期刊文献+
共找到239篇文章
< 1 2 12 >
每页显示 20 50 100
A Peer-to-Peer Resource Sharing Scheme Using Trusted Computing Technology 被引量:2
1
作者 CHEN Lu ZHANG Huanguo +2 位作者 ZHANG Liqiang LI Song CAI Liang 《Wuhan University Journal of Natural Sciences》 CAS 2008年第5期523-527,共5页
Facing the increasing security issues in P2P networks, a scheme for resource sharing using trusted computing technologies is proposed in this paper. We advance a RS-UCON model with decision continuity and attribute mu... Facing the increasing security issues in P2P networks, a scheme for resource sharing using trusted computing technologies is proposed in this paper. We advance a RS-UCON model with decision continuity and attribute mutability to control the usage process and an architecture to illustrate how TC technologies support policy enforcement with bidirectional attestation. The properties required for attestation should include not only integrity measurement value of platform and related application, but also reputation of users and access history, in order to avoid the limitation of the existing approaches. To make a permission, it is required to evaluate both the authorization and conditions of the subject and the object in resource usage to ensure trustable resources to be transferred to trusted users and platform. 展开更多
关键词 resource sharing trusted computing VIRTUALIZATION UCON (usage control) chain of trust
下载PDF
A Trusted Measurement Scheme Suitable for the Clients in the Trusted Network 被引量:3
2
作者 GONG Bei ZHANG Jianbiao +1 位作者 YE Xiaolie SHEN Changxiang 《China Communications》 SCIE CSCD 2014年第4期143-153,共11页
The trusted network connection is a hot spot in trusted computing field and the trust measurement and access control technology are used to deal with network security threats in trusted network.But the trusted network... The trusted network connection is a hot spot in trusted computing field and the trust measurement and access control technology are used to deal with network security threats in trusted network.But the trusted network connection lacks fine-grained states and real-time measurement support for the client and the authentication mechanism is difficult to apply in the trusted network connection,it is easy to cause the loss of identity privacy.In order to solve the abovedescribed problems,this paper presents a trust measurement scheme suitable for clients in the trusted network,the scheme integrates the following attributes such as authentication mechanism,state measurement,and real-time state measurement and so on,and based on the authentication mechanism and the initial state measurement,the scheme uses the realtime state measurement as the core method to complete the trust measurement for the client.This scheme presented in this paper supports both static and dynamic measurements.Overall,the characteristics of this scheme such as fine granularity,dynamic,real-time state measurement make it possible to make more fine-grained security policy and therefore it overcomes inadequacies existing in the current trusted network connection. 展开更多
关键词 trusted computing trusted network AUTHENTICATION state measurement real-time measurement
下载PDF
Cloud Virtual Machine Lifecycle Security Framework Based on Trusted Computing 被引量:4
3
作者 Xin Jin Qixu Wang +2 位作者 Xiang Li Xingshu Chen Wei Wang 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2019年第5期520-534,共15页
As a foundation component of cloud computing platforms, Virtual Machines (VMs) are confronted with numerous security threats. However, existing solutions tend to focus on solving threats in a specific state of the VM.... As a foundation component of cloud computing platforms, Virtual Machines (VMs) are confronted with numerous security threats. However, existing solutions tend to focus on solving threats in a specific state of the VM. In this paper, we propose a novel VM lifecycle security protection framework based on trusted computing to solve the security threats to VMs throughout their entire lifecycle. Specifically, a concept of the VM lifecycle is presented divided up by the different active conditions of the VM. Then, a trusted computing based security protecti on framework is developed, which can exte nd the trusted relati on ship from trusted platform module to the VM and protect the security and reliability of the VM throughout its lifecycle. The theoretical analysis shows that our proposed framework can provide comprehensive safety to VM in all of its states. Furthermore, experiment results demonstrate that the proposed framework is feasible and achieves a higher level of security compared with some state-of-the-art schemes. 展开更多
