期刊文献+
共找到15篇文章
< 1 >
每页显示 20 50 100
A Secure Key Management Scheme for Heterogeneous Secure Vehicular Communication Systems 被引量:3
1
作者 LEI Ao Chibueze Ogah +2 位作者 Philip Asuquo Haitham Cruickshank SUN Zhili 《ZTE Communications》 2016年第B06期21-31,共11页
Intelligent transportation system (ITS) is proposed as the most effective way to improve road safety and traffic efficiency. However, the future of ITS for large scale transportation infrastructures deployment highl... Intelligent transportation system (ITS) is proposed as the most effective way to improve road safety and traffic efficiency. However, the future of ITS for large scale transportation infrastructures deployment highly depends on the security level of vehicular communication systems (VCS). Security applications in VCS are fulfilled through secured group broadcast. Therefore, secure key management schemes are considered as a critical research topic for network security. In this paper, we propose a framework for providing secure key management within heterogeneous network. The seeurity managers (SMs) play a key role in the framework by retrieving the vehicle departnre infi^rmation, encapsulating block to transport keys and then executing rekeying to vehicles within the same security domain. The first part of this framework is a novel Group Key Management (GKM) scheme basing on leaving probability (LP) of vehicles to depart current VCS region. Vehicle's LP factor is introduced into GKM scheme to achieve a more effieient rekeying scheme and less rekeying costs. The second component of the framework using the blockchain concept to simplify the distributed key management in heterogeneous VCS domains. Extensive simulations and analysis are provided to show the effectiveness and effieiency of the proposed framework: Our GKM results demonstrate that probability-based BR reduees rekeying eost compared to the benchmark scheme, while the blockchain deereases the time eost of key transmission over heterogeneous net-works. 展开更多
关键词 leaving probability bloekchain group key management HETEROGENEOUS vehicular communication systems (VCS)
下载PDF
Development Trends of Key Technologies for IPTV Systems
2
作者 Yang Kun (The Communications Standard Research Institute,CATR,MII,Beijing 100083,China) 《ZTE Communications》 2006年第3期14-19,共6页
Fast growing IPTV services have become a major concern in China’s information industry. However,the IPTV service model has not been perfected yet after long-time trial made in a couple of Chinese cities. Selecting op... Fast growing IPTV services have become a major concern in China’s information industry. However,the IPTV service model has not been perfected yet after long-time trial made in a couple of Chinese cities. Selecting optimum technologies for IPTV is difficult to solve in the short term. So far most trial IPTV services in China are designed to provide a small number of local viewers with television and recorded programs. Accordingly,the technology used for the available IPTV services can hardly become a paradigm for future IPTV technology development. Therefore,with the ultimate goal of constructing a countrywide IPTV service network that can meet the requirements of commercial operation,it is necessary to conduct research into the design of countrywide IPTV network architecture,improvement of the bearer network,selection of video encoding technology,terminal structure,building of the Content Distribution Network (CDN),establishment of the open Digital Rights Management (DRM) platform,and construction of Media Asset Management (MAM) system. 展开更多
关键词 IPTV Development Trends of key Technologies for IPTV systems
下载PDF
ANOTHER KEY BREAKTHROUGH IN CHINESE DEVELOPMENT OF HIGH-END CNC SYSTEMS
3
作者 Luan Guixing and He Fuxiang(Shenyang Institute of Computational Technology, CAS) 《Bulletin of the Chinese Academy of Sciences》 1996年第1期25-27,共3页
Next to the successful development of the SS-8510 High-end CNC System in 1993, another feat was one year later achieved in development of the SS-8520/8530 CNC Systems,all being accomplished by the Shenyang Institute o... Next to the successful development of the SS-8510 High-end CNC System in 1993, another feat was one year later achieved in development of the SS-8520/8530 CNC Systems,all being accomplished by the Shenyang Institute of Computational Technology,an affiliate to the CAS in Northeast China.Recently,the new models have passed a technical appraisal hosted by the CAS. Modem manufacture is the industrial basis for a country’s economic growth and the national defense.Its technological level plays a pivotal role in 展开更多
关键词 CNC ANOTHER key BREAKTHROUGH IN CHINESE DEVELOPMENT OF HIGH-END CNC systems
下载PDF
Reliability Estimations of Control Systems Effected by Several Interference Sources
