期刊文献+
共找到6,726篇文章
< 1 2 250 >
每页显示 20 50 100
A new quantum key distribution resource allocation and routing optimization scheme
1
作者 毕琳 袁晓同 +1 位作者 吴炜杰 林升熙 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第3期244-259,共16页
Quantum key distribution(QKD)is a technology that can resist the threat of quantum computers to existing conventional cryptographic protocols.However,due to the stringent requirements of the quantum key generation env... Quantum key distribution(QKD)is a technology that can resist the threat of quantum computers to existing conventional cryptographic protocols.However,due to the stringent requirements of the quantum key generation environment,the generated quantum keys are considered valuable,and the slow key generation rate conflicts with the high-speed data transmission in traditional optical networks.In this paper,for the QKD network with a trusted relay,which is mainly based on point-to-point quantum keys and has complex changes in network resources,we aim to allocate resources reasonably for data packet distribution.Firstly,we formulate a linear programming constraint model for the key resource allocation(KRA)problem based on the time-slot scheduling.Secondly,we propose a new scheduling scheme based on the graded key security requirements(GKSR)and a new micro-log key storage algorithm for effective storage and management of key resources.Finally,we propose a key resource consumption(KRC)routing optimization algorithm to properly allocate time slots,routes,and key resources.Simulation results show that the proposed scheme significantly improves the key distribution success rate and key resource utilization rate,among others. 展开更多
关键词 quantum key distribution(QKD) resource allocation key storage routing algorithm
下载PDF
Security analysis of satellite-to-ground reference-frame-independent quantum key distribution with beam wandering
2
作者 周淳 赵燕美 +11 位作者 杨晓亮 陆宜飞 周雨 姜晓磊 汪海涛 汪洋 李家骥 江木生 汪翔 张海龙 李宏伟 鲍皖苏 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第8期192-201,共10页
The reference-frame-independent(RFI)quantum key distribution(QKD)is suitable for satellite-based links by removing the active alignment on the reference frames.However,how the beam wandering influences the performance... The reference-frame-independent(RFI)quantum key distribution(QKD)is suitable for satellite-based links by removing the active alignment on the reference frames.However,how the beam wandering influences the performance of RFI-QKD remains a pending issue in satellite-to-ground links.In this paper,based on the mathematical model for characterizing beam wandering,we present the security analysis for satellite-to-ground RFI-QKD and analytically derive formulas for calculating the secret key rate with beam wandering.Our simulation results show that the performance of RFI-QKD is better than the Bennett–Brassard 1984(BB84)QKD with beam wandering in asymptotic case.Furthermore,the degree of influences of beam wandering is specifically presented for satellite-to-ground RFI-QKD when statistical fluctuations are taken into account.Our work can provide theoretical support for the realization of RFI-QKD using satellite-to-ground links and have implications for the construction of large-scale satellite-based quantum networks. 展开更多
关键词 quantum key distribution satellite-to-ground beam wandering
下载PDF
Reference-frame-independent quantum key distribution with two-way classical communication
3
作者 Chun Zhou Hai-Tao Wang +9 位作者 Yi-Fei Lu Xiao-Lei Jiang Yan-Mei Zhao Yu Zhou Yang Wang Jia-Ji Li Yan-Yang Zhou Xiang Wang Hong-Wei Li Wan-Su Bao 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第10期146-152,共7页
The data post-processing scheme based on two-way classical communication(TWCC)can improve the tolerable bit error rate and extend the maximal transmission distance when used in a quantum key distribution(QKD)system.In... The data post-processing scheme based on two-way classical communication(TWCC)can improve the tolerable bit error rate and extend the maximal transmission distance when used in a quantum key distribution(QKD)system.In this study,we apply the TWCC method to improve the performance of reference-frame-independent quantum key distribution(RFI-QKD),and analyze the influence of the TWCC method on the performance of decoy-state RFI-QKD in both asymptotic and non-asymptotic cases.Our numerical simulation results show that the TWCC method is able to extend the maximal transmission distance from 175 km to 198 km and improve the tolerable bit error rate from 10.48%to 16.75%.At the same time,the performance of RFI-QKD in terms of the secret key rate and maximum transmission distance are still greatly improved when statistical fluctuations are considered.We conclude that RFI-QKD with the TWCC method is of practical interest. 展开更多
