期刊文献+
共找到609篇文章
< 1 2 31 >
每页显示 20 50 100
Quality of Service and Security on Cisco Network Devices, Coupled with the Development of a Mobile Application Prototype Software for Server Room Temperature Monitoring
1
作者 Desire Mudenda Charles Smart Lubobya 《Journal of Computer and Communications》 2024年第8期123-140,共18页
In an era where digital technology is paramount, higher education institutions like the University of Zambia (UNZA) are employing advanced computer networks to enhance their operational capacity and offer cutting-edge... In an era where digital technology is paramount, higher education institutions like the University of Zambia (UNZA) are employing advanced computer networks to enhance their operational capacity and offer cutting-edge services to their academic fraternity. Spanning across the Great East Road campus, UNZA has established one of the most extensive computer networks in Zambia, serving a burgeoning community of over 20,000 active users through a Metropolitan Area Network (MAN). However, as the digital landscape continues to evolve, it is besieged with burgeoning challenges that threaten the very fabric of network integrity—cyber security threats and the imperatives of maintaining high Quality of Service (QoS). In an effort to mitigate these threats and ensure network efficiency, the development of a mobile application to monitor temperatures in the server room was imperative. According to L. Wei, X. Zeng, and T. Shen, the use of wireless sensory networks to monitor the temperature of train switchgear contact points represents a cost-effective solution. The system is based on wireless communication technology and is detailed in their paper, “A wireless solution for train switchgear contact temperature monitoring and alarming system based on wireless communication technology”, published in the International Journal of Communications, Network and System Sciences, vol. 8, no. 4, pp. 79-87, 2015 [1]. Therefore, in this study, a mobile application technology was explored for monitoring of temperatures in the server room in order to aid Cisco device performance. Additionally, this paper also explores the hardening of Cisco device security and QoS which are the cornerstones of this study. 展开更多
关键词 Quality of Service (QoS) Network security Temperature Monitoring mobile application Cisco Devices
下载PDF
Exploration of Industrial Internet Security Technology and Application from the Perspective of Generative Artificial Intelligence
2
作者 Dinggao Li Shengda Liao Zhuo Zheng 《Journal of Electronic Research and Application》 2024年第6期170-175,共6页
In recent years,artificial intelligence technology has developed rapidly around the world is widely used in various fields,and plays an important role.The integration of industrial Internet security with new technolog... In recent years,artificial intelligence technology has developed rapidly around the world is widely used in various fields,and plays an important role.The integration of industrial Internet security with new technologies such as big models and generative artificial intelligence has become a hot research issue.In this regard,this paper briefly analyzes the industrial Internet security technology and application from the perspective of generative artificial intelligence,hoping to provide some valuable reference and reference for readers. 展开更多
关键词 Generative artificial intelligence Industrial Internet security technology application
下载PDF
Wireless Application Protocol for Potential Threats to Mobile Agent Network Security
3
作者 M. Indra Sena Reddy K. Subba Reddy +1 位作者 P. J. Bhatt Rajeev Chetwani 《Journal of Electronic Science and Technology》 CAS 2012年第3期215-219,共5页
The wireless application protocol (WAP) protocol is now the leading standard for information services on wireless terminals like digital mobile phones. By the use of WAP, wireless devices, like mobile phones, are po... The wireless application protocol (WAP) protocol is now the leading standard for information services on wireless terminals like digital mobile phones. By the use of WAP, wireless devices, like mobile phones, are possibly infected with virus and worms. Though up to now there is no such attack, as the usage of script languages increases, there is a chance of malicious code injection. This paper discusses the threats with current WAP protocol, and how changes in the protocol and the increase in its usage will enable entry of real viruses. Future threat scenarios are presented along with suggestions to avoid these problems. 展开更多
关键词 mobile agent security threats wireless application protocol.
