期刊文献+
共找到9篇文章
< 1 >
每页显示 20 50 100
A distributed adaptive multi-hop certification authority schemefor mobile Ad Hoc networks 被引量:1
1
作者 TanXuezhi WuShaochuan JiaShilou 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2005年第2期265-272,共8页
This paper theoretically analyzes a deficiency of the existing scheme, and proposes a distributed multi-hop certification authority scheme for mobile Ad Hoc networks. In our design, we distribute the certification aut... This paper theoretically analyzes a deficiency of the existing scheme, and proposes a distributed multi-hop certification authority scheme for mobile Ad Hoc networks. In our design, we distribute the certification authority functions through a threshold secret sharing mechanism, in which each node holds a secret share and multiple nodes jointly provide complete services. Certification authority is not limited in a local neighborhood but can be completed within multi-hop location. In addition, we replace broadcast by multicast to improve system performance and reduce communication overhead. This paper resolves some technical problems of ubiquitous certification authority services, and presents a wieldy multi-hop certification authority algorithm. Simulation results confirm the availability and effectiveness of our design. 展开更多
关键词 mobile Ad Hoc networks threshold secret share certification authority.
下载PDF
BLECA: A Blockchain-Based Lightweight and Efficient Cross-Domain Authentication Scheme for Smart Parks
2
作者 Fengting Luo Ruwei Huang Yuyue Chen 《Computers, Materials & Continua》 SCIE EI 2023年第11期1815-1835,共21页
Smart parks serve as integral components of smart cities,where they play a pivotal role in the process of urban modernization.The demand for cross-domain cooperation among smart devices from various parks has witnesse... Smart parks serve as integral components of smart cities,where they play a pivotal role in the process of urban modernization.The demand for cross-domain cooperation among smart devices from various parks has witnessed a significant increase.To ensure secure communication,device identities must undergo authentication.The existing cross-domain authentication schemes face issues such as complex authentication paths and high certificate management costs for devices,making it impractical for resource-constrained devices.This paper proposes a blockchain-based lightweight and efficient cross-domain authentication protocol for smart parks,which simplifies the authentication interaction and requires every device to maintain only one certificate.To enhance cross-domain cooperation flexibility,a comprehensive certificate revocation mechanism is presented,significantly reducing certificate management costs while ensuring efficient and secure identity authentication.When a park needs to revoke access permissions of several cooperative partners,the revocation of numerous cross-domain certificates can be accomplished with a single blockchain write operation.The security analysis and experimental results demonstrate the security and effectiveness of our scheme. 展开更多
关键词 Cross-domain authentication blockchain smart parks Certificate authority(CA) distributed collaboration Internet of Things(IoT)
下载PDF
Design of Distributed Authentication Mechanism for Equipment Support Information Network 被引量:1
3
作者 晏杰 卢昱 +1 位作者 陈立云 王昌盛 《Journal of Donghua University(English Edition)》 EI CAS 2016年第2期266-271,共6页
Considering the secure authentication problem for equipment support information network,a clustering method based on the business information flow is proposed. Based on the proposed method,a cluster-based distributed ... Considering the secure authentication problem for equipment support information network,a clustering method based on the business information flow is proposed. Based on the proposed method,a cluster-based distributed authentication mechanism and an optimal design method for distributed certificate authority( CA)are designed. Compared with some conventional clustering methods for network,the proposed clustering method considers the business information flow of the network and the task of the network nodes,which can decrease the communication spending between the clusters and improve the network efficiency effectively. The identity authentication protocols between the nodes in the same cluster and in different clusters are designed. From the perspective of the security of network and the availability of distributed authentication service,the definition of the secure service success rate of distributed CA is given and it is taken as the aim of the optimal design for distributed CA. The efficiency of providing the distributed certificate service successfully by the distributed CA is taken as the constraint condition of the optimal design for distributed CA. The determination method for the optimal value of the threshold is investigated. The proposed method can provide references for the optimal design for distributed CA. 展开更多
关键词 equipment support information network identity authentication distributed certificate authority(CA) CLUSTERING threshold optimization
下载PDF
肺功能检查信息化管理系统的建设 被引量:2
4
作者 杨银双 孙培莉 +1 位作者 殷悦楚楚 郭建军 《电子技术与软件工程》 2021年第13期171-172,共2页
本文为了提升患者就诊体验,减少医生在检查过程中因手动输入信息导致的错误,同时为了挖掘宝贵的肺功能数据科研价值,构建肺功能信息化管理系统。该系统按照电子病历系统应用水平分级评价的要求对医嘱状态、检查报告进行流程闭环管理,通... 本文为了提升患者就诊体验,减少医生在检查过程中因手动输入信息导致的错误,同时为了挖掘宝贵的肺功能数据科研价值,构建肺功能信息化管理系统。该系统按照电子病历系统应用水平分级评价的要求对医嘱状态、检查报告进行流程闭环管理,通过对接大数据应用中心,将检查数据和报告集中存储,实现检查过程全流程化管理,检查结果全院共享。 展开更多
关键词 CA(certificate authority) 医嘱闭环管理
下载PDF
A DRM System Based on Mobile Agent for Digital Rights Redistribution
5
作者 LI Ping LU Zhengding ZOU Fuhao LING Hefei 《Wuhan University Journal of Natural Sciences》 CAS 2008年第4期475-480,共6页
We propose a digital rights management (DRM) system based on mobile agent to protect the copyrights of content providers. In the system, the content provider creates a time limited blackbox out of an original agent ... We propose a digital rights management (DRM) system based on mobile agent to protect the copyrights of content providers. In the system, the content provider creates a time limited blackbox out of an original agent and dispatches it to the user end to enforce DRM functions. The blackbox is an agent that can resist the attacks from the malicious user in a certain time interval. Owing to digital rights redistribution support, the user whose rights belong to redistribution category can transfer his rights to other users. Moreover, by introducing public key infrastructure (PKI) and certificate authority (CA) role, the security of the session can be ensured. An analysis of system security and performance and a comparison with traditional DRM system is given. 展开更多
关键词 digital rights management public key infrastructure certificate authority mobile agent rights redistribution
下载PDF
Research on secure buyer-seller watermarking protocol
6
作者 Liu Quan Chen Zheng Zhou Zude 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2008年第2期370-376,384,共8页
A new buyer-seller watermarking protocol is proposed by applying a double encryption method and a novel mechanism of embedding a buyer's watermark. The protocol can effectively prevent against collusion attacks and t... A new buyer-seller watermarking protocol is proposed by applying a double encryption method and a novel mechanism of embedding a buyer's watermark. The protocol can effectively prevent against collusion attacks and the man in the middle attack if the third party is not trusted. Also, based on the proposed scheme for the first-hand transaction, a new buyer-reseller watermarking protocol and a formal multi-party watermarking protocol are also proposed. The proposed buyer-resell watermarking protocol only needs the original seller to provide transfer certificate and encryption-decryption service to support the second-hand transaction, and the multi-party watermarking protocol with distributed certificate authorities can overcome the difficulty in the combination of multicast mechanism with multiple unique watermarks and allow a seller to multicast the watermarked digital contents and key transaction information to n buyers. Furthermore, the idea of zero knowledge proof is also applied into the proposed scheme to allow the seller to take an effective control on the task performed by the third party. 展开更多
关键词 watermarking protocol zero knowledge proof distributed certification authorities.