关键词 quantum key distribution reference-frame-independent two-way classical communication
下载PDF
Blockchain-Based Key Management Scheme Using Rational Secret Sharing
4
作者 Xingfan Zhao Changgen Peng +1 位作者 Weijie Tan Kun Niu 《Computers, Materials & Continua》 SCIE EI 2024年第4期307-328,共22页
Traditional blockchain key management schemes store private keys in the same location,which can easily lead to security issues such as a single point of failure.Therefore,decentralized threshold key management schemes... Traditional blockchain key management schemes store private keys in the same location,which can easily lead to security issues such as a single point of failure.Therefore,decentralized threshold key management schemes have become a research focus for blockchain private key protection.The security of private keys for blockchain user wallet is highly related to user identity authentication and digital asset security.The threshold blockchain private key management schemes based on verifiable secret sharing have made some progress,but these schemes do not consider participants’self-interested behavior,and require trusted nodes to keep private key fragments,resulting in a narrow application scope and low deployment efficiency,which cannot meet the needs of personal wallet private key escrow and recovery in public blockchains.We design a private key management scheme based on rational secret sharing that considers the self-interest of participants in secret sharing protocols,and constrains the behavior of rational participants through reasonable mechanism design,making it more suitable in distributed scenarios such as the public blockchain.The proposed scheme achieves the escrow and recovery of personal wallet private keys without the participation of trusted nodes,and simulate its implementation on smart contracts.Compared to other existing threshold wallet solutions and keymanagement schemes based on password-protected secret sharing(PPSS),the proposed scheme has a wide range of applications,verifiable private key recovery,low communication overhead,higher computational efficiency when users perform one-time multi-key escrow,no need for trusted nodes,and personal rational constraints and anti-collusion attack capabilities. 展开更多
关键词 Blockchain smart contract rational secret sharing key management
下载PDF
Improved decoy-state quantum key distribution with uncharacterized heralded single-photon sources
5
作者 徐乐辰 张春辉 +1 位作者 周星宇 王琴 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第2期204-208,共5页
Encoding system plays a significant role in quantum key distribution(QKD).However,the security and performance of QKD systems can be compromised by encoding misalignment due to the inevitable defects in realistic devi... Encoding system plays a significant role in quantum key distribution(QKD).However,the security and performance of QKD systems can be compromised by encoding misalignment due to the inevitable defects in realistic devices.To alleviate the influence of misalignments,a method exploiting statistics from mismatched basis is proposed to enable uncharacterized sources to generate secure keys in QKD.In this work,we propose a scheme on four-intensity decoy-state quantum key distribution with uncharacterized heralded single-photon sources.It only requires the source states are prepared in a two-dimensional Hilbert space,and can thus reduce the complexity of practical realizations.Moreover,we carry out corresponding numerical simulations and demonstrate that our present four-intensity decoy-state scheme can achieve a much higher key rate compared than a three-intensity decoy-state method,and meantime it can obtain a longer transmission distance compared than the one using weak coherent sources. 展开更多
关键词 quantum key distribution heralded single-photon source decoy-state method
下载PDF
The Effect of Key Nodes on theMalware Dynamics in the Industrial Control Network
6
作者 Qiang Fu JunWang +1 位作者 Changfu Si Jiawei Liu 《Computers, Materials & Continua》 SCIE EI 2024年第4期329-349,共21页
