首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
As the Internet is used to a greater extent in business, issues of protection and privacy will have more importance. Users and organizations must have the ability to control reads and writes to network accessible information, they must be assured of the integrity and confidentiality of the information accessed over the net, and they must have a means to determine the security, competence, and honesty of the commercial service providers with which they interact. They must also be able to pay for purchases made on the network, and they should be free from excessive monitoring of their activities. This paper discusses characteristics of the Internet that make it difficult to provide such assurances and surveys some of the techniques that can used to protect users of the network  相似文献   

2.
Wang  Feng  Jiang  Dingde  Wen  Hong  Qi  Sheng 《Telecommunication Systems》2020,74(4):425-435
Telecommunication Systems - In the Internet of Things architecture, the distributed management structure of the data center-micro data center (MDC)-intelligent terminals is the foundation for...  相似文献   

3.
Security and privacy in RFID and applications in telemedicine   总被引:2,自引:0,他引:2  
Radio frequency identification systems have many applications in manufacturing, supply chain management, inventory control, and telemedicine. In an RFID system, products and objects are given RFID tags to identify themselves. However, security and privacy issues pose significant challenges on these systems. In this article we first briefly introduce RFID systems. Then two RFID applications in telemedicine are proposed: studying supply and demand of doctors, nurses, and patients in hospitals and healthcare, and developing mobile telemedicine services. The security and privacy issues of RFID, and their solutions are discussed as well.  相似文献   

4.
“海尔全新手机只售800元”,“知名品牌服装便宜卖了”,这些价格低得令人怀疑的商品在互联网上随时可见,消费者网上购物受骗上当的报道也屡见报端。那么,谁来保证网络交易的安全和商品的质量呢? 网上购物问题多 笔者在上海最大的拍卖网站易趣上竞拍一条连衣裙成功后,与注册名为sagalay121的小姐达成网上交易,得知卖家名为刁娟,当即汇了650元给刁  相似文献   

5.
The growth of the blockchain-based cryptocurrencies has attracted a lot of attention from a variety of fields, especially in academic research. One of them is Bitcoin, the most popular and highest valued cryptocurrency on the market. The SHA256 is the main processing part in Bitcoin mining, to date the difficulty of which is extremely high and still increases relentlessly. Hence, it is essential to improve the speed of the SHA256 cores in the Bitcoin mining system. In this paper, we propose a two-level pipeline hardware architecture for the SHA256 processing. The first-level pipeline helps the system reduce the number of operating cycles. Besides, the maximum frequency of the system is boosted by the second-level pipeline. The proposed hardware is implemented on FPGA Xilinx Virtex 7-VC707 (28 nm technology). The mining hash rate using the proposed pipeline SHA256 cores reaches 514.92 MH/s that improves 2.4 times compared to the FPGA based conventional technique. The throughput of SHA core of current study is 296.108 Gbps that is 240 times higher compared to the standard technique. The proposed architecture is also implemented in an ASIC design using ROHM 180 nm CMOS technology, which resulted in a throughput of 69.28 Gbps that is 18 times higher than that of conventional work implemented in Intel 14 nm process.  相似文献   

6.
With the deployment of more and more 5g networks, the limitations of 5g networks have been found, which undoubtedly promotes the exploratory research of 6G networks as the next generation solutions. These investigations include the fundamental security and privacy problems associated with 6G technologies. Therefore, in order to consolidate and solidify this foundational research as a basis for future investigations, we have prepared a survey on the status quo of 6G security and privacy. The survey begins with a historical review of previous networking technologies and how they have informed the current trends in 6G networking. We then discuss four key aspects of 6G networks – real-time intelligent edge computing, distributed artificial intelligence, intelligent radio, and 3D intercoms – and some promising emerging technologies in each area, along with the relevant security and privacy issues. The survey concludes with a report on the potential use of 6G. Some of the references used in this paper along and further details of several points raised can be found at: security-privacyin5g-6g.github.io.  相似文献   

7.
In the Internet of Things (IoT), security and privacy issues of physical objects are crucial to the related applications. In order to clarify the complicated security and privacy issues, the life cycle of a physical object is divided into three stages of pre-working, in-working, and post-working. On this basis, a physical object-based security architecture for the IoT is put forward. According to the security architecture, security and privacy requirements and related protecting technologies for physical objects in different working stages are analyzed in detail. Considering the development of IoT technologies, potential security and privacy challenges that IoT objects may face in the pervasive computing environment are summarized. At the same time, possible directions for dealing with these challenges are also pointed out.  相似文献   

