期刊文献+
共找到2,203篇文章
< 1 2 111 >
每页显示 20 50 100
Multiuser computational imaging encryption and authentication with OFDM-assisted key management
1
作者 Hongran Zeng Ping Lu +7 位作者 Xiaowei Li Lingling Huang Chaoyun Song Dahai Li In-kwon Lee Seok-Tae Kim Qiong-Hua Wang Yiguang Liu 《Advanced Photonics Nexus》 2024年第5期162-173,共12页
Single-pixel imaging(SPI)enables an invisible target to be imaged onto a photosensitive surface without a lens,emerging as a promising way for indirect optical encryption.However,due to its linear and broadcast imagin... Single-pixel imaging(SPI)enables an invisible target to be imaged onto a photosensitive surface without a lens,emerging as a promising way for indirect optical encryption.However,due to its linear and broadcast imaging principles,SPI encryption has been confined to a single-user framework for the long term.We propose a multi-image SPI encryption method and combine it with orthogonal frequency division multiplexing-assisted key management,to achieve a multiuser SPI encryption and authentication framework.Multiple images are first encrypted as a composite intensity sequence containing the plaintexts and authentication information,simultaneously generating different sets of keys for users.Then,the SPI keys for encryption and authentication are asymmetrically isolated into independent frequency carriers and encapsulated into a Malus metasurface,so as to establish an individually private and content-independent channel for each user.Users can receive different plaintexts privately and verify the authenticity,eliminating the broadcast transparency of SPI encryption.The improved linear security is also verified by simulating attacks.By the combination of direct key management and indirect image encryption,our work achieves the encryption and authentication functionality under a multiuser computational imaging framework,facilitating its application in optical communication,imaging,and security. 展开更多
关键词 computational imaging optical encryption optical authentication key management
下载PDF
Key-insulated encryption based group key management for wireless sensor network 被引量:2
2
作者 邱卫东 周耀伟 +2 位作者 朱博 郑燕飞 龚征 《Journal of Central South University》 SCIE EI CAS 2013年第5期1277-1284,共8页
The key exposure problem is a practical threat for many security applications. In wireless sensor networks (WSNs), keys could be compromised easily due to its limited hardware protections. A secure group key managemen... The key exposure problem is a practical threat for many security applications. In wireless sensor networks (WSNs), keys could be compromised easily due to its limited hardware protections. A secure group key management scheme is responsible for secure distributing group keys among valid nodes of the group. Based on the key-insulated encryption (KIE), we propose a group key management scheme (KIE-GKMS), which integrates the pair-wise key pre-distribution for WSN. The KIE-GKMS scheme updates group keys dynamically when adding or removing nodes. Moreover, the security analysis proves that the KIE-GKMS scheme not only obtains the semantic security, but also provides the forward and backward security. Finally, the theoretical analysis shows that the KIE-GKMS scheme has constant performance on both communication and storage costs in sensor nodes. 展开更多
关键词 wireless sensor network data encryption group key management forward security key-insulated encryption
下载PDF
A regional environmental management information system for Chinese EPA—the system analysis and design
3
作者 Situ Wei, Cheng Shengtong, Zhang Xin, Long Peixiang and Liu HongbinDepartment of Environmental Engineering,Tsinghau University,Beijing,China 《Journal of Environmental Sciences》 SCIE EI CAS CSCD 1989年第2期91-97,共7页
REMIS is one of key research projects sponsored by the central government. It is recommended to regional EPAs as a main tool of the environmental management. REMIS simulates the functions of the regional EPAs and aime... REMIS is one of key research projects sponsored by the central government. It is recommended to regional EPAs as a main tool of the environmental management. REMIS simulates the functions of the regional EPAs and aimed to improve their management level. The national environmental management information system will base on REMIS.Functional analysis is the kernel of the REMIS system analysis. Data and data flow analysis are used to support the functional analysis.Investigations on the functions of the local EPAs of eight provinces and 12 cities have been taken. The functions were carefully sorted. Modular design method was used in system analysis and system design.The system analysis included functional analysis, data analysis and data flow analysis. The system design is based on the system analysis. HIPO diagram of each modular, data base structure, menu design, selection of hardware and software environment were the main items of the system design. 展开更多
关键词 environment management information system system engineering environmental management database.
