首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 62 毫秒
1.
杨彬  王兵 《电子测试》2016,(23):116-117
智能移动设备不断接近传统计算环境的性能和可扩展性.但这些新的功能和应用使移动设备成为攻击者和恶意软件的攻击目标.本文分析了移动设备所面临的安全挑战,深入研究了移动设备的安全模型.  相似文献   

2.
For the problem of secure data sharing and access control in mobile cloud,the drawback of traditional cryptographic access control schemes was deeply analyzed.Considering the truth that mobile devices were usually equipped with limited resources,an optimized attribute-based cryptographic access control scheme was proposed in this study.In the proposed scheme,a third party proxy was introduced into the system model,and the two-layer encryption method was applied.Combining traditional attribute-based encryption (ABE) algorithm with multi-secret sharing and split measurement of ABE encryption,the scheme could greatly reduce the cost of mobile users in terms of data publish and access management.Theoretical and experimental analysis shows that the contribution can well meet the requirements of mobile cloud in terms of security,computational complexity and communication cost,which means that it is promising for future applications.  相似文献   

3.
随着移动互联网技术的迅速发展,传统的推荐系统已不能很好地适应基于位置的推荐服务,同时也面临隐私泄露的问题.本文针对上述问题,首先提出一种分布式隐私保护推荐框架,并利用差分隐私保护理论,设计基于分布式框架的奇异值分解推荐算法,同时利用保序加密函数实现用户请求位置的保护.理论分析和在两个真实的数据集上的实验表明,本文提出的方法不仅具有较强隐私保护能力,同时相比传统的几种推荐算法,也具有较好的推荐性能.  相似文献   

4.
对蓝牙安全机制鉴权过程中的加密算法进行了研究.分析了目前采用的基于序列密码的加密算法存在的安全隐患,提出利用分组密码实现加密的思路.详细讨论了蓝牙鉴权过程中的各类攻击方式,从硬件和软件两个方面阐述了防范的措施.对128位AES加密算法进行了研究和改进,使之能够适用于运算速度相对较低、存储资源相对较少的蓝牙移动系统环境.测试表明,改进后的AES算法可以为蓝牙的鉴权过程提供更为可靠的安全保证.  相似文献   

5.
朱德利  陈林 《信息技术》2006,30(1):10-14
指出软件保护机制与网络保密通信机制是类似的,现有软件保护方法不够安全的根本原因是软件开发者将软件运行所需要的全部模块交给用户,没有数据的差异化。并提出基于核心数据包在线管理的软件保护方法,将网络空间的加密算法原理运用在保护软件中,采取在线验证核心软件数据包的方法采防止软件被破解,论述了这一方法的基本原理、分层结构和授权层、管理层、加密层的运行机制。最后描述了本方法在流行的软件开发平台.NET框架中的实现。实践证明,该方法能比现有的方法更有效的防止软件被破解。  相似文献   

6.
与传统的手工软件测试技术相比,自动化软件测试技术可以构造手工测试过程中难以实现的临界条件,节省大量的人工和时间成本,取得了较好的测试效果。构建W模型检验软件工程各个阶段测试任务,分析移动应用软件与传统PC应用软件不同之处,探索如何测试移动应用软件。实验结果显示。基于W模型的移动软件自动化测试技术能够有效地解决测试过程中的各种临界问题。  相似文献   

7.
Radio frequency identification (RFID) technology system is quickly evolved many applications to manage personnel can be more efficient for automation systems. We combine the RSA encryption and decryption algorithms to raise the safety and the information security systems. The RFID environment has been communicated to exchange data for heterogeneous wireless networks. In this paper, it is implemented the RFID-based campus system solutions to security and privacy of RFID system for wireless mesh network applications. We propose to enhance the security algorithm combined RFID devices for the antenna arrays system. This paper is also presented the integrated framework for the application and integration systems based on service oriented architecture, and given a specific application of the framework combined with campus system.  相似文献   

8.
属性基加密可以为雾-云计算中的数据提供机密性保护和细粒度访问控制,但雾-云计算系统中的移动设备难以承担属性基加密的繁重计算负担。为解决该问题,该文提出一种可验证外包解密的离线/在线属性基加密方案。该方案能够实现离线/在线的密钥生成和数据加密,同时支持可验证外包解密。然后,给出方案的选择明文攻击的安全证明和可验证性的安全证明。之后,该文将转换阶段所需双线性对的计算量降为恒定常数。最后,从理论和实验两方面对所提方案进行性能分析,实验结果表明该方案是有效且实用的。  相似文献   

