共查询到19条相似文献,搜索用时 109 毫秒
1.
2.
3.
本文通过对TPM进行介绍,重点对TPM在认证协议中用到的相关技术做了详细的说明,并指出在远程认证过程中容易出现的问题,提出了一种基于可信平台的远程认证的完整性协议,并将其在DRM中如何应用做了简要说明。 相似文献
4.
5.
6.
7.
针对安全问题的可信计算研究 总被引:2,自引:0,他引:2
本文采用安全状态转移模型化的方法对现有计算机安全体系结构进行分析。在体系结构中引入引用监控器来判断主体请求是否合理。之后通过比较传统计算机体系结构与可信计算平台的相似点,阐述可信计算的原理和应用。最后对可信计算在未来发展过程中可能遇到的难点进行深入探讨。 相似文献
8.
9.
10.
随着计算机网络的发展,通信安全和身份保护成为了一个重要的问题。在保证安全连接的时候,往往会暴露通信双方的身份信息。可信计算集团(TCG)定义的TPM标准版本1.2中使用了直接匿名认证技术。直接匿名认证技术(Direct Anonymous Attestation,简称DDA),使得通信双方在建立连接时,就可以确信对方是安全的计算平台,因此可以进行安全的数据交互;同时,此协议也保证了用户的隐私,使用无组员撤销的群签名机制使得通信双方在安全连接的时候不会暴露各自的身份信息。这种机制所依赖的主要算法是80年代末90年代初开始出现的零知识认证技术(Zero-Knowledge Proof)。 相似文献
11.
提出一种敏感、鲁棒的信任度计算模型。在缺乏直接交易证据时,基于推荐信任、信誉等间接信任度估计信任度初值,随交易的建立和累积与直接交易证据共同作出信任评价,并最终过渡至直接信任度计算。采用动态平衡系数,兼顾信任度初值估值和直接交易证据小样本风险,逐步降低信任度初值估值风险并将其限制在最初的有限次交易以内;同时增加交易证据对信任度的贡献。在直接信任度计算中,采用双滑动窗口机制,即稳定性窗口N和敏感性窗口M,使信任度保持相对稳定又对交易满意度动态敏感。采用动态权值法赋予明显偏离信任度均值的节点信任度较小权值,提高模型的抗攻击能力。给出了直接信任度稳定性窗口N、敏感性窗口M、稳定性—敏感性平衡系数的建议值。仿真结果验证了本方法的有效性。 相似文献
12.
田久乐 《网络安全技术与应用》2014,(2):170-170,173
随着科学技术的快速发展,人们逐渐对云计算技术的开发与应用重视起来。现阶段云技术开发仍处相对混沌状态,云计算具体发展方向和基本执行策略尚不清晰,在其行业领域中甚至并无相应概念解释。云计算技术是基于计算机互联网对应分部公式的一种具体计算技术,其会在一定程度上形成较大运算服务能力且可体验快速的运算。 相似文献
13.
14.
Practical implementation of geometric operations remains error-prone, and the goal of implementing correct and robust systems for carrying out geometric computation remains elusive. The problem is variously characterized as a matter of achieving sufficient numerical precision, as a fundamental difficulty in dealing with interacting numeric and symbolic data, or as a problem of avoiding degenerate positions. The author examines these problems, surveys some of the approaches proposed, and assesses their potential for devising complete and efficient solutions. He restricts the analysis to objects with linear elements, since substantial problems already arise in this case. Three perturbation-free methods are considered: floating-point computation, limited-precision rational arithmetic, and purely symbolic representations. Some perturbation approaches are also examined, namely, representation and model, altering the symbolic data, and avoiding degeneracies 相似文献
15.
Harry B. Lincoln 《Language Resources and Evaluation》1970,5(1):29-36
Conclusion In our opening remarks we noted the emphasis on the tools of computer-oriented music research prevailing in most writing.
It is not likely that this situation will change for some time. It is apparent that there is a wide variety of computer applications
being tested in music research and equally apparent that there is only limited collaboration and limited effort at devising
common procedures. It is to be hoped that the future will see the acceptance of one music representation as a lingua franca;
the development of widely usable programs with a central clearing house for such programs; and the development of data banks
of encoded music scores, thematic indices of various repertories, and other information useful to the music researcher. 相似文献
16.
17.
Evolutionary computation has started to receive significant attention during the last decade, although the origins can be traced back to the late 1950's. This article surveys the history as well as the current state of this rapidly growing field. We describe the purpose, the general structure, and the working principles of different approaches, including genetic algorithms (GA) (with links to genetic programming (GP) and classifier systems (CS)), evolution strategies (ES), and evolutionary programming (EP) by analysis and comparison of their most important constituents (i.e. representations, variation operators, reproduction, and selection mechanism). Finally, we give a brief overview on the manifold of application domains, although this necessarily must remain incomplete 相似文献
18.
本文首先阐述了DRM发射端的系统结构,根据发射端的系统结构标准,利用软件无线电技术在计算机中实现了DRM接收系统,并给出了一种通用的软件设计框架;最后给出了所实现的DRM软件接收系统的性能评测结果。 相似文献