关键词 VIRTUAL trusted computing VIRTUAL machine LIFECYCLE trusted chain security measurement state monitoring
原文传递
The theory and practice in the evolution of trusted computing 被引量:5
4
作者 Dengguo Feng Yu Qin +1 位作者 Wei Feng Jianxiong Shao 《Chinese Science Bulletin》 SCIE EI CAS 2014年第32期4173-4189,共17页
Trusted computing(TC)is an emerging technology to enhance the security of various computing platforms by a dedicated secure chip(TPM/TCM),which is widely accepted by both the industrial and academic world.This paper a... Trusted computing(TC)is an emerging technology to enhance the security of various computing platforms by a dedicated secure chip(TPM/TCM),which is widely accepted by both the industrial and academic world.This paper attempts to sketch the evolution of TC from the view of our theoretical and engineering work.In theory,we focus on protocol design and security analysis.We have proposed the first ECDAA protocol scheme based on q-SDH assumption,which highlights a new way to design direct anonymous attestation scheme.In technical evolution,we discuss the key technologies of trust chain,trusted network connection and TC testing and evaluation.We break through several key technologies such as trusted boot,OS measurement and remote attestation,and implement a TC system from TPM/TCM to network.We also design and implement a testing and evaluation system of TC platform,which is the first one put into practical application in China.Finally,with the rapid development of cloud computing and mobile applications,TC is moving toward some new directions,such as the trust in cloud and mobile environments,new TPM standard,and flexible trust execution environment trust establishment method. 展开更多
关键词 可信计算 TCM 计算平台 移动应用 TPM 安全芯片 安全分析 匿名认证
原文传递
Multiway Dynamic Trust Chain Model on Virtual Machine for Cloud Computing 被引量:1
5
作者 Jie Zhu Guoyuan Lin +2 位作者 Fucheng You Huaqun Liu Chunru Zhou 《China Communications》 SCIE CSCD 2016年第7期83-91,共9页
This paper sums up four security factors after analyzing co-residency threats caused by the special multitenant environment in the cloud.To secure the factors,a multiway dynamic trust chain transfer model was proposed... This paper sums up four security factors after analyzing co-residency threats caused by the special multitenant environment in the cloud.To secure the factors,a multiway dynamic trust chain transfer model was proposed on the basis of a measurement interactive virtual machine and current behavior to protect the integrity of the system.A trust chain construction module is designed in a virtual machine monitor.Through dynamic monitoring,it achieves the purpose of transferring integrity between virtual machine.A cloud system with a trust authentication function is implemented on the basis of the model,and its practicability is shown. 展开更多
关键词 cloud computing virtual machine trustworthiness measurement dynamic trust transfer
下载PDF
Analysis and Application for Integrity Model on Trusted Platform
6
作者 TUGuo-qing ZHANGHuan-guo WANGLi-na YUDan-dan 《Wuhan University Journal of Natural Sciences》 CAS 2005年第1期35-38,共4页
