期刊文献+
共找到4篇文章
< 1 >
每页显示 20 50 100
Efficient Certificateless Authenticated Key Agreement for Blockchain-Enabled Internet of Medical Things
1
作者 Chaoyang Li Yanbu Guo +4 位作者 Mianxiong Dong Gang Xu Xiu-Bo Chen Jian Li Kaoru Ota 《Computers, Materials & Continua》 SCIE EI 2023年第4期2043-2059,共17页
Internet of Medical Things(IoMT)plays an essential role in collecting and managing personal medical data.In recent years,blockchain technology has put power in traditional IoMT systems for data sharing between differe... Internet of Medical Things(IoMT)plays an essential role in collecting and managing personal medical data.In recent years,blockchain technology has put power in traditional IoMT systems for data sharing between different medical institutions and improved the utilization of medical data.However,some problems in the information transfer process between wireless medical devices and mobile medical apps,such as information leakage and privacy disclosure.This paper first designs a cross-device key agreement model for blockchain-enabled IoMT.This model can establish a key agreement mechanism for secure medical data sharing.Meanwhile,a certificateless authenticated key agreement(KA)protocol has been proposed to strengthen the information transfer security in the cross-device key agreement model.The proposed KA protocol only requires one exchange of messages between the two parties,which can improve the protocol execution efficiency.Then,any unauthorized tampering of the transmitted signed message sent by the sender can be detected by the receiver,so this can guarantee the success of the establishment of a session key between the strange entities.The blockchain ledger can ensure that the medical data cannot be tampered with,and the certificateless mechanism can weaken the key escrow problem.Moreover,the security proof and performance analysis are given,which show that the proposed model and KA protocol are more secure and efficient than other schemes in similar literature. 展开更多
关键词 CERTIFICATELESS key agreement authentication blockchain internet of medical things
下载PDF
Data Anonymous Authentication for BIoMT with Proxy Group Signature
2
作者 Chaoyang Li Yalan Wang +3 位作者 Gang Xu Xiubo Chen Xiangjun Xin Jian Li 《Journal of Cyber Security》 2021年第4期207-216,共10页
Along with the increase of wearable medical device,the privacy leakage problem in the process of transmission between these edge medical devices.The blockchain-enabled Internet of Medical Things(BIoMT)has been develop... Along with the increase of wearable medical device,the privacy leakage problem in the process of transmission between these edge medical devices.The blockchain-enabled Internet of Medical Things(BIoMT)has been developed to reform traditional centralized medical system in recent years.This paper first introduces a data anonymous authentication model to protect user privacy and medical data in BIoMT.Then,a proxy group signature(PGS)scheme has been proposed based on lattice assumption.This scheme can well satisfy the anonymous authentication demand for the proposed model,and provide anti-quantum attack security for BIoMT in the future general quantum computer age.Moreover,the security analysis shows this PGS scheme is secure against the dynamical-almost-full anonymous and traceability.The efficiency comparison shows the proposed model and PGS scheme is more efficient and practical. 展开更多
关键词 Blockchain-enabled Internet of Medical Things anonymous authentication proxy group signature medical data
下载PDF
Biometric-based personal identity-authentication system and security analysis 被引量:2
3
作者 LI Chao YANG Yi-xian NIU Xin-xin 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2006年第4期43-47,共5页
The traditional authentication system is based on the secret key, and is mainly based on public key infrastructure (PKI). Unfortunately, a key has many disadvantages, for example, the key can be forgotten or stolen,... The traditional authentication system is based on the secret key, and is mainly based on public key infrastructure (PKI). Unfortunately, a key has many disadvantages, for example, the key can be forgotten or stolen, and can be easily cracked. Nowadays, authentication systems using biometric technology have become more prevalent because of the advantages over password-based authentication systems. In this article, several biometfic authentication models are presented, upon which most biometric authentication systems are based. Biometric authentication systems based-on these models provide high security for access control in non-face-to-face environment such as e-commerce, over open network. 展开更多
关键词 BIOMETRIC identity authentication PKI SECURITY
原文传递
Study on I/O response time bounds of networked storage systems
4
作者 CUI Bao-jiang LIU Jun +1 位作者 WANG Gang LIU Jing 《Frontiers of Electrical and Electronic Engineering in China》 CSCD 2006年第4期470-474,共5页
In order to predict and improve the performance of networked storage systems,this paper explored the rela-tionship between the system I/O response time and its per-formance factors by quantitative analytical method.Th... In order to predict and improve the performance of networked storage systems,this paper explored the rela-tionship between the system I/O response time and its per-formance factors by quantitative analytical method.Through analyzing data flow in networked RAID storage system,we established its analytical model utilizing closed queueing networks and studied the performance bounds of the system I/O response time.Experimental results show that the theo-retical bounds are found to be in agreement with the actual performance bounds of the networked RAID storage system and reflect the dynamic trend of its actual performance.Furthermore,it concludes that the CPU processing power and cache hit rate of the central storage server are the key factors affecting the I/O response time as the concurrent jobs are lower,while the network bandwidth and cache hit rate of the central storage server become the key factors as the concurrent jobs go higher. 展开更多
关键词 networked storage performance modeling queueing networks I/O response time
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部