使用的资源较少,终端的续航时间较长。 展开更多
关键词 社交网络 智能手机 安全认证协议 ban逻辑 安全性
下载PDF
一种新的类BAN逻辑模态语义模型——兼论类BAN逻辑的语法缺陷
10
作者 谢鸿波 周明天 《计算机科学》 CSCD 北大核心 2006年第1期198-201,共4页
由于类 BAN 逻辑缺乏明确而清晰的语义,其语法规则和推理的正确性就受到了质疑。本文定义了安全协议的计算模型,在此基础上定义了符合模态逻辑的类 BAN 逻辑“可能世界”语义模型,并从语义的角度证明了在该模型下的类 BAN 逻辑语法存在... 由于类 BAN 逻辑缺乏明确而清晰的语义,其语法规则和推理的正确性就受到了质疑。本文定义了安全协议的计算模型,在此基础上定义了符合模态逻辑的类 BAN 逻辑“可能世界”语义模型,并从语义的角度证明了在该模型下的类 BAN 逻辑语法存在的缺陷,同时,指出了建立或改进类 BAN 逻辑的方向。 展开更多
关键词 ban逻辑 模态逻辑 形式语义 ban逻辑 语义模型 语法规则 缺陷 计算模型 安全协议 定义
下载PDF
关于BAN逻辑扩展的注记
11
作者 郑东 田建波 王育民 《电子科学学刊》 CSCD 2000年第1期73-77,共5页
本文指出了W.Mao(1995)对其协议(1)的证明中存在的错误,并对其在协议理想化过程中提出的N-u规则作了探讨,指出其扩展N-u的三条规则的缺陷,并作了改进,最后,给出一个例子说明N-u规则的应用。
关键词 认证协议 ban逻辑 密码学
下载PDF
A Multi-Stage Secure IoT Authentication Protocol
12
作者 Khalid Alhusayni Raniyah Wazirali +2 位作者 Mousa AlAkhras Marwah Almasri Samah Alhazmi 《Computer Systems Science & Engineering》 SCIE EI 2023年第4期459-481,共23页
The Internet of Things(IoT)is a network of heterogeneous and smart devices that can make decisions without human intervention.It can connect millions of devices across the universe.Their ability to collect information... The Internet of Things(IoT)is a network of heterogeneous and smart devices that can make decisions without human intervention.It can connect millions of devices across the universe.Their ability to collect information,perform analysis,and even come to meaningful conclusions without human capital intervention matters.Such circumstances require stringent security measures and,in particular,the extent of authentication.Systems applied in the IoT paradigm point out high-interest levels since enormous damage will occur if a malicious,wrongly authenticated device finds its way into the IoT system.This research provides a clear and updated view of the trends in the IoT authentication area.Among the issues covered include a series of authentication protocols that have remained research gaps in various studies.This study applies a comparative evaluation of authentication protocols,including their strengths and weaknesses.Thus,it forms the foundation in the IoT authentication field of study.In that direction,a multi authentication architecture that involves secured means is proposed for protocol authentication.Informal analysis can affect the security of the protocols.Burrows-Abadi-Needham(BAN)logic provides proof of the attainment of mutual authentication.NS3 simulator tool is used to compare the performance of the proposed protocol to verify the formal security offered by the BAN logic. 展开更多
关键词 Internet of Things(IoT) security authentication ban logic sensor networks
下载PDF
关于BAN逻辑的语义模型的分析与改进 被引量:2
13
作者 费定舟 邓达强 《计算机工程与应用》 CSCD 北大核心 2004年第15期67-69,121,共4页
该文针对BAN逻辑及其语义模型的不足之处,提出了改进后的定义,它比BAN原作者们所提供的信念定义更加合理。
关键词 authentication logic ban逻辑 语义模型
下载PDF
BAN类逻辑的两个缺陷分析
14
作者 王倩 王龙葛 《电脑知识与技术(过刊)》 2011年第3X期1761-1763,共3页
BAN类逻辑是安全协议形式化分析的一种重要方法。BAN类逻辑都是以BAN逻辑为基础发展起来的。通过对BAN逻辑的研究得出了BAN类的两个重要缺陷,缺少环境模型和缺少完整性分析,并指出了下一步研究的方向。
关键词 安全协议 形式化分析 ban类逻辑 环境模型 完整性
下载PDF
基于ECDSA多播数据源认证协议设计及其BAN逻辑分析
15
作者 杨邓奇 《电脑知识与技术》 2007年第7期101-102,112,共3页
多播数据源认证是多播安全的研究热点之一,现有的多播数据源认证协议只能解决部分问题。本文利用ECDSA作为公钥基础,设计了一个有效的基于ECDSA的多播数据源认证协议,并对协议进行了BAN逻辑分析。该协议能够有效地实现多播数据源认证。
关键词 多播数据源认证 ECDSA 认证协议设计 ban逻辑分析
下载PDF
基于矩阵理论的RFID认证协议设计及BAN逻辑分析 被引量:3
16
作者 李红静 刘丹 《计算机应用》 CSCD 北大核心 2013年第7期1854-1857,共4页
针对目前提出的射频识别(RFID)认证协议大多不能抵抗重放攻击和数据篡改攻击的问题,提出了一种能抵抗这些攻击的低成本安全协议——基于矩阵的安全协议(MSP)。该协议基于矩阵理论的矩阵乘法和伪随机数生成器(PRNG),实现所需门电路不超过... 针对目前提出的射频识别(RFID)认证协议大多不能抵抗重放攻击和数据篡改攻击的问题,提出了一种能抵抗这些攻击的低成本安全协议——基于矩阵的安全协议(MSP)。该协议基于矩阵理论的矩阵乘法和伪随机数生成器(PRNG),实现所需门电路不超过1000,满足低成本的要求。与基于同等算法的已有协议分析得出MSP大大降低了标签存储量和计算复杂度。最后,经BAN逻辑分析证明MSP实现了安全认证。因此,MSP非常适用于RFID环境。 展开更多
关键词 矩阵理论 射频识别 认证协议 ban逻辑
下载PDF
Voice Control for an Industrial Robot as a Combination of Various Robotic Assembly Process Models 被引量:1
17