To build a trusted platform based on Trusted Computing Platform Alliance(TCPA)' s recommendation, we analyze the integrity mechanism for such a PC platfoim in this paper.By combinning access control model with inf... To build a trusted platform based on Trusted Computing Platform Alliance(TCPA)' s recommendation, we analyze the integrity mechanism for such a PC platfoim in this paper.By combinning access control model with information flow model, we put forwarda combinedprocess-based lattice model to enforce security This moelel creates a trust chain by which we canmanage a series of processes from a core root of trust module to some other application modules Inthe model, once the trust chain is created andmanaged cor-rectly, the integrity of the computer'shardware and sofware has bctn maintained, so does the confidentiality and authenticity. Moreover, arelevant implementation of the model is explained. 展开更多
关键词 tiusted computing access control model information flow model trust chain INTEGRITY
下载PDF
Analysis of system trustworthiness based on information flow noninterference theory 被引量:1
7
作者 Xiangying Kong Yanhui Chen Yi Zhuang 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2015年第2期367-380,共14页
The trustworthiness analysis and evaluation are the bases of the trust chain transfer. In this paper the formal method of trustworthiness analysis of a system based on the noninterfer- ence (NI) theory of the inform... The trustworthiness analysis and evaluation are the bases of the trust chain transfer. In this paper the formal method of trustworthiness analysis of a system based on the noninterfer- ence (NI) theory of the information flow is studied. Firstly, existing methods cannot analyze the impact of the system states on the trustworthiness of software during the process of trust chain trans- fer. To solve this problem, the impact of the system state on trust- worthiness of software is investigated, the run-time mutual interfer- ence behavior of software entitles is described and an interference model of the access control automaton of a system is established. Secondly, based on the intransitive noninterference (INI) theory, a formal analytic method of trustworthiness for trust chain transfer is proposed, providing a theoretical basis for the analysis of dynamic trustworthiness of software during the trust chain transfer process. Thirdly, a prototype system with dynamic trustworthiness on a plat- form with dual core architecture is constructed and a verification algorithm of the system trustworthiness is provided. Finally, the monitor hypothesis is extended to the dynamic monitor hypothe- sis, a theorem of static judgment rule of system trustworthiness is provided, which is useful to prove dynamic trustworthiness of a system at the beginning of system construction. Compared with previous work in this field, this research proposes not only a formal analytic method for the determination of system trustworthiness, but also a modeling method and an analysis algorithm that are feasible for practical implementation. 展开更多
关键词 trusted computing trust chain intransitive noninterference(INI) dynamic trustworthiness access control
下载PDF
Design and Implementation of a Bootstrap Trust Chain 被引量:1
8
作者 YU Fajiang ZHANG Huanguo 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1449-1452,共4页
The chain of trust in bootstrap process is the basis of whole system trust in the trusted computing group (TCG) definition. This paper presents a design and implementation of a bootstrap trust chain in PC based on t... The chain of trust in bootstrap process is the basis of whole system trust in the trusted computing group (TCG) definition. This paper presents a design and implementation of a bootstrap trust chain in PC based on the Windows and today's commodity hardware, merely depends on availability of an embedded security module (ESM). ESM and security enhanced BIOS is the root of trust, PMBR (Pre-MBR) checks the integrity of boot data and Windows kernel, which is a checking agent stored in ESM. In the end, the paper analyzed the mathematic expression of the chain of trust and the runtime performance compared with the common booring process. The trust chain bootstrap greatly strengthens the security of personal computer system, and affects the runtime performance with only adding about 12% booting time. 展开更多
关键词 trust trust chain trusted computing embedded security module (ESM) BOOTSTRAP
下载PDF
BBACIMA:A Trustworthy Integrity Measurement Architecture through Behavior-Based TPM Access Control
9