4
作者 DengBei-xing JiangMing-hu LiXing 《Wuhan University Journal of Natural Sciences》 EI CAS 2003年第02A期383-387,共5页
In order to establish the sufficient and necessary condition that arbitrarily reliable systems can not be constructed with function elements under interference sources, it is very important to expand set of interferen... In order to establish the sufficient and necessary condition that arbitrarily reliable systems can not be constructed with function elements under interference sources, it is very important to expand set of interference sources with the above property. In this paper, the models of two types of interference sources are raised respectively: interference source possessing real input vectors and constant reliable interference source. We study the reliability of the systems effected by the interference sources, and the lower bound of the reliability is presented. The results show that it is impossible that arbitrarily reliable systems can not be constructed with the elements effected by above interference sources. 展开更多
关键词 key words systems consisting of functional elements function of trouble sources of trouble
下载PDF
A Comparative Study of Related Technologies of Intrusion Detection &Prevention Systems
5
作者 Indraneel Mukhopadhyay Mohuya Chakraborty Satyajit Chakrabarti 《Journal of Information Security》 2011年第1期28-38,共11页
The rapid growth of computer networks has changed the prospect of network security. An easy accessibility condition causes computer networks to be vulnerable against numerous and potentially devastating threats from h... The rapid growth of computer networks has changed the prospect of network security. An easy accessibility condition causes computer networks to be vulnerable against numerous and potentially devastating threats from hackers. Up to the moment, researchers have developed Intrusion Detection Systems (IDS) capable of detecting attacks in several available environments. A boundlessness of methods for misuse detection as well as anomaly detection has been applied. Intrusion Prevention Systems (IPS) evolved after that to resolve am-biguities in passive network monitoring by placing detection systems on the line of attack. IPS in other words is IDS that are able to give prevention commands to firewalls and access control changes to routers. IPS can be seen as an improvement upon firewall technologies. It can make access control decisions based on application content, rather than IP address or ports as traditional firewalls do. The next innovation is the combination of IDS and IPS known as Intrusion Detection and Prevention Systems (IDPS) capable of de-tecting and preventing attacks from happening. This paper presents an overview of IDPS followed by their classifications and applications. A new signature based IDPS architecture named HawkEye Solutions has been proposed by the authors. Authors have presented the basic building blocks of the IDS, which include mechanisms for carrying out TCP port scans, Traceroute scan, ping scan and packet sniffing to monitor net-work health detect various types of attacks. Real time implementation results of the system have been pre-sented. Finally a comparative analysis of various existing IDS/IPS solutions with HawkEye Solutions em-phasizes its significance. 展开更多
关键词 ADVANCES of Network Security INTRUSION Detection system INTRUSION PREVENTION system Haw-keye Solutions
下载PDF
Beyond Defense: Proactive Approaches to Disaster Recovery and Threat Intelligence in Modern Enterprises
6
作者 Meysam Tahmasebi 《Journal of Information Security》 2024年第2期106-133,共28页
As cyber threats keep changing and business environments adapt, a comprehensive approach to disaster recovery involves more than just defensive measures. This research delves deep into the strategies required to respo... As cyber threats keep changing and business environments adapt, a comprehensive approach to disaster recovery involves more than just defensive measures. This research delves deep into the strategies required to respond to threats and anticipate and mitigate them proactively. Beginning with understanding the critical need for a layered defense and the intricacies of the attacker’s journey, the research offers insights into specialized defense techniques, emphasizing the importance of timely and strategic responses during incidents. Risk management is brought to the forefront, underscoring businesses’ need to adopt mature risk assessment practices and understand the potential risk impact areas. Additionally, the value of threat intelligence is explored, shedding light on the importance of active engagement within sharing communities and the vigilant observation of adversary motivations. “Beyond Defense: Proactive Approaches to Disaster Recovery and Threat Intelligence in Modern Enterprises” is a comprehensive guide for organizations aiming to fortify their cybersecurity posture, marrying best practices in proactive and reactive measures in the ever-challenging digital realm. 展开更多