As industrialization and informatization becomemore deeply intertwined,industrial control networks have entered an era of intelligence.The connection between industrial control networks and the external internet is be... As industrialization and informatization becomemore deeply intertwined,industrial control networks have entered an era of intelligence.The connection between industrial control networks and the external internet is becoming increasingly close,which leads to frequent security accidents.This paper proposes a model for the industrial control network.It includes a malware containment strategy that integrates intrusion detection,quarantine,and monitoring.Basedonthismodel,the role of keynodes in the spreadofmalware is studied,a comparisonexperiment is conducted to validate the impact of the containment strategy.In addition,the dynamic behavior of the model is analyzed,the basic reproduction number is computed,and the disease-free and endemic equilibrium of the model is also obtained by the basic reproduction number.Moreover,through simulation experiments,the effectiveness of the containment strategy is validated,the influence of the relevant parameters is analyzed,and the containment strategy is optimized.In otherwords,selective immunity to key nodes can effectively suppress the spread ofmalware andmaintain the stability of industrial control systems.The earlier the immunization of key nodes,the better.Once the time exceeds the threshold,immunizing key nodes is almost ineffective.The analysis provides a better way to contain the malware in the industrial control network. 展开更多
关键词 key nodes dynamic model industrial control network SIMULATION
下载PDF
Chaotic Map-Based Authentication and Key Agreement Protocol with Low-Latency for Metasystem
7
作者 Guojun Wang Qi Liu 《Computers, Materials & Continua》 SCIE EI 2024年第3期4471-4488,共18页
With the rapid advancement in exploring perceptual interactions and digital twins,metaverse technology has emerged to transcend the constraints of space-time and reality,facilitating remote AI-based collaboration.In t... With the rapid advancement in exploring perceptual interactions and digital twins,metaverse technology has emerged to transcend the constraints of space-time and reality,facilitating remote AI-based collaboration.In this dynamic metasystem environment,frequent information exchanges necessitate robust security measures,with Authentication and Key Agreement(AKA)serving as the primary line of defense to ensure communication security.However,traditional AKA protocols fall short in meeting the low-latency requirements essential for synchronous interactions within the metaverse.To address this challenge and enable nearly latency-free interactions,a novel low-latency AKA protocol based on chaotic maps is proposed.This protocol not only ensures mutual authentication of entities within the metasystem but also generates secure session keys.The security of these session keys is rigorously validated through formal proofs,formal verification,and informal proofs.When confronted with the Dolev-Yao(DY)threat model,the session keys are formally demonstrated to be secure under the Real-or-Random(ROR)model.The proposed protocol is further validated through simulations conducted using VMware workstation compiled in HLPSL language and C language.The simulation results affirm the protocol’s effectiveness in resisting well-known attacks while achieving the desired low latency for optimal metaverse interactions. 展开更多
关键词 Metasystem authentication and key agreement chaotic map secure communication
下载PDF
Physical-Layer Secret Key Generation for Dual-Task Scenarios
8
作者 Yang Lilin Li Guyue +2 位作者 Guo Tao Xu Hao Hu Aiqun 《China Communications》 SCIE CSCD 2024年第7期252-266,共15页
Physical-layer secret key generation(PSKG)provides a lightweight way for group key(GK)sharing between wireless users in large-scale wireless networks.However,most of the existing works in this field consider only grou... Physical-layer secret key generation(PSKG)provides a lightweight way for group key(GK)sharing between wireless users in large-scale wireless networks.However,most of the existing works in this field consider only group communication.For a commonly dual-task scenario,where both GK and pairwise key(PK)are required,traditional methods are less suitable for direct extension.For the first time,we discover a security issue with traditional methods in dual-task scenarios,which has not previously been recognized.We propose an innovative segment-based key generation method to solve this security issue.We do not directly use PK exclusively to negotiate the GK as traditional methods.Instead,we generate GK and PK separately through segmentation which is the first solution to meet dual-task.We also perform security and rate analysis.It is demonstrated that our method is effective in solving this security issue from an information-theoretic perspective.The rate results of simulation are also consistent with the our rate derivation. 展开更多