下载PDF
EBS-Based Collusion Resistant Group Key Management Using Attribute-Based Enc ryption 被引量:1
4
作者 Chen Yanli Yang Geng 《China Communications》 SCIE CSCD 2012年第1期92-101,共10页
The m ajor advantages of EBS-based key rrkanagerrent scheme are its enhanced network survivability, high dynamic performance, and better support for network expansion. But it suffers from the collusion problem, which ... The m ajor advantages of EBS-based key rrkanagerrent scheme are its enhanced network survivability, high dynamic performance, and better support for network expansion. But it suffers from the collusion problem, which means it is prone to the cooperative attack of evicted members. A novel EBS-based collusion resistant group management scheme utilizing the construction of Ciphertext-Policy Attribute-Based Encryption (CP-ABE) is proposed. The new scheme satisfies the desired security properties, such as forward secrecy, backward secrecy and collusion secrecy. Compared with existing EBS-based key rmnagement scheme, the new scheme can resolve EBS collusion problem completely. Even all evicted members work together, and share their individual piece of information, they could not access to the new group key. In addition, our scheme is more efficient in terms of conmnication and computation overhead when the group size is large. It can be well controlled even in the case of large-scale application scenarios. 展开更多
关键词 group key management exclusion basis systems attribute-based encryption collusionres is tant
下载PDF
A Practical Group Key Management Algorithm for Cloud Data Sharing with Dynamic Group
5
作者 Wei Song Hua Zou +1 位作者 Haowen Liu Jun Chen 《China Communications》 SCIE CSCD 2016年第6期205-216,共12页
Cloud data sharing service, which allows a group of people to work together to access and modify the shared data, is one of the most popular and efficient working styles in the enterprises. However, the cloud server i... Cloud data sharing service, which allows a group of people to work together to access and modify the shared data, is one of the most popular and efficient working styles in the enterprises. However, the cloud server is not completely trusted, and its security could be compromised by monetary reasons or caused by hacking and hardware errors. Therefore, despite of having advantages of scalability and flexibility, cloud storage service comes with privacy and the security concerns. A straightforward method to protect the user's privacy is to encrypt the data stored at the cloud. To enable the authenticated users to access the encrypted cloud data, a practical group key management algorithm for the cloud data sharing application is highly desired. The existing group key management mechanisms presume that the server is trusted. But, the cloud data service mode does not always meet this condition. How to manage the group keys to support the scenario of the cloud storage with a semi-trusted cloud server is still a challenging task. Moreover, the cloud storage system is a large-scale and open application, in which the user group is dynamic. To address this problem, we propose a practical group key management algorithm based on a proxy re-encryption mechanism in this paper. We use the cloud server to act as a proxy tore-encrypt the group key to allow authorized users to decrypt and get the group key by their private key. To achieve the hierarchical access control policy, our scheme enables the cloud server to convert the encrypted group key of the lower group to the upper group. The numerical analysis and experimental results further validate the high efficiency and security of the proposed scheme. 展开更多
关键词 proxy re-encryption group key management bilinear map encrypted cloud storage
下载PDF
Dynamic Cluster Key Management Scheme on Wireless Sensor Networks 被引量:2
6
作者 Pei Qingqi Li Hongning +2 位作者 Pang Liaojun Hao Yin Hong Tang 《China Communications》 SCIE CSCD 2010年第1期73-79,共7页