关键词 Advanced Persistent Threats (APT) Attack Phases Attack Surface DEFENSE-IN-DEPTH Disaster Recovery (DR) Incident Response Plan (IRP) Intrusion Detection systems (IDS) Intrusion Prevention system (IPS) key Risk Indicator (KRI) Layered Defense Lockheed Martin Kill Chain Proactive Defense Redundancy Risk Management Threat Intelligence
下载PDF
Efficient Joint Key Authentication Model in E-Healthcare
7
作者 Muhammad Sajjad Tauqeer Safdar Malik +5 位作者 Shahzada Khurram Akber Abid Gardezi Fawaz Alassery Habib Hamam Omar Cheikhrouhou Muhammad Shafiq 《Computers, Materials & Continua》 SCIE EI 2022年第5期2739-2753,共15页
Many patients have begun to use mobile applications to handle different health needs because they can better access high-speed Internet and smartphones.These devices and mobile applications are now increasingly used a... Many patients have begun to use mobile applications to handle different health needs because they can better access high-speed Internet and smartphones.These devices and mobile applications are now increasingly used and integrated through the medical Internet of Things(mIoT).mIoT is an important part of the digital transformation of healthcare,because it can introduce new business models and allow efficiency improvements,cost control and improve patient experience.In the mIoT system,when migrating from traditional medical services to electronic medical services,patient protection and privacy are the priorities of each stakeholder.Therefore,it is recommended to use different user authentication and authorization methods to improve security and privacy.In this paper,our prosed model involves a shared identity verification process with different situations in the e-health system.We aim to reduce the strict and formal specification of the joint key authentication model.We use the AVISPA tool to verify through the wellknown HLPSL specification language to develop user authentication and smart card use cases in a user-friendly environment.Our model has economic and strategic advantages for healthcare organizations and healthcare workers.The medical staff can increase their knowledge and ability to analyze medical data more easily.Our model can continuously track health indicators to automatically manage treatments and monitor health data in real time.Further,it can help customers prevent chronic diseases with the enhanced cognitive functions support.The necessity for efficient identity verification in e-health care is even more crucial for cognitive mitigation because we increasingly rely on mIoT systems. 展开更多
关键词 E-health systems joint key authentication mutual authentication
下载PDF
A Study of the Key Techniques of High-Speed Optical Time Division Multiplexing Systems 被引量:1
8
作者 LIU Xian bing directed by YE Pei da, ZHAO Zi sen 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2001年第4期81-81,共1页
关键词 optical time division multiplexing optical signal processing all optical switch electroabsorption modulator Several key techniques in high speed optical time division multiplexing (OTDM) systems including the generation and compression
原文传递
Key Distribution Protocols for Mobile Communication Systems
9
作者 Zhan Banghua and Hu Zhengming (Department of Information Engineering Beijing University of Posts and Telecommunications, Beijing, 100876, P. R. China) 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 1998年第2期6-9,共4页
In this paper we propose a new key distribution protocol for mobile communication systems.This protocol KDP4, like KDP3 in [3], is still secure against Simmons' replay attack and the new attack in [3] without us... In this paper we propose a new key distribution protocol for mobile communication systems.This protocol KDP4, like KDP3 in [3], is still secure against Simmons' replay attack and the new attack in [3] without using timestamps. It is a secure, efficient and practical key distribution protocol for mobile communication systems. 展开更多
关键词 key distribution protocols mobile communication systems CRYPTOLOGY
原文传递
新型纳米抗菌无机填料抗菌防龋作用的动物实验研究 被引量:4
10
作者 朱婷 周凯运 吴峻岭 《口腔颌面修复学杂志》 2014年第2期70-74,共5页
目的:探讨表面枝接长链烷基季铵盐的新型纳米抗菌无机填料在大鼠口腔内的抗菌防龋功能。方法:选取5周龄SD雄性大鼠20只,口腔内接种变形链球菌,同时辅以致龋饮食,建立大鼠口腔龋病模型;并随机分成实验组和对照组,每组10只。实验组以自行... 目的:探讨表面枝接长链烷基季铵盐的新型纳米抗菌无机填料在大鼠口腔内的抗菌防龋功能。方法:选取5周龄SD雄性大鼠20只,口腔内接种变形链球菌,同时辅以致龋饮食,建立大鼠口腔龋病模型;并随机分成实验组和对照组,每组10只。实验组以自行合成的新型纳米抗菌无机填料刷洗牙齿而对照组则用以普通的纳米二氧化硅无机填料。4周后进行大鼠口腔变形链球菌菌落计数;随后处死大鼠,鼠齿按照Keyes龋齿计分标准进行计分,所有结果进行统计学分析。结果:实验组大鼠口腔变形链球菌菌落计数少于二氧化硅处理组(P<0.05);Keyes计分结果显示,实验组大鼠牙齿面窝沟及平滑面龋损均低对照组(P<0.05)。结论:大鼠动物实验表明,新型纳米抗菌无机填料具有明显的抗菌防龋功能。 展开更多