关键词 dual-task scenario information-theoretic security physical layer security secret group key generation
下载PDF
Elucidation of potential relationship between endogenous proteases and key flavor substances in dry-cured pork coppa
9
作者 Mingming Li Qiujin Zhu +4 位作者 Chao Qu Xiaohui Gong Yunhan Zhang Xin Zhang Shouwei Wang 《Food Science and Human Wellness》 SCIE CAS CSCD 2024年第4期2152-2160,共9页
Dry-cured meat products are considerably popular around the world due to unique flavor.Proteolysis is one of the enzymatic reactions from which flavor substances are derived,which is affected by endogenous proteases.T... Dry-cured meat products are considerably popular around the world due to unique flavor.Proteolysis is one of the enzymatic reactions from which flavor substances are derived,which is affected by endogenous proteases.The purpose aimed to reveal the potential relationship between endogenous proteases and key flavor substances in dry-cured pork coppa in this paper.The dynamic changes of endogenous proteases activity,free amino acids,and volatiles during dry-cured pork coppa processing were characterized.The results showed that 5 kinds of free amino acids,Glu,Lys,Val,Ala,and Leu,were identified as significant contributors to taste.Meanwhile,key volatiles,such as hexanal,nonanal,octanal,benzaldehyde,3-methyl butanoic acid,2-methyl propanoic acid,and ethyl octanoate,greatly contributed to the flavor characteristics of dry-cured pork coppa.Further partial correlation analysis was performed to better elucidate the relationship among parameters.The results revealed that close relationship between endogenous proteases and key substances.RAP not only significantly affected the accumulation of key active-amino acids,but also affected the accumulation of ethyl octanoate,2,3-pentanedione,and 2,3-octanedione by regulating the accumulation of octanoic acid and Leu.In addition,cathepsin B and D,DPP II,DPP IV and RAP notably affected accumulation of hexanal. 展开更多
关键词 Dry-cured pork coppa Endogenous proteases PROTEOLYSIS key taste-active amino acids Volatile compounds
下载PDF
A Probing Model of Secret Key Generation Based on Channel Autocorrelation Function
10
作者 Xia Enjun Hu Binjie Shen Qiaoqiao 《China Communications》 SCIE CSCD 2024年第6期163-175,共13页
Secret key generation(SKG)is a promising solution to the problem of wireless communications security.As the first step of SKG,channel probing affects it significantly.Although there have been some probing schemes,ther... Secret key generation(SKG)is a promising solution to the problem of wireless communications security.As the first step of SKG,channel probing affects it significantly.Although there have been some probing schemes,there is a lack of research on the optimization of the probing process.This study investigates how to optimize correlated parameters to maximize the SKG rate(SKGR)in the time-division duplex(TDD)mode.First,we build a probing model which includes the effects of transmitting power,the probing period,and the dimension of sample vectors.Based on the model,the analytical expression of the SKGR is given.Next,we formulate an optimization problem for maximizing the SKGR and give an algorithm to solve it.We conclude the SKGR monotonically increases as the transmitting power increases.Relevant mathematical proofs are given in this study.From the simulation results,increasing appropriately the probing period and the dimension of the sample vector could increase the SKGR dramatically compared to a yardstick,which indicates the importance of optimizing the parameters related to the channel probing phase. 展开更多
关键词 channel autocorrelation function channel probing optimization problem physical layer security secret key generation
下载PDF
Countermeasure against blinding attack for single-photon detectors in quantum key distribution