Wireless sensor networks are open architectures, so any potential threat can easily intercept, wiretap and counterfeit the information. Therefore, the safety of WSN is very important. Since any single key system canno... Wireless sensor networks are open architectures, so any potential threat can easily intercept, wiretap and counterfeit the information. Therefore, the safety of WSN is very important. Since any single key system cannot guarantee the security of the wireless sensor network for communications, this paper introduces a hierarchical key management scheme based on the different abilities of different sensor nodes in the clustered wireless sensor network. In this scheme, the nodes are distributed into several clusters, and a cluster head must be elected for each cluster. Private communication between cluster heads is realized through the encryption system based on the identity of each head while private communication between cluster nodes in a same cluster head is achieved through the random key preliminary distribution system. Considering the characteristics of WSN, we adopt dynamic means called dynamic cluster key management scheme to deal with master key, so master key will be updated according to the changed dynamic network topology. For cluster head node plays a pivotal role in this scheme, a trust manage-ment system should be introduced into the election of the cluster head which will exclude the malicious node from outside the cluster, thus improve the whole network security. 展开更多
关键词 wireless sensor networks IDENTITY-BASED encryption system RANDOM key PRELIMINARY distribution system TRUST management system
下载PDF
Design and implementation of the system of students information management based on WEB 被引量:1
7
作者 Xiang Xin 《International Journal of Technology Management》 2014年第11期1-3,共3页
This paper mainly design B/S system structure and small information management system that often appear some problems of college student information management, combines the actual situation of students and student in... This paper mainly design B/S system structure and small information management system that often appear some problems of college student information management, combines the actual situation of students and student instructor management work. In the process of the development of the whole system, the main use of Microsoft.NET technology as a whole system of compiler environment, SQL Server 2000 is used in the design of backstage supporter' s database, were developed and designed by Visual Studi02005 tool, in exchange for page dynamically selected by the ASP.NET database and system interface between Webpage generation. This system has high reliability, high security, low input, so that the efficiency of information management students to improve. 展开更多
关键词 student information management system Web database management system B/S multi-layer architecture
下载PDF
Analysis and Design of College Student Information Management System
8
作者 Yu HE 《International Journal of Technology Management》 2015年第6期110-112,共3页
This paper uses oriented process method to analysis and design the system, using SQL Server 2000 database as the backend database support platform system, using three layer B/S architecture to support, the system prov... This paper uses oriented process method to analysis and design the system, using SQL Server 2000 database as the backend database support platform system, using three layer B/S architecture to support, the system provides a good interface and function feature, data have high safety performance, high reliability and low cost, the system can improve the work efficiency of college personnel, improve the efficiency of management, and has a certain practical significance. 展开更多
关键词 information Tcchnology Student information management database
下载PDF
An Advanced Energy Management System 被引量:1
9
作者 Lin Qingnong(Power System Control Division, NARI) 《Electricity》 1999年第2期16-18,共3页
A brief outline of Energy Management System (EMS) in China is given and OPEN-2000 EMS, combined with the novel technique of computer science, is introduced. The system has been developed by Power System Control Divisi... A brief outline of Energy Management System (EMS) in China is given and OPEN-2000 EMS, combined with the novel technique of computer science, is introduced. The system has been developed by Power System Control Division of NARI and put into operation in the middle of 1998. 展开更多
关键词 energy management system (EMS) objective ORIENTED database open system information SHARING COMPUTER network
下载PDF
Research and Development on the Visualization System for Official and Scientific Management in Enterprise
10
作者 Changhua Huang Guyong Han +1 位作者 Man Liu Song Lu 《Engineering(科研)》 2013年第12期928-932,共5页
A visualization system for the official and scientific management has been designed on C++. By this system, the information of database has been shown to users intuitively, which makes it possible for users to be free... A visualization system for the official and scientific management has been designed on C++. By this system, the information of database has been shown to users intuitively, which makes it possible for users to be free from the data sea. The system can realize the information mining and the integrated display, at the same time, improve the information’s constructive level and integration degree. 展开更多