作者 YU Aimin FENG Dengguo 《Wuhan University Journal of Natural Sciences》 CAS 2008年第5期513-518,共6页
Two limitations of current integrity measurement architectures are pointed out: (1) a reference value is required for every measured entity to verify the system states, as is impractical however; (2) malicious us... Two limitations of current integrity measurement architectures are pointed out: (1) a reference value is required for every measured entity to verify the system states, as is impractical however; (2) malicious user can forge proof of inexistent system states. This paper proposes a trustworthy integrity measurement architecture, BBACIMA, through enforcing behavior-based access control for trusted platform module (TPM). BBACIMA introduces a TPM reference monitor (TPMRM) to ensure the trustworthiness of integrity measurement. TPMRM enforces behavior-based access control for the TPM and is isolated from other entities which may be malicious. TPMRM is the only entity manipulating TPM directly and all PCR (platform configuration register) operation requests must pass through the security check of it so that only trusted processes can do measurement and produce the proof of system states. Through these mechanisms malicious user can not enforce attack which is feasible in current measurement architectures. 展开更多
关键词 integrity measurement behavior-based access control trusted platform module (TPM) trusted computing remoteattestation
下载PDF
Trustworthiness Technologies of DDSS 被引量:1
10
作者 TIAN Junfeng XIAO Bing +1 位作者 WANG Zixian ZHANG Yuzhu 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1853-1856,共4页
The most significant strategic development in information technology over the past years has been "trusted computing" and trusted computers have been produced. In this paper trusted mechanisms adopted by PC is impor... The most significant strategic development in information technology over the past years has been "trusted computing" and trusted computers have been produced. In this paper trusted mechanisms adopted by PC is imported into distributed system, such as chain of trust, trusted root and so on. Based on distributed database server system (DDSS), a novel model of trusted distributed database server system (TDDSS) is presented ultimately. In TDDSS role-based access control, two-level of logs and other technologies are adopted to ensure the trustworthiness of the system. 展开更多
关键词 trusted computing trusted distributed database trusted authorization chain of trust
下载PDF
Micro-Architecture Support for Integrity Measurement on Dynamic Instruction Trace 被引量:2
11
作者 Hui Lin Gyungho Lee 《Journal of Information Security》 2010年第1期1-10,共10页
Trusted computing allows attesting remote system’s trustworthiness based on the software stack whose integrity has been measured. However, attacker can corrupt system as well as measurement operation. As a result, ne... Trusted computing allows attesting remote system’s trustworthiness based on the software stack whose integrity has been measured. However, attacker can corrupt system as well as measurement operation. As a result, nearly all integrity measurement mechanism suffers from the fact that what is measured may not be same as what is executed. To solve this problem, a novel integrity measurement called dynamic instruction trace measurement (DiT) is proposed. For DiT, processor’s instruction cache is modified to stores back instructions to memory. Consequently, it is designed as a assistance to existing integrity measurement by including dynamic instructions trace. We have simulated DiT in a full-fledged system emulator with level-1 cache modified. It can successfully update records at the moment the attestation is required. Overhead in terms of circuit area, power consumption, and access time, is less than 3% for most criterions. And system only introduces less than 2% performance overhead in average. 展开更多
关键词 INTEGRITY measurement Remote Attestation Software VULNERABILITY trusted computing
下载PDF
An attack-immune trusted architecture for supervisory aircraft hardware 被引量:2
12