11
作者 Lianjun Jiang Dongdong Li +12 位作者 Yuqiang Fang Meisheng Zhao Ming Liu Zhilin Xie Yukang Zhao Yanlin Tang Wei Jiang Houlin Fang Rui Ma Lei Cheng Weifeng Yang Songtao Han Shibiao Tang 《Journal of Semiconductors》 EI CAS CSCD 2024年第4期76-81,共6页
Quantum key distribution(QKD),rooted in quantum mechanics,offers information-theoretic security.However,practi-cal systems open security threats due to imperfections,notably bright-light blinding attacks targeting sin... Quantum key distribution(QKD),rooted in quantum mechanics,offers information-theoretic security.However,practi-cal systems open security threats due to imperfections,notably bright-light blinding attacks targeting single-photon detectors.Here,we propose a concise,robust defense strategy for protecting single-photon detectors in QKD systems against blinding attacks.Our strategy uses a dual approach:detecting the bias current of the avalanche photodiode(APD)to defend against con-tinuous-wave blinding attacks,and monitoring the avalanche amplitude to protect against pulsed blinding attacks.By integrat-ing these two branches,the proposed solution effectively identifies and mitigates a wide range of bright light injection attempts,significantly enhancing the resilience of QKD systems against various bright-light blinding attacks.This method forti-fies the safeguards of quantum communications and offers a crucial contribution to the field of quantum information security. 展开更多
关键词 quantum key distribution single photon detector blinding attack pulsed blinding attack COUNTERMEASURE quan-tum communication
下载PDF
Secure SSL/TLS Communication System Based on Quantum Keys
12
作者 WANG Jigang LU Yuqian +2 位作者 WEI Liping JIANG Xinzao ZHANG Han 《ZTE Communications》 2024年第3期106-115,共10页
Secure Sockets Layer(SSL)and Transport Layer Security(TLS)protocols facilitates a secure framework for identity authentication,data encryption,and message integrity verification.However,with the recent development in ... Secure Sockets Layer(SSL)and Transport Layer Security(TLS)protocols facilitates a secure framework for identity authentication,data encryption,and message integrity verification.However,with the recent development in quantum computing technology,the security of conventional key-based SSL/TLS protocols faces vulnerabilities.In this paper,we propose a scheme by integrating the quantum key into the SSL/TLS framework.Furthermore,the application of post-quantum algorithms is used to enhance and complement the existing encryption suites.Experimental results show that the proposed SSL/TLS communication system based on quantum keys exhibits high performance in latency and throughput.Moreover,the proposed system showcases good resilience against quantum attacks. 展开更多
关键词 SSL/TLS protocols quantum key post-quantum cryptography
下载PDF
State Key Laboratory of Baiyun Obo Rare Earth Resource Researches and Comprehensive Utilization
13
《China Rare Earth Information》 2024年第2期F0002-F0002,共1页
State Key Laboratory of Baiyun Obo Rare Earth Resource Researches and Comprehensive Utilization was approved by the Ministry of Science and Technology to be one of the national key laboratories in November 2022.The la... State Key Laboratory of Baiyun Obo Rare Earth Resource Researches and Comprehensive Utilization was approved by the Ministry of Science and Technology to be one of the national key laboratories in November 2022.The laboratory was reconstructed based on former State Key Laboratory of Baiyun Obo Rare Earth Resources Researchesand Comprehensive Utilization. 展开更多
关键词 key EARTH Researches
下载PDF
National Key Laboratory of Baiyun Obo Rare Earth Resource Researches and Comprehensive Utilization
14
《China Rare Earth Information》 2024年第1期F0002-F0002,共1页
National Key Laboratory of Baiyun Obo Rare Earth Resource Researches and Comprehensive Utilization was approved by the Ministry of Science and Technology to be one of the national key laboratories in November 2022.The... National Key Laboratory of Baiyun Obo Rare Earth Resource Researches and Comprehensive Utilization was approved by the Ministry of Science and Technology to be one of the national key laboratories in November 2022.The laboratory was reconstructed based on former State Key Laboratory of Baiyun Obo Rare Earth Resources Researches and Comprehensive Utilization.The key laboratory takes Baotou Research Institute of Rare Earths as the main research body,cooperating with scientific and technological strength from Lanzhou University and Changsha Research Institute of Mining and Metallurgy. 展开更多