关键词 SCIENTIFIC Research OFFICIAL management informational VISUALIZATION database
下载PDF
Research of Web-based Workflow Management System
11
作者 梁浩 Wu +2 位作者 Qidi SHI Junhao 《High Technology Letters》 EI CAS 2001年第1期55-58,共4页
The state of the art of workflow management techniques in research is introduced. The research and development trends of Workflow Management System (WFMS) are presented. On basis of analysis and comparison of kinds of... The state of the art of workflow management techniques in research is introduced. The research and development trends of Workflow Management System (WFMS) are presented. On basis of analysis and comparison of kinds of WFMSs, a WFMS based on Web technology and distributed object management is proposed. Finally, the application of the WFMS in supply chain management is described in detail. 展开更多
关键词 Workflow management Web technology Supply chain management
下载PDF
A Complex Encryption System Design Implemented by AES 被引量:1
12
作者 Zhimao Lu Houmed Mohamed 《Journal of Information Security》 2021年第2期177-187,共11页
With the rapid development of internet technology and the increasing popularity of e-commerce, data encryption technology plays a very important role in data security. Information security has two aspects: security pr... With the rapid development of internet technology and the increasing popularity of e-commerce, data encryption technology plays a very important role in data security. Information security has two aspects: security protocol and cryptographic algorithm and the latter is the foundation and core technology of information security. Advanced Encryption Standard (AES) encryption algorithm is one of the most commonly used algorithms in symmetric encryption algorithms. Such algorithms face issues when used in the context of key management and security functions. This paper focuses on the systematic analysis of these issues and summarizes AES algorithm implementation, comprehensive application and algorithm comparison with other existing methods. To analyze the performance of the proposed algorithm and to make full use of the advantages of AES encryption algorithm, one needs to reduce round key and improve the key schedule, as well as organically integrate with RSA algorithm. Java language is used to implement the algorithm due to its large library, then to show the efficiency of the proposed method we compare different parameters, such as encryption/decryption speed, entropies and memory consumption...) with a classic algorithm. Based on the results of the comparison between AES and the hybrid AES algorithm, the proposed algorithm shows good performance and high security. It therefore can be used for key management and security functions, particularly for sharing sensitive files through insecure channel. This analysis provides a reference useful for selecting different encryption algorithms according to different business needs. 展开更多
关键词 AES Algorithm RSA Algorithm encryption key management
下载PDF
Managing Road Maintenance Using Geographic Information System Application
13
作者 Mohd Zulkifli B. Mohd Yunus Hamidah Bt. Hassan 《Journal of Geographic Information System》 2010年第4期215-218,共4页
The development and economic growth of a nation is closely related to its available transportation system. Good and efficient road transport infrastructure facilities will promote industrial and socio-economic develop... The development and economic growth of a nation is closely related to its available transportation system. Good and efficient road transport infrastructure facilities will promote industrial and socio-economic development. To provide safety and comfort to road users, a comprehensive road maintenance schedule must be formulated and adopted to ensure those roads are in good condition at all times. Preventive maintenance works, such as road rehabilitation will help to reduce the major road repairs and expenditure. Prior to this, a good database, gathered through GIS will be necessary in order to ensure maintenance is done effectively. Geographic Information System (GIS) is said to be one of the useful tools that can be utilized to manage database in road maintenance engineering. This system is capable of storing, managing, analyzing, computing and displaying all forms of geographical data for road maintenance works. In this study, the author has adopted GIS application software – ArcView, and has reviewed and analyzed its effectiveness in managing road database. These data are then used to assist the management to ensure effective and systematic road maintenance. A typical model of roads in Penang, Malaysia is used as a case study to further clarify the application of GIS in road maintenance. 展开更多