9.
为提高对数据集的加密效果和保障数据集的安全性,在分析传统非对称密钥(RSA)算法运行原理及其参数选择、素数判定条件的基础上,提出了改进RSA算法。为进一步提升加密速度,引入数据加密(DES)算法。首先利用DES算法实现明文数据集的加密,并针对密钥进行RSA加密;在此基础上,在明文和密文空间中,利用加法同态过程对密文进行计算,并通过对结果的解密操作得到相应的明文计算结果。实验结果表明,与基于传统RSA算法或DES算法的加密方法相比,该方法的加密效率和抵御攻击成功率更高,加密过程耗时5~6 s,抵御攻击成功率保持在95%上下,说明该方法能够有效保护隐私数据集的安全。  相似文献   

10.
Intrusion Detection Techniques for Mobile Wireless Networks   总被引:8,自引:0,他引:8  
Zhang  Yongguang  Lee  Wenke  Huang  Yi-An 《Wireless Networks》2003,9(5):545-556
The rapid proliferation of wireless networks and mobile computing applications has changed the landscape of network security. The traditional way of protecting networks with firewalls and encryption software is no longer sufficient and effective. We need to search for new architecture and mechanisms to protect the wireless networks and mobile computing application. In this paper, we examine the vulnerabilities of wireless networks and argue that we must include intrusion detection in the security architecture for mobile computing environment. We have developed such an architecture and evaluated a key mechanism in this architecture, anomaly detection for mobile ad-hoc network, through simulation experiments.  相似文献   

11.
In modern mobile communications, personal privacy and security are of top concern to mobile phone subscribers. Yet, owing to the limit of their processing capability, mainstream mobile manufacturers are still unable to apply advanced security protocol to mobile devices. It should be noted that many security protocols are based on RSA algorithm. To implement RSA algorithm and thus apply many advanced security protocols to mobile networks, this paper proposes an efficient and practical method based on the Texas Instruments TMS320C55x family. When the proposed method is employed, it takes only 7.9 milliseconds to perform a 1024-bit RSA encryption operation at the clock frequency of 200 MHz. Our decryption operation is at least 3.5 times faster than the time taken to perform the same operation without employing the proposed method. In addition, the proposed method can stop any power-analysis attack on RSA-based security protocols, thereby enhancing the security of mobile environments.  相似文献   

12.
Payment methods using mobile devices instead of using traditional methods (cash, credit card, etc) has been gaining popularity all over the world. The ubiquitous nature of smartphones and tablets has widened the ambit for using these devices for payments and other daily life activities. Recent advancements in mobile technology along with the convenience of mobile devices made these applications possible. Despite the worldwide user adoption of mobile applications, security is the key challenge in mobile banking and payments system. Mobile payments systems need to be very efficient and provide utmost security endlessly. State‐of‐the‐art mobile payment systems need the physical presence of a merchant agent to make a payment. In this article, we had described in detail about the design and implementation of a mobile payments application, used to make in‐store purchases and make secure payments without any physical presence of a cashier or a merchant agent. We proposed a novel privacy‐preserving and secure authentication algorithm to make mobile payments using biometrics. The analysis and experimental results show the reliability and efficiency of our proposed solution.  相似文献   

13.
李迎春 《移动信息》2023,45(10):123-125
数据加密技术在计算机网络安全中发挥着重要的作用,其能保证数据传输的安全性,提升网络系统的安全防护等级,提高信息安全评估标准。随着计算机网络安全隐患的逐渐增加,其危害也不断加大,数据加密技术在计算机网络安全中的应用逐渐得到了普及。数据加密技术在网络数据库、个人信息保护、虚拟专用网络、计算机软件保护等方面都有良好的应用,可以为其提供优质的安全防护,保证了数据的安全,减少了计算机网络安全问题造成的损失。  相似文献   

14.
Logistic映射是一种简单的非线性模型,但却有复杂的动力学性质。文中分析基于Logistic映射的混沌图像加密算法,提出一个改进的基于该算法的加密解密模型,并采用Matlab仿真实现,其结果与传统Logistic混沌序列加密算法相比,在图像不失真的情况下大大增强图像加密的安全性。  相似文献   