关键词 key EARTH LABORATORY
下载PDF
Development of a Post Quantum Encryption Key Generation Algorithm Using Electromagnetic Wave Propagation Theory
15
作者 Vincent Mbonigaba Fulgence Nahayo +1 位作者 Octave Moutsinga Okalas-Ossami Dieudonné 《Journal of Information Security》 2024年第1期53-62,共10页
In today’s rapid widespread of digital technologies into all live aspects to enhance efficiency and productivity on the one hand and on the other hand ensure customer engagement, personal data counterfeiting has beco... In today’s rapid widespread of digital technologies into all live aspects to enhance efficiency and productivity on the one hand and on the other hand ensure customer engagement, personal data counterfeiting has become a major concern for businesses and end-users. One solution to ensure data security is encryption, where keys are central. There is therefore a need to find robusts key generation implementation that is effective, inexpensive and non-invasive for protecting and preventing data counterfeiting. In this paper, we use the theory of electromagnetic wave propagation to generate encryption keys. 展开更多
关键词 key Wave ELECTROMAGNETIC CRYPTOGRAPHY POST Quantum Network Protocol Propagation ALGORITHM
下载PDF
Current Status of Key Competencies among Medical Students: A Latent Profile Analysis
16
作者 Mengyao Xiao Li Yan +1 位作者 Yongping Xia Li Liu 《Open Journal of Applied Sciences》 2024年第2期450-465,共16页
The purpose of this study was to understand the overall level of key competencies of medical students and explore the potential profile of key competencies, promoting quality education, and improving the quality talen... The purpose of this study was to understand the overall level of key competencies of medical students and explore the potential profile of key competencies, promoting quality education, and improving the quality talent cultivation in medical colleges. A stratified random sampling method selected 734 medical students from four medical colleges in Chongqing Province of China. A general information questionnaire and a key competencies survey questionnaire were used to conduct the survey. The overall score and scores of each dimension of key competencies were analyzed. Latent profile analysis was conducted to classify the key competencies of medical students and compare the distribution differences of demographic variables among different categories. The results showed that 26% of medical students have never heard of the concept of key competencies, and 59% of them are not familiar with the content related to key competencies. The score of key competencies is 3.66 ± 0.60, with the highest score in the dimension of responsibility and the lowest score in the dimension of humanistic accomplishment. The latent profile analysis classified them into three categories: “low key competencies group (14.71%)”, “medium key competencies group (36.79%)”, and “high key competencies group (48.50%)”. The R3STEP regression analysis results showed statistically significant differences in educational level and whether they served as student cadres among different key competencies categories of medical students. This paper discusses three different potential key competencies categories among medical students, and the overall level of key competencies is relatively good. However, medical students lack a comprehensive and systematic understanding of key competencies. Humanistic accomplishment, healthy living, and practical innovation are the three dimensions with lower scores and should be given more attention. Medical colleges should integrate the concept of key competencies into teaching and implement it in medical practice to cultivate more high-quality medical talents for society. 展开更多
关键词 Sustainable Education Medical Students key Competencies Latent Profile Analysis
下载PDF
Analysis of the Significance of Key Points of Patient Interventional Psychological Care and Pain Care
17
作者 Xiaoping Dai Chu Luo Jiawei Dai 《Journal of Clinical and Nursing Research》 2024年第3期66-71,共6页