关键词 ROAD management GEOGRAPHIC information system database ARCVIEW
下载PDF
A Simple Encryption Keys Creation Scheme in Wireless Ad Hoc Networks
14
作者 Abdulrahman H. Altalhi 《Communications and Network》 2012年第1期83-87,共5页
A mobile ad hoc network (MANET) is a collection of mobile nodes that temporarily integrate with each other to form a network. Such a network does not require the existence of a typical network infrastructure. There is... A mobile ad hoc network (MANET) is a collection of mobile nodes that temporarily integrate with each other to form a network. Such a network does not require the existence of a typical network infrastructure. There is no central entity with the authority to administer the services and configurations of the network. How to secure a MANET is an active field of study for researchers. However, most of the research on the topic of securing the MANETs has focused on adapting security mechanisms that were meant for traditional wired networks. This adaptation has resulted in security solutions that do not work efficiently or that make assumptions that are not in line with the properties and characterizations of MANETs. In this paper, we propose the use of security mechanisms for MANETs that are designed based on the characteristics, functionalities, and goals of such networks. We aim to initiate a paradigm shift in securing MANETs, in which the focus should be on building security solutions specifically developed for MANETs, and not on adapting solutions that were meant for conventional wired networks. We revisit the basics and propose a simple encryption keys creation scheme that is based on the Diffie-Hellman key agreement protocol. The work presented in this paper should mark the initiation of a research agenda designed to build security primitives that are specifically for MANETs, along the lines of the new paradigm. 展开更多
关键词 keyS management MANET Security SYMMETRIC encryption keyS
下载PDF
基于Geodatabase的矿区地质灾害数据库的设计 被引量:4
15
作者 高佳 《西安科技大学学报》 CAS 2014年第6期748-753,共6页
为了研究和治理矿山开采地区几种常见地质灾害,提高对地质灾害数据的掌握,文中在对矿区地质灾害数据进行收集和整理的基础上,通过对相关技术空间数据引擎、Geodatabase模型进行了简单的介绍,并重点叙述了矿区地质灾害信息管理系统中空... 为了研究和治理矿山开采地区几种常见地质灾害,提高对地质灾害数据的掌握,文中在对矿区地质灾害数据进行收集和整理的基础上,通过对相关技术空间数据引擎、Geodatabase模型进行了简单的介绍,并重点叙述了矿区地质灾害信息管理系统中空间数据库和属性数据库的设计方法及过程,最后从两个数据库的连接等方面,对空间数据和属性数据进行汇总、加工、校验和入库,从而完成了数据库的建立。结果表明:该数据库一旦建立,可满足矿区地质灾害管理一体化的需要,可以为区域地质灾害易发性、危险性区划提供直接的数据支持,为地质灾害信息系统在防灾规划中的应用莫定基础,也为防灾减灾工作提供科学依据。 展开更多
关键词 矿区地质灾害 地理信息管理系统 空间数据库 属性数据库
下载PDF
Multiple hashes of single key with passcode for multiple accounts
16
作者 LEE Kok-wah EWE Hong-tat 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2007年第8期1183-1190,共8页
A human's e-life needs multiple offline and online accounts. It is a balance between usability and security to set keys or passwords for these multiple accounts. Password reuse has to be avoided due to the domino ... A human's e-life needs multiple offline and online accounts. It is a balance between usability and security to set keys or passwords for these multiple accounts. Password reuse has to be avoided due to the domino effect of malicious administrators and crackers. However,human memorability constrains the number of keys. Single sign-on server,key hashing,key strengthening and petname system are used in the prior arts to use only one key for multiple online accounts. The unique site keys are derived from the common master secret and specific domain name. These methods cannot be applied to offline accounts such as file encryption. We invent a new method and system applicable to offline and online accounts. It does not depend on HTTP server and domain name,but numeric 4-digit passcode,key hashing,key strengthening and hash truncation. Domain name is only needed to resist spoofing and phishing attacks of online accounts. 展开更多
关键词 management Memorability key hashing key strengthening Multiple accounts information security
下载PDF
Study on the System Design of Multiple Expert Systems Integrated Decision Support System
17
作者 Wang, Zongjun 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 1993年第1期74-81,共8页