关键词 季铵盐 无机填料 大鼠 变形链球菌 keyes计分
下载PDF
The research priorities of Resources and Environmental Sciences 被引量:4
11
作者 Bojie Fu Yanxu Liu +5 位作者 Yan Li Cong Wang Changjia Li Wei Jiang Ting Hua Wenwu Zhao 《Geography and Sustainability》 2021年第2期87-94,共8页
The great challenges of sustainable development highlight an urgent need to systematically understand the mech-anisms linking humans and nature.Resources and Environmental Sciences are a broad and practical discipline... The great challenges of sustainable development highlight an urgent need to systematically understand the mech-anisms linking humans and nature.Resources and Environmental Sciences are a broad and practical discipline focused on coupled human and natural systems.They aim to study the formation and evolution of resources in the earth system,the drivers of various environmental problems,processes and relationships between resources and the environment,particularly under the combined impacts of natural conditions and human activities.The major resources and environmental problems drive the discipline development;international science programmes guide the direction of the discipline;interdisciplinary and transdisciplinary integration promotes new branches of the discipline;and technological progress results in a research paradigm shift.Facing the critical research re-quirements of strengthening trans-and interdisciplinarity,breaking through the key technology,targeting major environmental and disaster issues,and supporting sustainable development,nine critical scientific issues should be focused on climate change impact and adaptation,petroleum and mineral resources,water cycle and water re-sources,soil and land resources,ecosystems,remote sensing and geographic information science,environmental science and technology,disaster risk,and global and regional sustainable development.Suggestions to enhancing funding systems,improve talent cultivation,develop scientific platforms,and strength international cooperation are provided in this study to support scientific policymaking.The promotion of Resources and Environmental Sci-ences enables a more comprehensive and in-depth understanding of economic development and environmental changes relevant to assure a more sustainable global development. 展开更多
关键词 ANTHROPOCENE Sustainable development Human and natural systems Interdisciplinary and transdisciplinary INTEGRATION key technology Policy recommendations
下载PDF
基于BLS签名的弹性泄露签名方案(英文)
12
作者 王志伟 《China Communications》 SCIE CSCD 2011年第3期212-215,共4页
Digital signature,one of the most important cryptographic primitives,has been commonly used in information systems,and thus enhancing the security of a signature scheme can benefit such an application.Currently,leakag... Digital signature,one of the most important cryptographic primitives,has been commonly used in information systems,and thus enhancing the security of a signature scheme can benefit such an application.Currently,leakage-resilient cryptography is a very hot topic in cryptographic research.A leakage-resilient cryptographic primitive is said to be secure if arbitrary but bounded information about the signer's secret key(involving other states) is leaked to an adversary.Obviously,the leakage-resilient signature is more secure than the common signature.We construct an efficient leakage-resilient signature scheme based on BLS signature in the bounded retrieval model.We also prove that our scheme is provably secure under BLS signature. 展开更多
关键词 leakage-resilient signature bounded retrieval model BLS signature system key leakage attacks information systems
下载PDF
Cell Evolutionary Algorithm: a New Optimization Method on Ground-State Energy of the Atomic
13
作者 Liu Lian-jun, Xu Jing-wen, Mao You-dong, Li Yuan-xiang Department of Physics, Wuhan University, Wuhan 430072,China State Key Laboratory of Software Engineering,Wuhan University, Wuhan 430072, China 《Wuhan University Journal of Natural Sciences》 EI CAS 2000年第4期425-430,共6页
The purpose of this paper is to present a new general approach to solve ground-state energies of the double-electron systems in a uniform magnetic field, in which the basic element of evolution is the set in the solut... The purpose of this paper is to present a new general approach to solve ground-state energies of the double-electron systems in a uniform magnetic field, in which the basic element of evolution is the set in the solution space, rather than the point. The paper defines the Cell Evolutionary Algorithm, which implements such a view of the evolution mechanism. First, the optimal set in which the optimal solution may be obtained. Then this approach applies the embedded search method to get the optimal solution. We tested this approach on the atomic structure, and the results show that it can improve not only the efficiency but also the accuracy of the calculations as it relates to this specific problem. 展开更多