作者 Dongxu CHENG Chi ZHANG +4 位作者 Jianwei LIU Dawei LI Zhenyu GUAN Wei ZHAO Mai XU 《Chinese Journal of Aeronautics》 SCIE EI CAS CSCD 2021年第11期169-181,共13页
With the wide application of electronic hardware in aircraft such as air-to-ground communication,satellite communication,positioning system and so on,aircraft hardware is facing great secure pressure.Focusing on the s... With the wide application of electronic hardware in aircraft such as air-to-ground communication,satellite communication,positioning system and so on,aircraft hardware is facing great secure pressure.Focusing on the secure problem of aircraft hardware,this paper proposes a supervisory control architecture based on secure System-on-a-Chip(So C)system.The proposed architecture is attack-immune and trustworthy,which can support trusted escrow application and Dynamic Integrity Measurement(DIM)without interference.This architecture is characterized by a Trusted Monitoring System(TMS)hardware isolated from the Main Processor System(MPS),a secure access channel from TMS to the running memory of the MPS,and the channel is unidirectional.Based on this architecture,the DIM program running on TMS is used to measure and call the Lightweight Measurement Agent(LMA)program running on MPS.By this method,the Operating System(OS)kernel,key software and data of the MPS can be dynamically measured without disturbance,which makes it difficult for adversaries to attack through software.Besides,this architecture has been fully verified on FPGA prototype system.Compared with the existing systems,our architecture achieves higher security and is more efficient on DIM,which can fully supervise the running of application and aircraft hardware OS. 展开更多
关键词 Aircraft hardware Dynamic integrity measurement Supervisory control System-on-a-Chip(SoC) trusted computing
原文传递
Research and implementation on multi-dimension trust evaluation method with web service
13
作者 Mao Hongyan Qi Zhengwei 《High Technology Letters》 EI CAS 2011年第3期252-258,共7页
Integrating with practical e-commerce application, this paper introduces a novel multi-dimension evaluation method to depict and calculate the trust values. The multi-dimension evaluation metrics include functional an... Integrating with practical e-commerce application, this paper introduces a novel multi-dimension evaluation method to depict and calculate the trust values. The multi-dimension evaluation metrics include functional and nonfunctional properties and corresponding weights. The continuous measurement values and the Markov chain mechanism are adopted to compute the trust value and detect the malicious behaviors. The current evaluation has larger influence factor on the next transaction behavior. A trust model is implemented with web service which consists of publication, filtrating, calculating and storage center. It is easily extended and the user only defines each property and its weights according to specific requirements, then the trust values are got. In order to conveniently manage and avoid the dead-lock, some constraint rules are proposed. The results show that the method based on multi-dimension can reflect objectively the dynamic change of trust values. 展开更多
关键词 multi-dimension measurement trusting model Markov chain mechanism web service
下载PDF
基于区块链的农产品供应链溯源研究综述
14
作者 胡祥培 都牧 +2 位作者 孔祥维 朱姗 张源凯 《管理科学学报》 CSSCI CSCD 北大核心 2024年第5期1-12,共12页
中国的农产品供应链是一个多利益主体共同参与、多阶段多链路、动态可扩展网链的人机复合系统,使得基于区块链的农产品供应链溯源系统面临着链上信息泄露和溯源信息造假的管理实践挑战.本研究结合我国农产品供应链特点,从建设基于区块... 中国的农产品供应链是一个多利益主体共同参与、多阶段多链路、动态可扩展网链的人机复合系统,使得基于区块链的农产品供应链溯源系统面临着链上信息泄露和溯源信息造假的管理实践挑战.本研究结合我国农产品供应链特点,从建设基于区块链的农产品供应链溯源系统的实际需求以及应用实践出发,对区块链技术及应用、区块链中的隐私保护与农产品信息安全、信任传递与融合方法这三个方面对国内外相关研究进行综述,并据此提出我国建设这类溯源系统的两个核心难题--“如何建”和“如何查”.针对这两个难题,从管理科学视角各提出四类关键科学问题,展望未来研究的发展趋势,并从应用实践层面提出基于区块链的农产品供应链溯源系统的发展建议. 展开更多
关键词 农产品供应链 区块链 质量追溯 隐私保护与信息安全 信任传递与融合
下载PDF
Dynamic Integrity Measurement Model Based on vTPM 被引量:2
15
作者 Ruizhong Du Wangyang Pan Junfeng Tian 《China Communications》 SCIE CSCD 2018年第2期88-99,共12页