There has been an increasing interest in integrating decision support systems (DSS) and expert systems (ES) to provide decision makers a more accessible, productive and domain-independent information and computing env... There has been an increasing interest in integrating decision support systems (DSS) and expert systems (ES) to provide decision makers a more accessible, productive and domain-independent information and computing environment. This paper is aimed at designing a multiple expert systems integrated decision support system (MESIDSS) to enhance decision makers' ability in more complex cases. The basic framework, management system of multiple ESs, and functions of MESIDSS are presented. The applications of MESIDSS in large-scale decision making processes are discussed from the following aspects of problem decomposing, dynamic combination of multiple ESs, link of multiple bases and decision coordinating. Finally, a summary and some ideas for the future are presented. 展开更多
关键词 Computational methods Computer architecture database systems Expert systems information management Knowledge based systems Large scale systems Logic design systems analysis User interfaces
下载PDF
A Secure Session Key Distribution Scheme for Group Communications
18
作者 林仁宏 詹进科 《Journal of Shanghai Jiaotong university(Science)》 EI 2006年第2期192-196,共5页
In a secure group communication system, messages must be encrypted before being transmitted to group members to prevent unauthorized access. In many secure group communication schemes, whenever a member leaves or join... In a secure group communication system, messages must be encrypted before being transmitted to group members to prevent unauthorized access. In many secure group communication schemes, whenever a member leaves or joins the group, group center (GC) immediately changes the common encryption key and sends the new key to all valid members for forward and backward secrecy. If valid members are not on-line, they will miss the re-keying messages and will not be able to decrypt any ciphertext. Therefore, group members must be able to store the state of the system. In some applications, like global positioning systems (GPS) or pay-per-view systems, it is not reasonable to ask group members to stay on-line all the time and save the changes to the system. A hierarchical binary tree-based key management scheme are proposed for a secure group communication. This scheme reduces the key storage requirement of GC to a constant size and the group members are not required to be on-line constantly (stateless). 展开更多
关键词 key management symmetric encryption group communication pseudo-random function
下载PDF
Research and Application of Meteorological Response Measures for Civil Engineering and Data Acquisition System
19
作者 Dawei XU Zhimin ZHANG Feng PAN 《Meteorological and Environmental Research》 CAS 2023年第3期54-59,共6页
Meteorological conditions have a very important impact on the development of construction projects.In order to assist project site managers to quickly and accurately deal with the engineering risks brought by meteorol... Meteorological conditions have a very important impact on the development of construction projects.In order to assist project site managers to quickly and accurately deal with the engineering risks brought by meteorological conditions,meteorological risk assessment indicators for civil construction are established based on the actual impact of different meteorological conditions on each sub-project of civil engineering.A meteorological intelligent management system is created,and it will select reasonable countermeasures from the integrated existing database and push them to on-site construction managers based on meteorological risk assessment indicators.Through the pre-set construction log module,the managers can give feedback on the application effect of the pushed measures,and achieve the effect of construction data collection,correction and expansion of the existing database. 展开更多
关键词 METEOROLOGY Construction measures database information collection management system
下载PDF
国家三角梅种质资源库信息管理系统与服务平台建设
20
作者 周群 钟颖颖 +3 位作者 丁印龙 陈宜木 李可威 刘静 《植物遗传资源学报》 CAS CSCD 北大核心 2024年第8期1409-1416,共8页
三角梅花期长、花量大、抗逆性强且应用形式多样,现已成为我国南方地区花卉朝阳产业中发展最快的木本花卉。随着园艺技术的提升与国际交流的扩大,三角梅品种数量逐年攀升,同名异物及同物异名的现象频繁发生,给资源的收集与保存带来一定... 三角梅花期长、花量大、抗逆性强且应用形式多样,现已成为我国南方地区花卉朝阳产业中发展最快的木本花卉。随着园艺技术的提升与国际交流的扩大,三角梅品种数量逐年攀升,同名异物及同物异名的现象频繁发生,给资源的收集与保存带来一定的难度。为促进三角梅种质资源的管理,厦门市园林植物园作为国家三角梅种质资源库,基于B/S模式,利用现代化的管理信息系统,初步建成国家三角梅种质资源库信息管理系统与服务平台,实现种质资源库的高效管理。本文详细地介绍了平台架构、数据库设计、技术实现及平台功能构成等内容,通过提高信息管理效率,以期促进三角梅种质资源的收集、保护、研究、评价和应用。此外,该平台的设计与开发实现方法可为其他花卉的信息管理系统与服务平台建设提供借鉴。 展开更多
关键词 三角梅 种质资源 信息管理 平台架构 数据库
下载PDF
上一页 1 2 111 下一页 到第
使用帮助 返回顶部