下载PDF
An Improved Security Scheme for IEC 61850MMS Messages in Intelligent Substation Communication Networks 被引量:3
7
作者 Taha Selim Ustun S.M.Suhail Hussain 《Journal of Modern Power Systems and Clean Energy》 SCIE EI CSCD 2020年第3期591-595,共5页
Advanced connectivity in substations brings along cybersecurity considerations. Especially, the use of standardized data objects and message structures stipulated by IEC 61850 makes them much more vulnerable to unauth... Advanced connectivity in substations brings along cybersecurity considerations. Especially, the use of standardized data objects and message structures stipulated by IEC 61850 makes them much more vulnerable to unauthorized access and manipulation. In order to tackle these vulnerabilities, different methods are investigated by researchers all over the world. An important aspect of such efforts is the real-time performance consideration since power systems are bound by the rules of physics and all control/communication tasks need to be completed in a certain time frame. Security schemes for substation communication have been proposed in the recent literature. However, they must be improved to ensure a full security solution. Recently published IEC 62351 standard aims to fill this gap. Node authentication is vital for substation communication networks based on IEC 61850 to mitigate a variety of attacks such as man-in-the-middle(MITM) attack. This short communication presents a node authentication mechanism based on transport layer security(TLS) with certificates to address this knowledge gap. It also investigates the real-time performance by implementing the proposed scheme with Python. 展开更多
关键词 IEC 62351 standard certificate authority cer-tificate-based authentication CYBERSECURITY smart grid
原文传递
Inter-Cluster Routing Authentication for Ad Hoc Networks by a Hierarchical Key Scheme
8
作者 黄悦民 林华乙 王宗一 《Journal of Computer Science & Technology》 SCIE EI CSCD 2006年第6期997-1011,共15页
Dissimilar to traditional networks, the features of mobile wireless devices that can actively form a network without any infrastructure mean that mobile ad hoc networks frequently display partition due to node mobilit... Dissimilar to traditional networks, the features of mobile wireless devices that can actively form a network without any infrastructure mean that mobile ad hoc networks frequently display partition due to node mobility or link failures. These indicate that an ad hoc network is difficult to provide ou-llne access to a trusted authority server. Therefore, applying traditional Public Key Infrastructure (PKI) security framework to mobile ad hoc networks will cause insecurities. This study proposes a scalable and elastic key management scheme integrated into Cluster Based Secure Routing Protocol (CBSRP) to enhance security and non-repudiation of routing authentication, and introduces an ID-Based internal routing authentication scheme to enhance the routing performance in an internal cluster. Additionally, a method of performing routing authentication between internal and external clusters, as well as inter-cluster routing authentication, is developed. The proposed cluster-based key management scheme distributes trust to an aggregation of cluster heads using a threshold scheme faculty, provides Certificate Authority (CA) with a fault tolerance mechanism to prevent a single point of compromise or failure, and saves CA large repositories from maintaining member certificates, making ad hoc networks robust to malicious behaviors and suitable for numerous mobile devices. 展开更多
关键词 ad hoc network PKI CBSRP ID-BASED inter-cluster cluster-based CA (Certificate authority
原文传递
An Improved Sanitizable Signature Scheme
9
作者 WANG Shangping WANG Jian WANG Xiaofeng ZHANG Yaling 《Wuhan University Journal of Natural Sciences》 CAS 2008年第6期675-679,共5页
A new sanitizable signature scheme is proposed, in which the security flaw of Miyazaki's sanitizable signature scheme SUMI-4 is improved. The new scheme overcomes the shortcomings of the original scheme SUM1-4 by usi... A new sanitizable signature scheme is proposed, in which the security flaw of Miyazaki's sanitizable signature scheme SUMI-4 is improved. The new scheme overcomes the shortcomings of the original scheme SUM1-4 by using sanitizable authorization certificates. The new scheme enables the primitive signer to limit the sanitizer's power and still satisfies the security request of sanitizable signature. 展开更多
关键词 sanitizable signature sanitizable authorization certificate discrete logarithms
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部