共查询到20条相似文献,搜索用时 171 毫秒
1.
用户上网时会在登录网站留下浏览、搜索、下载等行为痕迹,可能会造成用户身份、住址、职业、爱好、社交关系等个人信息泄露。文中提出了一种匿名网络与协议伪装相结合的隐蔽网络构建方法,在用户和目标网络之间构建中转网络,通过链路动态跳变和链路地址加密,隐藏用户真实地址,并在中转网络入口代理处采用动态协议伪装机制,防止用户访问路径被拦截和深度内容解析导致的信息泄露。通过上网行为碎片化、通信内容隐藏化,可扰乱网络行为主体信息,有效避免用户网络行为收集和特征画像导致的信息泄露和精准攻击问题。 相似文献
2.
针对当前信息通信过程中存在通信效率低,且当有攻击者出现时无法抵御高等级攻击造成用户隐私信息泄露的问题,引入数学模型,开展对通信信息可逆矩阵机密技术的设计研究。明确信息通信的加密和解密过程后,建立信息通信机密数学函数;引入矩阵相关知识,构建通信信息可逆矩阵,并完成对可逆矩阵的编码;利用数学模型,对可逆矩阵加密;最后,利用隐私保护PCA外包协议,实现对通信信息隐私保护外包。通过对比实验的形式验证新的技术在应用中可以有效促进信息通信效率的提高,同时抵御更高等级攻击者的攻击行为为通信用户的隐私信息提供安全保障。 相似文献
3.
针对无线信道生成密钥方法在信息协商中的信息泄露问题,提出了低信息泄露Cascade算法。通过构造传统Cascade协商过程的密钥协商过程矩阵,推导了合法用户所得密钥中安全的信息量,改进了Cascade算法;结合符号定时同步预处理以及高精度参数估计得到了一个完整的密钥生成方案。基于实测数据的分析结果表明,符号定时同步预处理能有效降低初始密钥不一致率;在协商成功率、密钥生成速率、密钥随机性、安全性等方面,低信息泄露Cascade协商算法与传统Cascade算法相比综合性能更优。 相似文献
4.
樊敏 《卫星电视与宽带多媒体》2020,(2):103-105
旨在以编码解码理论为基础探讨数字博物馆的用户体验现状,并构建用户体验评价方法。本文从信息传播的编码解码理论出发,引入编码与解码机制,同时结合用户访谈构建用户体验评价指标,然后利用层次分析法构建数字博物馆用户体验评价模型。结果表明,以编码解码构建的数字博物馆评估模型能有效的评价数字博物馆的用户体验水平,同时信息内容的传递将会直接影响数字博物馆的用户体验。引入信息内容相应指标,丰富了数字博物馆的用户体验评价体系,为后续博物馆的设计决策提供了重要依据。 相似文献
5.
众包交通监测利用移动终端上传的GPS位置信息实时感知交通状况,具有广阔的应用前景。然而,上传的GPS信息会泄露用户隐私。该文基于博弈论分析用户上传行为,提出隐私保护的优化上传机制。首先建立用户上传行为与路况服务质量和隐私泄露之间的关系,据此构建不完全信息博弈模型,以便分析用户上传行为;然后,根据用户上传博弈纳什均衡,提出用户终端可控的隐私保护优化上传机制。理论分析表明,该文提出的上传机制最大化用户效用,具有激励相容特性;通过真实数据实验验证,上传机制能够提高用户的隐私保护度,以及算法的激励相容特性。 相似文献
6.
非线性编辑的常见问题及解决方法 总被引:2,自引:0,他引:2
数字技术的发展使非线性编辑正广泛应用在电视节目制作领域中,用户面临的问题也层出不穷,作者针对安全框、轨道蒙板、场序等具有代表性的问题进行了解释,结合非线性编辑的教学过程指出,教师应尽可能以学生为中心,采用多种教学模式,在真实的情境中提高学生的应用水平. 相似文献
7.
数字技术的发展使非线性编辑正广泛应用在电视节目制作领域中,用户面临的问题也层出不穷,作者针对安全框、轨道蒙板、场序等具有代表性的问题进行了解释,结合非线性编辑的教学过程指出,教师应尽可能以学生为中心,采用多种教学模式,在真实的情境中提高学生的应用水平. 相似文献
8.
目前,微软的研究员们开发出了一款移动社交网络软件,用户通过这款软件能够与朋友分享私密信息,而不必担心这些信息会泄露到网络上。 相似文献
9.
10.
作为一类重要的信息安全产品,密码产品中所使用的密码技术保障了信息的保密性、完整性和不可抵赖性。而侧信道攻击是针对密码产品的一类重要的安全威胁,它主要利用了密码算法运算过程中侧信息(如时间、功耗等)的泄露,通过分析侧信息与秘密信息的依赖关系进行攻击。对密码产品的抗侧信道攻击能力进行评估已成为密码测评的重要内容。该文从攻击性测试、通用评估以及形式化验证3个角度介绍了目前密码产品抗侧信道评估的发展情况。其中攻击性测试是目前密码侧信道测评所采用的最主要的评估方式,它通过执行具体的攻击流程来恢复密钥等秘密信息。后两种方式不以恢复秘密信息等为目的,而是侧重于评估密码实现是否存在侧信息泄露。与攻击性测试相比,它们无需评估人员深入了解具体的攻击流程和实现细节,因此通用性更强。通用评估是以统计测试、信息熵计算等方式去刻画信息泄露的程度,如目前被广泛采用的测试向量泄露评估(TVLA)技术。利用形式化方法对侧信道防护策略有效性进行评估是一个新的发展方向,其优势是可以自动化/半自动化地评估密码实现是否存在侧信道攻击弱点。该文介绍了目前针对软件掩码、硬件掩码、故障防护等不同防护策略的形式化验证最新成果,主要包括基于程序验证、类型推导及模型计数等不同方法。 相似文献
11.