15.
该文针对工业控制系统安全,提出面向数控系统(NCS)网络安全保护技术框架,选用国产密码系列算法中的SM2, SM3, SM4算法,设计并建立了数控网络(CNC)认证与验证模型(AUTH-VRF),分内外两层为数控网络提供安全防护。外层为数控网络设备间通信与传输进行安全认证实现网段隔离,内层验证通信协议完整性以确保现场设备接收运行程序的正确性与有效性;通过基于SM2, SM3, SM4算法设计和部署的外层防护装置,为分布式数控(DNC)设备与数控系统之间的通信提供身份认证与文件加密传输;同时针对工业控制网络的S7Comm工业通信协议数据,通过SM3算法验证专有工业协议数据完整性。通过网络攻击实验证明,AUTH-VRF模型可以为数控网络中工业生产数据提供有效的安全认证和资源完整性保护,为满足我国关键基础设施“国内、国外工业控制系统产品共同安全可控”和“安全技术深入工业控制系统各个层级”的需求提供了实际可行的技术参考方案。  相似文献   

16.
陈庄  于溯  罗颂  蔡定雯 《电讯技术》2021,61(12):1562-1572
针对传统图像加密算法难以保证在云环境下密钥配送的安全性,以及DNA编码在抗统计学分析效果欠佳等问题提出了一种面向云环境的彩色图像混合加密算法。提出了一种自适应DNA编码对传统方法进行改善,通过国产SM2与SM3加密算法作为散列值的生成函数与控制参数的非对称加密,运用盲水印技术镶嵌至密文图像中。实验结果表明,该算法密钥空间大且加密图像相邻像素相关性较低,具有更为接近理想值的像素改变率与像素平均改变强度,具有较为理想的安全性同时在密钥的传输过程中由非对称加密算法保证其安全可靠。  相似文献   

17.
In order to carry on copyright protection and security verification of color QR code,the digital image chaos encryption technology and digital watermarking technology were respectively researched.Firstly,an improved image chaos encryption algorithm was proposed as a preprocessing step of digital watermarking algorithm.Then a color QR code digital watermarking algorithm was designed based on discrete wavelet transform and matrix singular value decomposition.Finally,the feasibility of the algorithm was verified by experiments.The results show that the proposed method has good resistance to JPEG compression,noise attack and cropping attack.  相似文献   

18.
胥光辉  徐永森 《电信科学》2001,17(12):35-38
本文首先介绍了移动证券业务中对于敏感交易信息的加密和解密过程,提出了具体的安全性要求。然后,给出了一种可以用于移动证券业务的安全机制,该安全机制采用了两密钥的三重DES算法进行加解密;密钥分为传输密钥和交易密钥两种,每种密钥经过三级分散处理;同时引入了动态密钥下载、密钥版本更新等新功能,很好地满足了移动证券业务对于安全性的要求。接着,给出了该安全机制的一个具体实现过程,最后是安全性分析和结论。  相似文献   

19.
With the trend that enterprise key data moves to mobile terminal,data leakage prevention has become an im-portant issue on mobile terminal.To solve the problem,a pre-decryption transparent encryption technology was set up which solved the problem that traditional transparent encryption technology only can ensure application layer security,in addition,performance on mobile was improved.At the same time,taking advantage of the idea of combining thin client and mobile terminal to prevent leakage of data,a virtual remote desktop technology on mobile was proposed,which completely shield the shortcomings of data transmission and ensure the safe transmission of mobile terminal data.Finally,a data leakage pre-vention system for mobile terminal was set up,which makes the mobile terminal fully and effectively protected.  相似文献   

20.

The cloud computing is interlinked with recent and out-dated technology. The cloud data storage industry is earning billion and millions of money through this technology. The cloud remote server storage is on-demand technology. The cloud users are expecting higher quality in minimal cost. The quality of service is playing a vital role in any latest technology. The cloud user always depends on thirty party service providers. This service provider is facing higher competition. The customer is choosing a service based on two parameters one is security and another one is cost. The reason behind this is all our personal data is stored on some third party server. The customer is expecting higher security level. The service provider is choosing many techniques for data security, best one is encryption mechanism. This encryption method is having many algorithms. Then again one problem is raised, that is which algorithm is best for encryption. The prediction of algorithm is one of major task. Each and every algorithm is having unique advantage. The algorithm performance is varying depends on file type. The proposed method of this article is to solve this encryption algorithm selection problem by using tabu search concept. The proposed method is to ensure best encryption method to reducing the average encode and decode time in multimedia data. The local search scheduling concept is to schedule the encryption algorithm and store that data in local memory table. The quality of service is improved by using proposed scheduling technique.

  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号