下载PDF
Time Parameter Based Low-Energy Data Encryption Method for Mobile Applications
4
作者 Li-Woei Chen Kun-Lin Tsai +2 位作者 Fang-Yie Leu Wen-Cheng Jiang Shih-Ting Tseng 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第9期2779-2794,共16页
Various mobile devices and applications are now used in daily life.These devices require high-speed data processing,low energy consumption,low communication latency,and secure data transmission,especially in 5G and 6G... Various mobile devices and applications are now used in daily life.These devices require high-speed data processing,low energy consumption,low communication latency,and secure data transmission,especially in 5G and 6G mobile networks.High-security cryptography guarantees that essential data can be transmitted securely;however,it increases energy consumption and reduces data processing speed.Therefore,this study proposes a low-energy data encryption(LEDE)algorithm based on the Advanced Encryption Standard(AES)for improving data transmission security and reducing the energy consumption of encryption in Internet-of-Things(IoT)devices.In the proposed LEDE algorithm,the system time parameter is employed to create a dynamic S-Box to replace the static S-Box of AES.Tests indicated that six-round LEDE encryption achieves the same security level as 10-round conventional AES encryption.This reduction in encryption time results in the LEDE algorithm having a 67.4%lower energy consumption and 43.9%shorter encryption time than conventional AES;thus,the proposed LEDE algorithm can improve the performance and the energy consumption of IoT edge devices. 展开更多
关键词 mobile application security AES data encryption time parameter mobile device
下载PDF
Password-Authenticated Multiple Key Exchange Protocol for Mobile Applications 被引量:2
5
作者 Li Wenmin Wen Qiaoyan Su Qi Zhang Hua Jin Zhengping 《China Communications》 SCIE CSCD 2012年第1期64-72,共9页
To achieve privacy and authentication sinmltaneously in mobile applications, various Three-party Password-authenticated key exchange (3PAKE) protocols have been proposed. However, some of these protocols are vulnera... To achieve privacy and authentication sinmltaneously in mobile applications, various Three-party Password-authenticated key exchange (3PAKE) protocols have been proposed. However, some of these protocols are vulnerable to conventional attacks or have low efficiency so that they cannot be applied to mobile applications. In this paper, we proposed a password-authenticated multiple key exchange protocol for mobile applications using elliptic curve cryptosystem. The proposed protocol can achieve efficiency, reliability, flexibility and scalability at the same time. Compared with related works, the proposed protocol is more suitable and practical for mobile applications. 展开更多
关键词 mobile applications key exchange PASSWORD elliptic curve cryptosystem security
下载PDF
Data secure transmission intelligent prediction algorithm for mobile industrial IoT networks
6
作者 Lingwei Xu Hao Yin +4 位作者 Hong Jia Wenzhong Lin Xinpeng Zhou Yong Fu Xu Yu 《Digital Communications and Networks》 SCIE CSCD 2023年第2期400-410,共11页