作者 Svitlana Maksymova Rami Matarneh +1 位作者 Vyacheslav V. Lyashenko Nataliya V. Belova 《Journal of Computer and Communications》 2017年第11期1-15,共15页
Models for the design of assembly processes are considered. Various models for the voice control of an industrial robot are considered: a logical model, semantic networks, a frame model and Petri nets. It is shown tha... Models for the design of assembly processes are considered. Various models for the voice control of an industrial robot are considered: a logical model, semantic networks, a frame model and Petri nets. It is shown that this set of models allows describing the process of designing the technological process for an industrial robot. The logical model of the technological process allows you to define logical relationships. A model based on semantic networks describes the relationship between assembly units in a detail. This allows you to determine the order and method of registration, as well as the mutual orientation of assembly units in the product. The frame model provides the ability to streamline the execution of the build process. A model based on Petri nets allows one to describe the type and sequence of technological transitions. Based on the proposed models, a method of voice control for an industrial robot is developed. The basic principles of voice control for an industrial robot are considered. 展开更多
关键词 Robot VOICE Control FRAME model PETRI NETS logic model SEMANTIC NETS Robotic Assembly Processes
下载PDF
Comparison of Semantics of Disjunctive Logic Programs Based on Model-Equivalent Reduction 被引量:2
18
作者 赵希顺 沈榆平 《Journal of Computer Science & Technology》 SCIE EI CSCD 2007年第4期562-568,共7页
In this paper, it is shown that stable model semantics, perfect model semantics, and partial stable model semantics of disjunctive logic programs have the same expressive power with respect to the polynomial-time mode... In this paper, it is shown that stable model semantics, perfect model semantics, and partial stable model semantics of disjunctive logic programs have the same expressive power with respect to the polynomial-time model-equivalent reduction. That is, taking perfect model semantics and stable model semantic as an example, any logic program P can be transformed in polynomial time to another logic program P' such that perfect models (resp. stable models) of P i-i correspond to stable models (resp. perfect models) of P', and the correspondence can be computed also in polynomial time. However, the minimal model semantics has weaker expressiveness than other mentioned semantics, otherwise, the polynomial hierarchy would collapse to NP. 展开更多
关键词 disjunctive logic program semantics polynomial-time model-equivalent reduction quantified Boolean formula
原文传递
适用于铁路时间同步协议的双向身份认证方案
19
作者 兰丽 李佳康 白跳红 《信息安全研究》 CSCD 北大核心 2024年第12期1165-1171,共7页
针对铁路时间同步协议客户端认证缺失、关键消息明文传输等问题,提出一种更安全的双向身份认证方案,用于时间节点之间的认证和密钥建立.方案采用非对称加密机制和ECDH(elliptic curve Diffie-Hellman)算法安全协商共享密钥,运用主机当... 针对铁路时间同步协议客户端认证缺失、关键消息明文传输等问题,提出一种更安全的双向身份认证方案,用于时间节点之间的认证和密钥建立.方案采用非对称加密机制和ECDH(elliptic curve Diffie-Hellman)算法安全协商共享密钥,运用主机当前时间作为序列号抵抗重放攻击,由共享密钥和序列号产生的身份校验码完成双向身份认证.随后用共享密钥加密保护之后的关键消息,解决了关键消息明文传输的问题.该方案不仅解决了客户端认证缺失的问题,而且还具有前后向安全性.最后,采用BAN逻辑进行形式化验证,结果表明:该方法在安全性、认证开销方面较其他方法更优,能够满足铁路时间同步协议双向身份认证安全性和实时性的要求. 展开更多
关键词 铁路时间同步协议 ECDH密钥协商算法 身份校验码 双向身份认证 ban逻辑
下载PDF
新纯粹主义:逻辑美学与语义驱动
20
作者 徐晋 《西安建筑科技大学学报(社会科学版)》 2024年第3期47-53,共7页
提出并定义了新纯粹主义美学的基本理论框架,指出美作为一种逻辑存在,必须是在共同逻辑基础、共同逻辑范式基础上形成的逻辑共鸣。通过理性控制与认知引导等方式构建美的逻辑存在是新纯粹主义美学管理的主要路径,并以朗香教堂为例做了... 提出并定义了新纯粹主义美学的基本理论框架,指出美作为一种逻辑存在,必须是在共同逻辑基础、共同逻辑范式基础上形成的逻辑共鸣。通过理性控制与认知引导等方式构建美的逻辑存在是新纯粹主义美学管理的主要路径,并以朗香教堂为例做了论证。新纯粹主义美学的内核可以归纳为逻辑美学,这是纯粹主义美学的必然趋势,也是人工智能大模型进行艺术创作的理论依据。从分析哲学角度讨论了新纯粹主义美学的语义驱动原理,重点分析了人工智能如何通过逻辑分析驱动大模型的艺术创作,指出新纯粹主义美学通过对审美乃至情感的逻辑表达,为数字时代的艺术创造提供了新的方向。 展开更多
关键词 新纯粹主义 逻辑美学 美学管理 人工智能 语义驱动 大模型
下载PDF
上一页 1 2 12 下一页 到第
使用帮助 返回顶部