排序方式: 共有67条查询结果,搜索用时 15 毫秒
1.
We review the constructions of two main kinds of generalized cyclotomic binary sequences with length pq (the product with two distinct primes). One is the White-generalized cyclotomic sequences, the other is the Ding-Helleseth(DH,
for short)-generalized cyclotomic sequences. We present some new pseudo-random properties of DH-generalized cyclotomic sequences
using the theory of character sums instead of the theory of cyclotomy, which is a conventional method for investigating generalized
cyclotomic sequences.
Electronic supplementary material
The online version of this article (doi: ) contains supplementary material, which is available to authorized users.
This work was supported in part by the Open Funds of Key Lab of Fujian Province University Network Security and Cryptology
(Grant No. 07B005), the Funds of the Education Department of Fujian Province (Grant No. JA07164) and the Natural Science Foundation
of Fujian Province of China (Grant No. 2007F3086). 相似文献
2.
数据中心内的文件服务存在未授权访问等安全威胁。针对该问题,提出一种基于会话的安全Web文件服务模型,通过分离文件资源数据及其原数据,实现计算资源与存储资源的独立计算,并建立相应的安全模型和安全协议。利用BAN逻辑对协议进行安全性分析,结果证明其可以抵御多种常见攻击。基于Apache的性能测试结果表明,该模型具有较高的安全性及实用性。 相似文献
3.
4.
Hui Lin Jia Hu Jianfeng Ma Li Xu Atulya Nagar 《Wireless Personal Communications》2014,75(3):1611-1633
Wireless Mesh Networks (WMNs) have drawn much attention for emerging as a promising technology to meet the challenges in next generation networks. Security and privacy protection have been the primary concerns in pushing towards the success of WMNs. There have been a multitude of solutions proposed to ensure the security of the routing protocol and the privacy information in WMNs. However, most of them are based on the assumptions that all nodes cooperate with routing and forwarding packets and the attacks are from outside. In order to defend against the internal attacks and to achieve better security and privacy protection, this paper proposes a role based privacy-aware secure routing protocol (RPASRP), which combines a new dynamic reputation mechanism with the role based multi-level security technology and a hierarchical key management protocol. Simulation results show that RPASRP implements the security and privacy protection against the inside attacks more effectively and efficiently and performs better than the classical hybrid wireless mesh protocol in terms of packet delivery ratio and average route length. 相似文献
5.
利用传统的k匿名技术在社会网络中进行隐私保护时会存在聚类准则单一、图中数据信息利用不足等问题. 针对该问题, 提出了一种利用Kullback-Leibler (KL)散度衡量节点1-邻居图相似性的匿名技术(anonymization techniques for measuring the similarity of node 1-neighbor graph based on Kullback-Leibler divergence, SNKL). 根据节点1-邻居图分布的相似性对原始图节点集进行划分, 按照划分好的类进行图修改, 使修改后的图满足k匿名, 完成图的匿名发布. 实验结果表明, SNKL方法与HIGA方法相比在聚类系数上的改变量平均降低了17.3%, 同时生成的匿名图与原始图重要性节点重合度保持在95%以上. 所提方法在有效保证隐私的基础上, 可以显著的降低对原始图结构信息的改变. 相似文献
6.
7.
数字音频水印的鲁棒性是数字水印领域的研究热点之一。为进一步提高音频水印算法针对幅度缩放等攻击的鲁棒性,借用数字图像归一化的思想,提出了一种基于归一化的抗幅度缩放攻击的数字音频水印算法。该算法首先对音频数据进行自适应分段,然后在空域部分均值化音频数据,最后在三级小波变换的低频系数上以抖动调制的方式实现水印信息的嵌入。实验结果表明所提出的算法对缩放攻击具有很好的鲁棒性,并能够抵抗加噪、低通滤波、重采样、重量化等常见攻击。 相似文献
8.
9.
针对基于同态加密的隐私保护神经网络中存在的计算效率低和精度不足问题,提出一种三方协作下支持隐私保护训练的高效同态神经网络(HNN)。首先,为降低同态加密中密文乘密文运算产生的计算开销,结合秘密共享思想设计了一种安全快速的乘法协议,将密文乘密文运算转换为复杂度较低的明文乘密文运算;其次,为避免构建HNN时产生的密文多项式多轮迭代,并提高非线性计算精度,研究了一种安全的非线性计算方法,从而对添加随机掩码的混淆明文消息执行相应的非线性算子;最后,对所设计协议的安全性、正确性及效率进行了理论分析,并对HNN的有效性及优越性进行了实验验证。实验结果表明,相较于双服务器方案PPML,HNN的训练速度提高了18.9倍,模型精度提高了1.4个百分点。 相似文献
10.