Mobile Industrial Internet of Things(IIoT)applications have achieved the explosive growth in recent years.The mobile IIoT has flourished and become the backbone of the industry,laying a solid foundation for the interc... Mobile Industrial Internet of Things(IIoT)applications have achieved the explosive growth in recent years.The mobile IIoT has flourished and become the backbone of the industry,laying a solid foundation for the interconnection of all things.The variety of application scenarios has brought serious challenges to mobile IIoT networks,which face complex and changeable communication environments.Ensuring data secure transmission is critical for mobile IIoT networks.This paper investigates the data secure transmission performance prediction of mobile IIoT networks.To cut down computational complexity,we propose a data secure transmission scheme employing Transmit Antenna Selection(TAS).The novel secrecy performance expressions are first derived.Then,to realize real-time secrecy analysis,we design an improved Convolutional Neural Network(CNN)model,and propose an intelligent data secure transmission performance prediction algorithm.For mobile signals,the important features may be removed by the pooling layers.This will lead to negative effects on the secrecy performance prediction.A novel nine-layer improved CNN model is designed.Out of the input and output layers,it removes the pooling layer and contains six convolution layers.Elman,Back-Propagation(BP)and LeNet methods are employed to compare with the proposed algorithm.Through simulation analysis,good prediction accuracy is achieved by the CNN algorithm.The prediction accuracy obtains a 59%increase. 展开更多
关键词 mobile IIoT networks Data secure transmission Performance analysis intelligent prediction Improved CNN
下载PDF
Reverse Engineering of Mobile Banking Applications
7
作者 Syeda Warda Asher Sadeeq Jan +3 位作者 George Tsaramirsis Fazal Qudus Khan Abdullah Khalil Muhammad Obaidullah 《Computer Systems Science & Engineering》 SCIE EI 2021年第9期265-278,共14页
Software reverse engineering is the process of analyzing a software system to extract the design and implementation details.Reverse engineering provides the source code of an application,the insight view of the archit... Software reverse engineering is the process of analyzing a software system to extract the design and implementation details.Reverse engineering provides the source code of an application,the insight view of the architecture and the third-party dependencies.From a security perspective,it is mostly used for finding vulnerabilities and attacking or cracking an application.The process is carried out either by obtaining the code in plaintext or reading it through the binaries or mnemonics.Nowadays,reverse engineering is widely used for mobile applications and is considered a security risk.The Open Web Application Security Project(OWASP),a leading security research forum,has included reverse engineering in its top 10 list of mobile application vulnerabilities.Mobile applications are used in many sectors,e.g.,banking,education,health.In particular,the banking applications are critical in terms of security as they are used for financial transactions.A security breach of such applications can result in huge financial losses for the customers as well as the banks.There exist various tools for reverse engineering of mobile applications,however,they have deficiencies,e.g.,complex configurations,lack of detailed analysis reports.In this research work,we perform an analysis of the available tools for reverse engineering of mobile applications.Our dataset consists of the mobile banking applications of the banks providing services in Pakistan.Our results indicate that none of the existing tools can carry out the complete reverse engineering process as a standalone tool.In addition,we observe significant differences in terms of the execution time and the number of files generated by each tool for the same file. 展开更多
关键词 Reverse engineering mobile banking applications security analysis
下载PDF
Camera and Voice Control Based Location Services and Information Security on Android
8