Heys H.M. 《IEEE transactions on information theory / Professional Technical Group on Information Theory》2001,47(1):23-35
We examine the information leakage between sets of plaintext and ciphertext bits in symmetric-key block ciphers. The paper demonstrates the effectiveness of information leakage as a measure of cipher security by relating information leakage to linear cryptanalysis and by determining a lower bound on the amount of data required in an attack from an upper bound on information leakage. As well, a model is developed which is used to estimate the upper bound on the information leakage of a general Feistel (1975) block cipher. For a cipher that fits the model well, the results of the analysis can be used as a measure in determining the number of rounds required for security against attacks based on information leakage. It is conjectured that the CAST-128 cipher fits the model well and using the model it is predicted that information leaked from 20 or fewer plaintext bits is small enough to make an attack on CAST-128 infeasible 相似文献
12.
13.
Digital signature, one of the most important cryptographic primitives, has been commonly used in information systems, and thus enhancing the security of a signature scheme can benefit such an application. Currently, leakage resilient cryptography is a very hot topic in cryptographic research. A leakage resilient cryptographic primitive is said to be secure if arbitrary but bounded information about the signers secret key (involving other states) is leaked to an adversary. Obviously, the leakage resilient signature is more secure than the common signature. We construct an efficient leakage resilient signature scheme based on BLS signature in the bounded retrieval model. We also prove that our scheme is provably secure under BLS signature. 相似文献
14.
Chin‐Ling Chen Cheng‐Chi Lee Chao‐Yung Hsu 《International Journal of Communication Systems》2012,25(5):585-597
Various user authentication schemes with smart cards have been proposed. Generally, researchers implicitly assume that the contents of a smart card cannot be revealed. However, this is not true. An attacker can analyze the leaked information and obtain the secret values in a smart card. To improve on this drawback, we involve a fingerprint biometric and password to enhance the security level of the remote authentication scheme Our scheme uses only hashing functions to implement a robust authentication with a low computation property. Copyright © 2011 John Wiley & Sons, Ltd. 相似文献
15.
16.
Jongweon Kim Namgyu Kim Dongwon Lee Sungbum Park Sangwon Lee 《Signal Processing: Image Communication》2010,25(8):559-576
A digital object identifier refers to diverse technologies associated with assigning an identifier to a digital resource and managing the identification system. One type of implementation of a digital object identifier developed by the Korean Government is termed the Universal Content Identifier (UCI) system. It circulates and utilizes identifiable resources efficiently by connecting various online and offline identifying schemes. UCI tags can contain not only identifiers but also abundant additional information regarding contents. So, researchers and practitioners have shown great interest in methods that utilize the two-dimensional barcode (2D barcode) to attach UCI tags to digital contents. However, attaching a 2D barcode directly to a digital content raises two problems. First, quality of the content may deteriorate due to the insertion of the barcode; second, a malicious user can invalidate the identifying tag, simply by removing the tag from the original content. We believe that these concerns can be mitigated by inserting an invisible digital tag containing information about an identifier and digital copyrights into the entire area of the digital content. In this study, to protect copyrights of digital contents securely without quality degradation, we attempt to discover a sequence of process for generating a 2D barcode from a UCI tag and watermarking the barcode into a digital content. Such a UCI system can be widely applied to areas such as e-learning, distribution tracking, transaction certification, and reference linking services when the system is equipped with 2D barcode technology and secure watermarking algorithms. The latter part of this paper analyzes intensive experiments conducted to evaluate the robustness of traditional digital watermarking algorithms against external attacks. 相似文献
17.
一个采用分段验证签密隐蔽路由的设计与实现 总被引:1,自引:0,他引:1
在公开的计算机网络中采用隐蔽路由网络连接,任何隐蔽网络的用户只能获得与其直接连接的前序和后继节点的地址,使得攻击者既不能窃听到机密,也不能实施流量分析.现有的隐蔽路由方案或采用原子签名和加密,或采用嵌套加密和签名,即洋葱路由,本文应用分段验证签密的方法提出了一个新的隐蔽路由实现方案,该方案用签密代替现有方案中先签名再加密两步常规密码方法,减少协议的计算和通信量,提高了执行效率,并包容了两种方法各自具有的优点.最后分析了方案的安全性. 相似文献
18.
A new two-factor authenticated key agreement protocol based on biometric feature and password was proposed.The protocol took advantages of the user’s biological information and password to achieve the secure communication without bringing the smart card.The biometric feature was not stored in the server by using the fuzzy extractor technique,so the sensitive information of the user cannot be leaked when the server was corrupted.The authentication messages of the user were protected by the server’s public key,so the protocol can resist the off-line dictionary attack which often appears in the authentication protocols based on password.The security of the proposed protocol was given in the random oracle model provided the elliptic computational Diffie-Hellman assumption holds.The performance analysis shows the proposed protocol has better security. 相似文献
19.
传统的电力项目规划评审平台无法准确分析出故障类型,投资风险较高,为此,提出一种多源数字化信息整合方法,有效解决以上问题。从电力项目规划评审平台中提取相关信息,通过预处理去除冗余数据;根据D-S证据理论构建概率分配函数,采用合成规则整合提取多源数字化信息;利用修改证据体可信度、重新分配局部冲突解决D-S证据理论带来的公平性差与可信度低问题,实现多源数字化信息高精度整合。结果表明,文中方法能够获得更准确的电力项目规划评审平台故障类型,并根据电力用户满意度,改进电力项目规划的运营策略,准确选择投资项目,减少投资风险。 相似文献