期刊文献+
共找到4篇文章
< 1 >
每页显示 20 50 100
A Novel Direct Anonymous Attestation Protocol Based on Zero Knowledge Proof for Different Trusted Domains 被引量:3
1
作者 YANG Yatao CAO Lulin LI Zichen 《China Communications》 SCIE CSCD 2010年第4期172-175,共4页
In order to solve the issue that existing direct anonymous attestation (DAA) scheme can not operate effectively in different domains,based on the original DAA scheme,a novel direct anonymous attestation protocol used ... In order to solve the issue that existing direct anonymous attestation (DAA) scheme can not operate effectively in different domains,based on the original DAA scheme,a novel direct anonymous attestation protocol used in multi domains environment is proposed and designed,in which,the certificate issuer located in outside of domain can be considered as a proxy server to issue the DAA certificate for valid member nodes directly.Our designed mechanism accords with present trusted computing group (TCG) international specification,and can solve the problems of practical authentication and privacy information protection between different trusted domains efficiently.Compared with present DAA scheme,in our protocol,the anonymity,unforgeability can be guaranteed,and the replay-attack also can be avoided.It has important referenced and practical application value in trusted computing field. 展开更多
关键词 Network Security trusted Computing Direct Anonymous Attestation trusted Domain.
下载PDF
Planning method of droplet fusion scheduling based on mixedinteger programming
2
作者 XIONG JiaCong CHEN JianKui +2 位作者 WANG YiXin YIN ZhouPing LI YiQun 《Science China(Technological Sciences)》 SCIE EI CAS CSCD 2024年第1期157-171,共15页
The emergence of new display devices,such as organic light-emitting diodes,has brought about numerous advantages,including high material utilization,low cost,and high adaptability.These devices are manufactured using ... The emergence of new display devices,such as organic light-emitting diodes,has brought about numerous advantages,including high material utilization,low cost,and high adaptability.These devices are manufactured using inkjet printing and possess the potential to become a key technology for display transformations.However,a challenge in achieving this is the display effect that reveals uneven brightness and darkness,which can be avoided by controlling the volume of ink solution in a pixel to within 5%.Currently,the volume difference among the nozzles of commercial printheads does not meet the requirements for volume uniformity,thus challenging the printing process.Therefore,designing a suitable printing method that allows for the fusion of different volumes of ink droplets,ultimately reducing the error of the post fusion process,is necessary.In this study,we propose a print display droplet fusion scheduling method comprising two main steps.First,we use a dichotomous trust domain algorithm to obtain a feasible range of printhead docking point spacings for different nozzle and pixel panel resolutions.Second,we model the printing process as a droplet fusion scheduling model based on mixed integer programming,with the optimization objective of achieving intra pixel volume uniformity via ensuring the volume uniformity of ink droplets within all pixels.We verified this method through numerical simulations and printing experiments using 394 pixels per inch(ppi)pixel panels and successfully reduced the volume uniformity error among pixels to within 5%. 展开更多
关键词 printing display droplet fusion mixed-integer programming dichotomous trust domain
原文传递
Trusted domain hierarchical model based on noninterference theory
3
作者 Zhang Lei Chen Xingshu +1 位作者 Liu Liang Jin Xin 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2015年第4期7-16,共10页
To ensure the integrity and security of cloud tenants' workload, and to prevent unexpected interference among tenants, cloud platform must make sure that system behaviors are trusted. By analyzing threats that exist ... To ensure the integrity and security of cloud tenants' workload, and to prevent unexpected interference among tenants, cloud platform must make sure that system behaviors are trusted. By analyzing threats that exist in the cloud platform, a novel trusted domain hierarchical model(TDHM) based on noninterference theory was proposed in this paper to solve these problems. First of all, the abstraction modeling of tenants' computing environment and trusted domain(TD) were introduced for designing TDHM with formal methods. Secondly, corresponding constraints for trusted running were given to satisfy security requirements of tenants' TD, and security properties of TDHM ware analyzed. After that, trusted behavior of TD was defined based on these properties, and the decision theorem of that was proved. It illustrated that the design and implementation of TD in cloud followed the model with characteristics of trusted behavior. Finally, the implementation of prototype system was introduced based on our previous work, and evaluation results showed that the performance loss was in the acceptable range. 展开更多
关键词 trusted domain hierarchical model noninterference theory CLOUD INTEGRITY SECURITY trusted domain
原文传递
Anonymous authentication protocol for multi-services in wireless environments
4
作者 JIANG Nan WANG Jian 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2008年第4期69-74,共6页
To provide mutual authentication among users, wireless networks, and service providers in roaming wireless environments, this article presents an anonymous authentication and access control protocol. Bases on this pro... To provide mutual authentication among users, wireless networks, and service providers in roaming wireless environments, this article presents an anonymous authentication and access control protocol. Bases on this protocol, entities of different trusted domains can mutually authenticate each other and preserve the anonymity of users. Hybrid cryptosystem, secret splitting, and hash chains are used in the protocol, which decrease computational loads and establish trusted relations for both entities. The proposed protocol has the least computation complexity compared with other protocols, whereas, the security has been significantly improved. 展开更多
关键词 AUTHENTICATION wireless networks trusted domain secret splitting hash chain
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部