作者 Jitendra G. Chouhan Nikhil Kumar Singh +2 位作者 Prashant S. Modi Keyurbhai A. Jani Bhavin N. Joshi 《Journal of Information Security》 2016年第3期195-205,共11页
Increasing popularity of Android is making its security issue more crucial nowadays. This paper focuses on one-stop solution to secure Android device against information security and theft. Proposed application protec... Increasing popularity of Android is making its security issue more crucial nowadays. This paper focuses on one-stop solution to secure Android device against information security and theft. Proposed application protects Android device against theft and helps to control Android device by SMS or using internet connection. By this application once the user has configured the account for anti theft, user can remotely track, sound a loud siren, lock, secretly capture photo of an intruder who tries to break in, get randomly recorded voice of intruder, get thief identity using device web history and can able to wipe all your private data. This data and tracking information will be stored in one central web server database and one can access it anytime through login. 展开更多
关键词 ANDROID Information security mobile Tracking application Services
下载PDF
Detection and Prevention of Malware in Android Mobile Devices: A Literature Review
9
作者 Joseph Keteku George Owusu Dameh +3 位作者 Samuel Ameka Mante Thomas Kwashie Mensah Schneider Laryea Amartey John-Bosco Diekuu 《International Journal of Intelligence Science》 2024年第4期71-93,共23页
Despite only being around for a few years, mobile devices have steadily risen to become the most extensively used computer devices. Given the number of people who rely on smartphones, which can install third-party app... Despite only being around for a few years, mobile devices have steadily risen to become the most extensively used computer devices. Given the number of people who rely on smartphones, which can install third-party apps, it has become an increasingly important issue for end-users and service providers to ensure that both the devices and the underlying network are secure. People will become more reliant on applications such as SMS, MMS, Internet Access, Online Transactions, and so on due to such features and capabilities. Thousands of devices ranging from low-cost phones to high-end luxury phones are powered by the Android operating system, which has dominated the smartphone marketplace. It is about making it possible for people from all socioeconomic backgrounds to get and use mobile devices in their daily activities. In response to this growing popularity, the number of new applications introduced to the Android market has skyrocketed. The recent appearance of a wide range of mobile malware has caught the attention of security professionals and scholars alike. In light of the ongoing expansion of the mobile phone industry, the likelihood of it being used in criminal activities will only continue to rise in the future. This article reviews the literature on malware detection and prevention in Android mobile devices, analyzes the existing literature on major studies and tasks, and covers articles, journals, and digital resources such as Internet security publications, scientific studies, and conferences. 展开更多
关键词 Android Malware Android mobile application security Malware Detection mobile security
下载PDF
Artificial Intelligence Based Data Offloading Technique for Secure MEC Systems 被引量:1
10
作者 Fadwa Alrowais Ahmed S.Almasoud +5 位作者 Radwa Marzouk Fahd N.Al-Wesabi Anwer Mustafa Hilal Mohammed Rizwanullah Abdelwahed Motwakel Ishfaq Yaseen 《Computers, Materials & Continua》 SCIE EI 2022年第8期2783-2795,共13页