8.
A new analog speech scrambling technique that can be looked upon as processing the analog signal in two dimensions of time and frequency is introduced. A parallel bank of time-variant filters and a dither random pulse amplitude signal, both generated from multinonlinear direct-sequence spread-spectrum codes, operate on the analog signal to destroy its intelligibility. At the receiver, a reversed sequence of time and frequency processing takes place; with appropriate synchronization through a preamplifier, the analog received signal is recovered, with a minimum amount of distortion. The building blocks are introduced, and a statistical analysis is conducted to evaluate the security of the scrambling system, in terms of the autocorrelation and cross covariance. The security of the hybrid system is compared to that of other one-dimensional scrambling schemes, and derivations thereof  相似文献   

9.
为了快速地发现SoC性能的瓶颈、实现通信结构的决策,提出一种在事务级采用SystcmC构建片上总线SoC模型的方法。该方法利用端口来连接模块和通道,利用通道来实现接口中定义的方法。经仿真验证,时序完全符合AHB标准,运行速度远高于RTL下的同类模型。该方法有助于在设计流程的早期找寻最优化的片上总线通信结构。  相似文献   

10.
Denis Trček 《Ad hoc Networks》2013,11(5):1619-1628
Pervasive computing is already becoming a reality and one crucial consequence of this fact is endangered privacy. Now taking into account typical properties of pervasive computing devices, which are weak computing power and stringent energy or power consumption limitations, lightweight solutions are a must. This especially holds true for all-in-silicon objects like radio frequency identification tags, or RFIDs. Many solutions in this area are called lightweight, but being lightweight requires conformance to quantitative requirements using certain metrics. A solution that adheres to such requirements is a new privacy enabling protocol for RFIDs that outperforms other architecturally similar protocols, and this presents the first contribution of this paper. Further, privacy is not only a matter of technical solutions, but increasingly so a matter of organizational processes. This fact calls for further addressing of supporting its formal treatment in business contexts. This paper provides a basis for formal addressing of privacy from business processes perspective, and this is its second main contribution.  相似文献   

11.
The Internet of Things (IoT) means connecting everything with every other thing through the Internet. In IoT, millions of devices communicate to exchange data and information with each other. During communication, security and privacy issues arise which need to be addressed. To protect information about users’ location, an efficient technique should be devised. Several techniques have already been proposed for preserving location privacy in IoT. However, the existing research lags in preserving location privacy in IoT and has highlighted several issues such as being specific or being restricted to a certain location. In this paper, we propose a new location privacy technique called the enhanced semantic obfuscation technique (ESOT) to preserve the location information of a user. Experimental results show that ESOT achieves improved location privacy and service utility when compared with a well-known existing approach, the semantic obfuscation technique.  相似文献   

12.
The presence of ubiquitous connectivity provided by wireless communications and mobile computing has changed the way humans interact with information. At the same time, it has made communication security and privacy a hot-button issue. In this article we address the security and privacy concerns in wireless access networks. We first discuss the general cryptographic means to design privacy-preserving security protocols, where the dilemma of attaining both security and privacy goals, especially user accountability vs. user privacy, is highlighted. We then present a novel authentication framework that integrates a new key management scheme based on the principle of separation of powers and an adapted construction of Boneh and Shacham's group signature scheme, as an enhanced resort to simultaneously achieve security, privacy, and accountability in wireless access networks.  相似文献   

13.
李金玉  杜永文 《信息技术》2007,31(9):67-69,72
在移动计算环境中,为了支持断连操作,一方面,需要在移动客户端上进行数据缓存;另一方面,在重新连接后,移动客户端上的暂时事务需要在服务器上重新执行,这使得事务的一致性很难得到保障。扩展嵌套事务的概念并提出了一种模型,通过在事务执行机制中加入移动代理,使事务执行时数据的一致性在频繁断连状态下能满足应用要求。  相似文献   