Interventional therapy has become increasingly popular in clinical practice due to advancements in medical technology.However,patients often experience psychological and physiological pressure due to its invasive natu... Interventional therapy has become increasingly popular in clinical practice due to advancements in medical technology.However,patients often experience psychological and physiological pressure due to its invasive nature.The management of patient discomfort and tension is crucial to ensure effective treatment.Psychological and pain management are essential components of interventional therapy,as they significantly impact patient recovery and prognosis.This article discussed the importance of interventional psychological and pain care for patients,starting with the development and spread of interventional therapy.The significance of providing high-quality nursing services to patients and improving their quality of life was also discussed. 展开更多
关键词 Interventional treatment Psychological nursing Pain care key points Significance analysis
下载PDF
A Review of the Research on the Influencing Factors of Enterprise Key Core Technology Breakthrough
18
作者 Liangcan Liu Yuexian Zou 《Proceedings of Business and Economic Studies》 2024年第4期125-129,共5页
The breakthrough of key core technology is a theoretical and practical strategic issue to realize the rise of the country.This paper analyzes the concept of key core technology and its breakthrough and analyzes its ch... The breakthrough of key core technology is a theoretical and practical strategic issue to realize the rise of the country.This paper analyzes the concept of key core technology and its breakthrough and analyzes its characteristics.Based on the perspective of participants,this paper summarizes the influencing factors of key core technology breakthroughs in enterprises:internal and external enterprises,universities and scientific research institutions,and government.This paper expands the relevant research on key core technology breakthroughs and provides inspiration for enterprises to carry out key core technology research and breakthrough practices. 展开更多
关键词 key core technology breakthrough Concept discrimination Technical features Influencing factors
下载PDF
基于SM9的API KEY强安全应用方案
19
作者 刘晨宁 左黎明 周婷 《软件导刊》 2024年第10期146-151,共6页
随着信息技术飞速发展,API在各种应用和服务中的重要性日益凸显,然而传统API KEY在应用中存在诸多安全风险。为此,提出一种基于SM9的API KEY强安全应用方案。首先,使用SM9对数据进行签名和验证;其次,引入可信第三方管理用户公私钥对,并... 随着信息技术飞速发展,API在各种应用和服务中的重要性日益凸显,然而传统API KEY在应用中存在诸多安全风险。为此,提出一种基于SM9的API KEY强安全应用方案。首先,使用SM9对数据进行签名和验证;其次,引入可信第三方管理用户公私钥对,并结合随机状态码提高API KEY的安全性和可靠性;最后,与百度开放平台和FOFA网络空间测绘平台的API KEY应用安全性进行比较。实验表明,基于SM9的API KEY强安全应用方案具有数据完整性、来源可靠性、抗泄露攻击、抗重放攻击、抗CSRF攻击和抗暴力破解攻击等优点。 展开更多
关键词 API key SM9 强安全 可信第三方 公私钥对
下载PDF
Design and Implementation of USB Key System Based on Dual-Factor Identity Authentication Protocol
20
作者 Jianxin Wang Zifan Xu +2 位作者 Xiangze Chang Chaoen Xiao Lei Zhang 《Journal of Electronic Research and Application》 2024年第5期161-167,共7页
With the increasing demand for information security,traditional single-factor authentication technology can no longer meet security requirements.To this end,this paper proposes a Universal Serial Bus(USB)Key hardware ... With the increasing demand for information security,traditional single-factor authentication technology can no longer meet security requirements.To this end,this paper proposes a Universal Serial Bus(USB)Key hardware and software system based on a two-factor authentication protocol,aiming to improve the security and reliability of authentication.This paper first analyzes the current status and technical principles of USB Key-related research domestically and internationally and designs a two-factor authentication protocol that combines impact/response authentication and static password authentication.The system consists of a host computer and a USB Key device.The host computer interacts with the USB Key through a graphical user interface.The Secure Hash Algorithm 1(SHA-1)and MySQL database are used to implement the authentication function.Experimental results show that the designed two-factor authentication protocol can effectively prevent replay attacks and information tampering,and improve the security of authentication.If the corresponding USB Key is not inserted,the system will prompt that the device is not found.Once the USB Key is inserted,user identity is confirmed through two-factor verification,which includes impact/response authentication and static password authentication. 展开更多
关键词 Information security USB key Impact/response authentication Static password authentication
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部