Mobile edge computing(MEC)provides effective cloud services and functionality at the edge device,to improve the quality of service(QoS)of end users by offloading the high computation tasks.Currently,the introduction o... Mobile edge computing(MEC)provides effective cloud services and functionality at the edge device,to improve the quality of service(QoS)of end users by offloading the high computation tasks.Currently,the introduction of deep learning(DL)and hardware technologies paves amethod in detecting the current traffic status,data offloading,and cyberattacks in MEC.This study introduces an artificial intelligence with metaheuristic based data offloading technique for Secure MEC(AIMDO-SMEC)systems.The proposed AIMDO-SMEC technique incorporates an effective traffic prediction module using Siamese Neural Networks(SNN)to determine the traffic status in the MEC system.Also,an adaptive sampling cross entropy(ASCE)technique is utilized for data offloading in MEC systems.Moreover,the modified salp swarm algorithm(MSSA)with extreme gradient boosting(XGBoost)technique was implemented to identification and classification of cyberattack that exist in the MEC systems.For examining the enhanced outcomes of the AIMDO-SMEC technique,a comprehensive experimental analysis is carried out and the results demonstrated the enhanced outcomes of the AIMDOSMEC technique with the minimal completion time of tasks(CTT)of 0.680. 展开更多
关键词 Data offloading mobile edge computing security machine learning artificial intelligence XGBoost salp swarm algorithm
下载PDF
Phishing Techniques in Mobile Devices
11
作者 Belal Amro 《Journal of Computer and Communications》 2018年第2期27-35,共9页
The rapid evolution in mobile devices and communication technology has increased the number of mobile device users dramatically. The mobile device has replaced many other devices and is used to perform many tasks rang... The rapid evolution in mobile devices and communication technology has increased the number of mobile device users dramatically. The mobile device has replaced many other devices and is used to perform many tasks ranging from establishing a phone call to performing critical and sensitive tasks like money payments. Since the mobile device is accompanying a person most of his time, it is highly probably that it includes personal and sensitive data for that person. The increased use of mobile devices in daily life made mobile systems an excellent target for attacks. One of the most important attacks is phishing attack in which an attacker tries to get the credential of the victim and impersonate him. In this paper, analysis of different types of phishing attacks on mobile devices is provided. Mitigation techniques—anti-phishing techniques—are also analyzed. Assessment of each technique and a summary of its advantages and disadvantages is provided. At the end, important steps to guard against phishing attacks are provided. The aim of the work is to put phishing attacks on mobile systems in light, and to make people aware of these attacks and how to avoid them. 展开更多
关键词 MALWARE PHISHING ANTI-PHISHING mobile Device mobile application security PRIVACY
下载PDF
面向未成年人的人工智能技术发展蓝图——面向未成年人的人工智能技术规范研究(四) 被引量:1
12
作者 李玉顺 沈希 +1 位作者 安欣 吴永和 《电化教育研究》 CSSCI 北大核心 2024年第4期39-45,共7页
随着ChatGPT等新型人工智能技术的进一步发展,未成年人成长面临着新的风险与挑战,急需构建面向未成年人的人工智能规范体系。文章从人才发展、AI向善和人机共融视角出发,构建了面向未成年人的人工智能技术规范体系模型:“技术内容规范... 随着ChatGPT等新型人工智能技术的进一步发展,未成年人成长面临着新的风险与挑战,急需构建面向未成年人的人工智能规范体系。文章从人才发展、AI向善和人机共融视角出发,构建了面向未成年人的人工智能技术规范体系模型:“技术内容规范”将基础性、时代性和价值性三个维度的知识结合在一起,旨在从核心素养的角度规范学生能接触到的人工智能技术内容;“技术工具规范”围绕可用性、适用性、安全性、价值观对AI学习工具的设计、开发和应用全过程提出规范要求,旨在从应用监管角度保障未成年人的使用体验;“技术伦理规范”基于以人为本、公平公正、安全可控原则,对人工智能技术伦理治理提出要求,旨在从安全伦理角度促进未成年人、社会、自然和人工智能的和谐共处。 展开更多