With the development of cloud computing, virtualization technology has been widely used in our life. Meanwhile, it became one of the key targets for some attackers. The integrity measurement in virtual machine has bec... With the development of cloud computing, virtualization technology has been widely used in our life. Meanwhile, it became one of the key targets for some attackers. The integrity measurement in virtual machine has become an urgent problem. Some of the existing virtualization platform integrity measurement mechanism introduces the trusted computing technology, according to a trusted chain that the Trusted Platform Module(TPM) established for trusted root to measure the integrity of process in static. But this single chain static measurement cannot ensure the dynamic credible in platform running. To solve the problem that the virtual trusted platform can not guarantee the dynamic credibility, this paper put forward Dynamic Integrity Measurement Model(DIMM) based on virtual Trusted Platform Module(v TPM) which had been implemented with typical virtual machine monitor Xen as an example. DIMM combined with virtual machine introspection and event capture technology to ensure the security of the entire user domain. Based on the framework, this paper put forward Self-modify dynamic measurement strategy which can effectively reduce the measurement frequency and improve the measurement performance. Finally, it is proved that the validity and feasibility of the proposed model with comparison experiments. 展开更多
关键词 XEN trusted chain integrity mea-surement Self-modify measurement strategy dynamic integrity
下载PDF
基于跨设备信任链的无人机系统可信启动方案
16
作者 蹇奇芮 陈泽茂 武晓康 《计算机与数字工程》 2024年第7期2101-2107,共7页
为了保护无人机系统软件的秘密性和完整性,提出了一种基于跨设备信任链的无人机系统可信启动方案。该方案针对无人机和地面站设备的运行环境特点,将无人机设备的可信根分离为秘密性保护和完整性保护两部分,分别存放到无人机和地面站设备... 为了保护无人机系统软件的秘密性和完整性,提出了一种基于跨设备信任链的无人机系统可信启动方案。该方案针对无人机和地面站设备的运行环境特点,将无人机设备的可信根分离为秘密性保护和完整性保护两部分,分别存放到无人机和地面站设备中,通过启动时两设备交互校验完成跨设备可信启动,保证系统安全性;通过对系统软件进行多重签名,避免开发商或者用户单方面篡改系统。实验结果表明,该方案能够满足无人机系统软件秘密性和完整性保护需求。 展开更多
关键词 无人机系统 可信计算 信任链 系统安全 软件保护
下载PDF
可信计算在国产操作系统下的应用及测试方法探究
17
作者 夏侯振宇 高妹 刘浪 《工业信息安全》 2024年第1期63-69,共7页
本文首先详细介绍了可信计算的基本概念和发展的三个阶段。接着,对可信计算的应用模式进行分析,并调研国内外在可信计算方面的研究现状。随后,以国产可信安全操作系统和国产CPU自主可信计算体系结构为例,详细介绍了国产操作系统在可信... 本文首先详细介绍了可信计算的基本概念和发展的三个阶段。接着,对可信计算的应用模式进行分析,并调研国内外在可信计算方面的研究现状。随后,以国产可信安全操作系统和国产CPU自主可信计算体系结构为例,详细介绍了国产操作系统在可信计算方面的发展现状。最后,对可信度量及相关的可信度量模型和验证方法进行介绍,阐述相关测试方法。本文从基本概念出发,对可信计算进行深入分析,阐述国产可信计算中以国产操作系统搭配国产CPU处理器的可信技术体系,并对可信计算的未来发展方向做出展望。 展开更多
关键词 可信计算 安全 可信计算体系 可信度量
下载PDF
基于可信执行环境的5G边缘计算安全研究 被引量:4
18
作者 鲍聪颖 吴昊 +2 位作者 陆凯 曹松钱 卢秋呈 《信息安全研究》 CSCD 2023年第1期38-47,共10页
多接入边缘计算(multi-access edge computing,MEC)在用户终端与数据中心之间架起了桥梁,使终端数据在边缘侧就能得到高效的处理.针对MEC存在的安全问题,通过分析MEC面临的安全风险,阐述了一种基于可信执行环境(trusted execution envir... 多接入边缘计算(multi-access edge computing,MEC)在用户终端与数据中心之间架起了桥梁,使终端数据在边缘侧就能得到高效的处理.针对MEC存在的安全问题,通过分析MEC面临的安全风险,阐述了一种基于可信执行环境(trusted execution environment,TEE)的MEC安全方案,该方案通过在不同架构下(ARM/x86)的TEE安全模块的结合,实现了MEC各组成部分的完整性检测以及可信度量,保障了MEC从启动到运行中各个部件的安全.同时介绍了一种MEC节点与边缘计算编排器之间的远程证明方法,实现了一套保障MEC基础设施、平台、应用、编排管理安全的整体方案. 展开更多
关键词 5G 边缘计算安全 可信计算 可信执行环境 可信度量
下载PDF
一种基于可信锚点的机密计算环境构建方法
19
作者 蒋新竹 赵波 +4 位作者 李蔚栋 张立强 严飞 王娟 安扬 《网络空间安全科学学报》 2023年第1期81-89,共9页
机密计算环境的构建与使用,是保障信息数据安全的重要技术手段。然而,现有的机密计算环境的形成,其信任锚点来自硬件处理器,机密计算环境的构成依赖于缺乏可证明安全的软件栈实现。近年来包括各大主流CPU厂商的硬件安全漏洞频现,各种针... 机密计算环境的构建与使用,是保障信息数据安全的重要技术手段。然而,现有的机密计算环境的形成,其信任锚点来自硬件处理器,机密计算环境的构成依赖于缺乏可证明安全的软件栈实现。近年来包括各大主流CPU厂商的硬件安全漏洞频现,各种针对现有机密环境构造弱点的攻击频发,都给依赖机密计算环境的各种安全应用和数据带来严重威胁。可信计算是一种将可信根作为信任锚点,以可信度量为手段,用信任链方式构造可信执行环境的安全方法和技术,将可信计算技术用于机密计算环境构建,可以有效解决上述安全问题。文章从可信的角度提出了一种构造自主可控的机密计算环境的新思路。可信锚点的服务是保障机密计算环境安全的前提,在可信锚点之上建立具有内存隔离等特性的机密计算环境。文章研究的完成,将有效解决现有机密计算场景的安全威胁,提升具有自主可控关键基础设计的能力。 展开更多
关键词 机密计算 可信锚点 信任链 可信机密计算
下载PDF
可信计算下多播网络编码匿名通信仿真 被引量:1
20
作者 蔡威 冯光辉 《计算机仿真》 北大核心 2023年第10期408-411,472,共5页
由于通信数据中普遍存在随机非平稳噪声,影响通信安全,为了保障数据在通信过程中的安全性和完整性,提出基于可信计算的多播网络编码匿名通信方法。构建可信平台验证节点和用户身份的可信度,对存在随机非平稳噪声的通信数据进行稀疏变换... 由于通信数据中普遍存在随机非平稳噪声,影响通信安全,为了保障数据在通信过程中的安全性和完整性,提出基于可信计算的多播网络编码匿名通信方法。构建可信平台验证节点和用户身份的可信度,对存在随机非平稳噪声的通信数据进行稀疏变换,消除数据中存在的噪声。通过线性网络编码方法编码处理去噪后的通信数据,通过可信度量方法构建发送者和目标节点之间的网络编码匿名通信链路路径,完成通信数据的传输。采用签名加密方法验证数据的完整性和发送方身份的真实性,实现多播网络编码匿名通信。实验结果表明,所提方法的数据发送成功率高、平均传输时延低、平均丢包率低。 展开更多
关键词 可信计算 匿名通信 可信度量 网络编码 通信链路
下载PDF
上一页 1 2 12 下一页 到第
使用帮助 返回顶部