14.
研究人员已经致力于组合事务的恢复问题研究,但是大多数成果集中通过向后恢复来维持事务的一致性,补偿是向后恢复通常使用的一种手段,但是向后恢复的最大缺陷就是导致代价相当高,且向后恢复策略不能完全满足各种不同恢复需求。提出一种基于失败类型的恢复算法(包括向前、向后和替代恢复),其是一种基于扩展Petri网的形式化建模方法,为实现松弛ACID属性,引入状态托肯、数据托肯和QoS托肯,增加失败变迁和补偿变迁。失败发生时,动态计算终止依赖点TDP和补偿集,依据任务之间的控制流、数据流、时序、状态和行为依赖,获取任务的失败类型,选择合适的恢复策略,构造一个支持无缝添加/删除失败恢复的可执行模型。  相似文献   

15.
在电信行业,如何进一步加强用户隐私保护,如何采用信息化技术与管理手段,高效实施数据安全,取得隐私保护与成本的均衡,在业务与公共安全场景采取分级分类的隐私保护策略和手段确保数据安全,是运营商重点攻关的内容。从隐私保护的评估规划、发现与标识、访问治理、隐私存储的性能与成本均衡4方面进行探讨,提出相关创新思路。  相似文献   

16.
李凤华  张翠  牛犇  李晖  华佳烽  史国振 《通信学报》2015,36(12):114-123
作为基于位置服务中的一种重要信息,智能终端用户的轨迹隐私保护问题日益受到广大研究者的重视。为解决这一问题,综合考虑了用户所处区域的背景信息、用户行动模式和轨迹相似性等特征,构建了(k?1)条难以被拥有背景信息的敌手所区分的虚假轨迹,从而为移动用户提供k-匿名级别的轨迹隐私保护。相对于现有技术,该方案不依赖于任何可信第三方,能够在保证虚假轨迹与真实轨迹相似性的基础上有效抵御拥有背景信息的敌手的攻击。实验结果表明了方案的有效性和高效性。  相似文献   

17.
《Electronics letters》1999,35(24):2096-2098
The security level in existing workstation and server systems is not sufficient for most applications in a network environment. The processors only provide basic multitasking support, and any other security enforcement has to be carried out in the software layers. It is shown why stronger hardware security must be provided by the processor, and how it can be realised to limit the execution time overhead to 2%. This overhead is only required for the critical parts of the code that need strong protection  相似文献   

18.
针对传统电子商务交易风险评估精度低的难题,为了获得更加理想的电子商务交易风险评估结果,提出灰色关联分析和相关向量机的电子商务交易风险评估模型。首先根据相关研究构建电子商务交易风险的评估指标,并采用灰色关联分析选择对评估结果最重要的评估指标;然后采用最小二乘支持向量机对电子商务交易风险评估样本进行学习,构建电子商务交易风险的评估模型;最后对模型的有效性和优越性进行分析。结果表明,该模型提高了电子商务交易风险的评估精度,能够为电子商务交易提供有价值的参考信息。  相似文献   

19.
王媛  孙宇清  马乐乐 《通信学报》2012,33(Z1):239-249
为了实现社会网络中个性化隐私保护,提出了支持个性化隐私偏好授权模型,采用基于一阶逻辑隐私偏好描述语言,表达用户个性化隐私需求;引入基于主体属性的访问者-角色授权规则和基于客体标签的角色-权限指派规则,解决了动态用户授权和细粒度访问权限指派问题;分析了隐私策略冲突各种情况,实现了基于Prolog逻辑编程的策略一致性自动验证;设计了面向社会网络个性化隐私策略管理和实施中间件,将个性化隐私策略管理有效地集成到对既有资源的访问控制系统中,实验表明策略冲突分析具有良好的执行效率。  相似文献   

20.
We present a new protocol for electronic transactions which is not only secure but also anonymous, the latter characteristic being obtained by associating an encryption device with a chip card. Security is ensured by the use of encryption, electronic signature and authentication. In order to check the validity of the security properties enforced by the protocol, a model and a specification are provided. The protocol modeling language is a process algebra with value passing extended by an observation mechanism allowing the specification of security levels, by cryptographic primitives, and by a function call feature on private channels allowing the modeling of interactions with the crypto-system. The anonymity is expressed by an information flow property. The verification method, based on cosimulation, is proved consistent and complete and analysis confirms that this approach ensures not only anonymity (thanks to the fact that the client never discloses to the merchant any information permitting his identification), but also the quasi-impossibility of any fraudulent transaction.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号