关键词 key words double electron systems GROUND state energy variational principle cell evolutionary algorithm evolutionary algorithm
下载PDF
Physical layer authentication for automotive cyber physical systems based on modified HB protocol
14
作者 Ahmer Khan JADOON Jing LI Licheng WANG 《Frontiers of Computer Science》 SCIE EI CSCD 2021年第3期207-214,共8页
Automotive cyber physical systems(CPSs)are ever more utilizing wireless technology for V2X communication as a potential way out for challenges regarding collision detection,wire strap up troubles and collision avoidan... Automotive cyber physical systems(CPSs)are ever more utilizing wireless technology for V2X communication as a potential way out for challenges regarding collision detection,wire strap up troubles and collision avoidance.However,security is constrained as a result of the energy and performance limitations of modem wireless systems.Accordingly,the need for efficient secret key generation and management mechanism for secured communication among computationally weak wireless devices has motivated the introduction of new authentication protocols.Recently,there has been a great interest in physical layer based secret key generation schemes by utilizing channel reciprocity.Consequently,it is observed that the sequence generated by two communicating parties contain mismatched bits which need to be reconciled by exchanging information over a public channel.This can be an immense security threat as it may let an adversary attain and recover segments of the key in known channel conditions.We proposed Hopper-Blum based physical layer(HB-PL)authentication scheme in which an enhanced physical layer key generation method integrates the Hopper-Blum(HB)authentication protocol.The information collected from the shared channel is used as secret keys for the HB protocol and the mismatched bits are used as the induced noise for learning parity with noise(LPN)problem.The proposed scheme aims to provide a way out for bit reconciliation process without leakage of information over a public channel.Moreover,HB protocol is computationally efficient and simple which helps to reduce the number of exchange messages during the authentication process.We have performed several experiments which show that our proposed design can generate secret keys with improved security strength and high performance in comparison to the current authentication techniques.Our scheme requires less than 55 exchange messages to achieve more than 95%of correct authentication. 展开更多
关键词 cyber physical systems secret key generation learning parity with noise Hopper and Blum protocol
原文传递
A computer vision-approach for activity recognition and residential monitoring of elderly people
15
作者 Sudhir Gaikwad Shripad Bhatlawande +1 位作者 Swati Shilaskar Anjali Solanke 《Medicine in Novel Technology and Devices》 2023年第4期114-122,共9页
In this study,we explore a human activity recognition(HAR)system using computer vision for assisted living systems(ALS).Most existing HAR systems are implemented using wired or wireless sensor networks.These systems h... In this study,we explore a human activity recognition(HAR)system using computer vision for assisted living systems(ALS).Most existing HAR systems are implemented using wired or wireless sensor networks.These systems have limitations such as cost,power issues,weight,and the inability of the elderly to wear and carry them comfortably.These issues could be overcome by a computer vision based HAR system.But such systems require a highly memory-consuming image dataset.Training such a dataset takes a long time.The proposed computervision-based system overcomes the shortcomings of existing systems.The authors have used key-joint angles,distances between the key joints,and slopes between the key joints to create a numerical dataset instead of an image dataset.All these parameters in the dataset are recorded via real-time event simulation.The data set has 780,000 calculated feature values from 20,000 images.This dataset is used to train and detect five different human postures.These are sitting,standing,walking,lying,and falling.The implementation encompasses four distinct algorithms:the decision tree(DT),random forest(RF),support vector machine(SVM),and an ensemble approach.Remarkably,the ensemble technique exhibited exceptional performance metrics with 99%accuracy,98%precision,97%recall,and an F1 score of 99%. 展开更多
关键词 Assisted living systems Human activity recognition Fall detection key joint angle Landmarks
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部