关键词 人工智能 未成年人 技术规范 核心素养 应用监管 安全伦理
下载PDF
打造数据业务链,迎接Mobile Data 2.0时代
13
作者 张至伟 《邮电设计技术》 2009年第5期58-61,共4页
在介绍移动数据业务链发展趋势的基础上,从无线接入、分组核心、计费系统、增值应用和服务保障等5个方面着重阐述了移动数据业务链中的5个重要环节。
关键词 移动数据业务 无线接入 分组核心 计费系统 增值应用 服务保障
下载PDF
医院安全移动应用平台的设计和实现
14
作者 郭幽燕 韩向非 +3 位作者 赵宇 陈洁 王琮琤 杜渐 《中国数字医学》 2024年第10期107-110,共4页
目的:降低医院移动办公和移动业务场景中的数据安全泄露风险。方法:基于虚拟手机技术,将移动办公和移动业务App实际安装和运行在医院内网的虚拟手机服务器上,而用户手持的移动终端只作为虚拟手机的显示和输入设备,同时部署数据安全网关... 目的:降低医院移动办公和移动业务场景中的数据安全泄露风险。方法:基于虚拟手机技术,将移动办公和移动业务App实际安装和运行在医院内网的虚拟手机服务器上,而用户手持的移动终端只作为虚拟手机的显示和输入设备,同时部署数据安全网关,实现虚拟手机与移动终端的网络隔离,防止内部数据泄露到外部。结果:用户通过移动终端访问虚拟手机中的移动应用,所有的应用数据都只在虚拟手机中被处理和存储,从而避免数据从移动终端泄露。结论:建设安全移动应用平台可以降低医院移动办公和移动业务场景中的数据安全风险,减少医院对移动终端进行安全管控的要求,有助于推动移动业务的健康发展。 展开更多
关键词 数据安全 虚拟手机 移动终端 ANDROID 移动应用
下载PDF
政务移动办公系统安全技术规范在政务领域的应用实践
15
作者 程浩 《信息技术与标准化》 2024年第S01期51-55,共5页
为适应移动政务新场景、新要求,将GB/T 35282—2023《信息安全技术电子政务移动办公系统安全技术规范》标准技术要求,在某省级百万级“政务通”移动办公平台中进行应用,在平台系统设计建设中参照标准设计系统整体安全框架,落实标准中移... 为适应移动政务新场景、新要求,将GB/T 35282—2023《信息安全技术电子政务移动办公系统安全技术规范》标准技术要求,在某省级百万级“政务通”移动办公平台中进行应用,在平台系统设计建设中参照标准设计系统整体安全框架,落实标准中移动终端、通信、接入和服务端安全方面安全要求,推动网络安全法规、等级保护2.0等要求在移动政务领域的落地,强化了移动政务终端、应用、数据、个人信息的系统化安全保护,发挥国家标准的引领和规范作用,进一步提升政务服务效能和安全保障水平。 展开更多
关键词 移动终端安全 移动通信安全 移动接入安全 移动服务端安全 系统安全管理
下载PDF
Sifu-a cybersecurity awareness platform with challenge assessment and intelligent coach
16
作者 Tiago Espinha Gasiba Ulrike Lechner Maria Pinto-Albuquerque 《Cybersecurity》 CSCD 2020年第1期333-355,共23页
Software vulnerabilities,when actively exploited by malicious parties,can lead to catastrophic consequences.Proper handling of software vulnerabilities is essential in the industrial context,particularly when the soft... Software vulnerabilities,when actively exploited by malicious parties,can lead to catastrophic consequences.Proper handling of software vulnerabilities is essential in the industrial context,particularly when the software is deployed in critical infrastructures.Therefore,several industrial standards mandate secure coding guidelines and industrial software developers’training,as software quality is a significant contributor to secure software.CyberSecurity Challenges(CSC)form a method that combines serious game techniques with cybersecurity and secure coding guidelines to raise secure coding awareness of software developers in the industry.These cybersecurity awareness events have been used with success in industrial environments.However,until now,these coached events took place on-site.In the present work,we briefly introduce cybersecurity challenges and propose a novel platform that allows these events to take place online.The introduced cybersecurity awareness platform,which the authors call Sifu,performs automatic assessment of challenges in compliance to secure coding guidelines,and uses an artificial intelligence method to provide players with solution-guiding hints.Furthermore,due to its characteristics,the Sifu platform allows for remote(online)learning,in times of social distancing.The CyberSecurity Challenges events based on the Sifu platform were evaluated during four online real-life CSC events.We report on three surveys showing that the Sifu platform’s CSC events are adequate to raise industry software developers awareness on secure coding. 展开更多
关键词 CYBERsecurity AWARENESS Training Artificial intelligence Serious games Secure coding Static application security testing Capture-the-flag Software development in industry
原文传递
Sifu-a cybersecurity awareness platform with challenge assessment and intelligent coach
17
作者 Tiago Espinha Gasiba Ulrike Lechner Maria Pinto-Albuquerque 《Cybersecurity》 2018年第1期945-967,共23页
Software vulnerabilities,when actively exploited by malicious parties,can lead to catastrophic consequences.Proper handling of software vulnerabilities is essential in the industrial context,particularly when the soft... Software vulnerabilities,when actively exploited by malicious parties,can lead to catastrophic consequences.Proper handling of software vulnerabilities is essential in the industrial context,particularly when the software is deployed in critical infrastructures.Therefore,several industrial standards mandate secure coding guidelines and industrial software developers’training,as software quality is a significant contributor to secure software.CyberSecurity Challenges(CSC)form a method that combines serious game techniques with cybersecurity and secure coding guidelines to raise secure coding awareness of software developers in the industry.These cybersecurity awareness events have been used with success in industrial environments.However,until now,these coached events took place on-site.In the present work,we briefly introduce cybersecurity challenges and propose a novel platform that allows these events to take place online.The introduced cybersecurity awareness platform,which the authors call Sifu,performs automatic assessment of challenges in compliance to secure coding guidelines,and uses an artificial intelligence method to provide players with solution-guiding hints.Furthermore,due to its characteristics,the Sifu platform allows for remote(online)learning,in times of social distancing.The CyberSecurity Challenges events based on the Sifu platform were evaluated during four online real-life CSC events.We report on three surveys showing that the Sifu platform’s CSC events are adequate to raise industry software developers awareness on secure coding. 展开更多
关键词 CYBERsecurity AWARENESS Training Artificial intelligence Serious games Secure coding Static application security testing Capture-the-flag Software development in industry
原文传递
智能铁路5G安全技术与策略综述 被引量:2
18
作者 李盼盼 吴昊 +2 位作者 刘佳佳 段莉 卢云龙 《计算机科学》 CSCD 北大核心 2024年第5期1-11,共11页
数字技术正在重塑各行各业,这是行业发展的必经之路。5G等数字服务技术在为铁路等行业赋能的同时,也带来了一些安全风险。安全是一切服务的先决条件。为促进5G数字服务在智能铁路的创新应用,首先从基站空口、通信、数据、系统、终端和... 数字技术正在重塑各行各业,这是行业发展的必经之路。5G等数字服务技术在为铁路等行业赋能的同时,也带来了一些安全风险。安全是一切服务的先决条件。为促进5G数字服务在智能铁路的创新应用,首先从基站空口、通信、数据、系统、终端和公专网融合应用几个角度,系统梳理了智能铁路5G通信网络面临的安全风险与挑战。然后针对大带宽、高可靠、低时延的新业务场景及网络切片、边缘计算等新技术和大规模异构新型终端以及面向铁路的智能新应用,全面分析了智能铁路5G服务的安全新需求,总结了密码算法、空口安全、隐私、统一认证及漫游等方面的5G安全增强新特性。在此基础上,给出智能铁路5G通信网络在安全认证、物理层安全、终端安全、切片安全、边缘计算安全方面需关注的重点。针对5G专网部署方式,给出基础设施、通信安全、安全管理数据安全、内生安全防御体系方面的建议。 展开更多
关键词 智能铁路 第5代移动通信系统(5G) 内生安全 策略综述 数字服务
下载PDF
基于BIP安全通道的iOS系统安全便捷身份认证方案
19
作者 黄世烨 黄一平 +1 位作者 梁梓辰 农丽萍 《现代电子技术》 北大核心 2024年第19期40-46,共7页
针对iOS系统应用软件与移动安全加密智能芯片间无法直接交互的问题,提出一种BIP安全通道通信方案,进而为iOS系统应用软件提供一种安全便捷的身份认证解决方案。该方案包括客户端与BIP服务器安全通信、BIP与移动安全加密智能芯片安全通... 针对iOS系统应用软件与移动安全加密智能芯片间无法直接交互的问题,提出一种BIP安全通道通信方案,进而为iOS系统应用软件提供一种安全便捷的身份认证解决方案。该方案包括客户端与BIP服务器安全通信、BIP与移动安全加密智能芯片安全通信以及客户端与移动安全加密智能芯片安全通信三个模块。方案利用移动安全加密智能芯片提供的数字签名技术为iOS客户端APP提供安全便捷的身份认证服务。通过对该方案进行安全性分析及对客户端进行性能测试,结果表明,该方案既具有安全便捷的应用效果,又具备低开销和低延迟特性。目前已应用于手机银行和信息加密领域中,具有广阔的应用前景。 展开更多
关键词 BIP通道技术 移动安全加密智能芯片 iOS系统 国密算法 身份认证 密钥协商 数字签名 客户端应用
下载PDF
铁路智能应用中数据安全与防护技术研究
20
作者 王涵 张维真 任爽 《铁路计算机应用》 2024年第11期17-22,共6页
数字化、网络化和智能化构成了铁路新质生产力的基础特征,而数据安全则是确保新质生产力持续发展的重要保障。随着人工智能技术在铁路行业的广泛应用,相关技术的进步显著提升了铁路运营的效率和安全性,同时也暴露出亟须重视的数据安全... 数字化、网络化和智能化构成了铁路新质生产力的基础特征,而数据安全则是确保新质生产力持续发展的重要保障。随着人工智能技术在铁路行业的广泛应用,相关技术的进步显著提升了铁路运营的效率和安全性,同时也暴露出亟须重视的数据安全问题。文章结合铁路的智能应用场景,分析了铁路中存在的数据安全风险与防护需求,介绍了数据脱敏、隐私计算和数据加密等数据安全与防护技术,并探讨了这些技术在铁路业务场景中的应用。最后,文章对当前铁路数据安全与防护技术的发展方向进行了阐述,指出随着数据复杂性的加剧及人工智能和大模型的快速发展,铁路的数据安全面临着更为严峻的挑战。研究结果旨在为铁路数据安全与防护工作提供技术支持,助力铁路行业在智能化转型过程中建立更加安全可靠的数据保护体系。 展开更多
关键词 铁路智能应用 数据安全 数据加密 隐私计算 大数据
下载PDF
上一页 1 2 31 下一页 到第
使用帮助 返回顶部