首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
当前,由于软件发行商通常不为应用程序和可执行文件(程序文件,共享库,脚本等)提供用以验证其可靠性的关键信息,所以计算机管理员想要自动辨别这些文件是否被第三方修改过变得十分困难.通过与民航飞行的安全性要求进行类比,分析了软件身份标签如何从身份鉴别、应用关联、防止篡改和未知威胁这四方面改善软件的安全性.  相似文献   

2.
陈志涛  金波  杨小东 《电子测试》2020,(4):79-80,65
为了提高网络数据传输的安全性,本文对区块链技术进行研究,阐述了其基础框架,并基于区块链技术提出了数据安全传输方案,主要包括感知数据、数据加密、数据传输三部分,期望提高数据传输的安全性,以降低数据被非法截取的发生率。  相似文献   

3.
基于5G网络架构逐层对5G网络存在的安全风险进行梳理与分析,总结出四大安全风险点,即用户标识的安全性、数据的机密性与完整性、终端的真实性以及网络功能的可用性,并提出对策与建议。  相似文献   

4.
文中在论述Intel、微软和TCG所提出的可信计算机实现框架的基础上,对目前出现的安全增强型BIOS系统进行了分析。基于此,提出了一种集计算机硬软件系统于一体的X86架构的可信计算机实现框架,描述了框架中各组件模块的功能及框架特点,设计了实现框架中BIOS系统的安全模块,并对其安全性进行了分析。  相似文献   

5.
This paper analyses the security of a recently proposed image encryption algorithm and shows a series of weaknesses that make it unusable in applications requiring medium or high levels of security. We show that the algorithm has some minor flaws, such as impractical decryption or impossibility to encrypt black images as well as a major flow, linearity, which makes it vulnerable to cryptanalysis. We present a chosen cipher text attack and show that, after the cryptanalysis, an attacker can successfully decrypt any cipher image, without knowledge of the secret key.  相似文献   

6.
We describe a modification of an interactive identification scheme of Schnorr intended for use by smart cards. Schnorr's original scheme had its security based on the difficulty of computing discrete logarithms in a subgroup of GF(p) given some side information. We prove that our modification will be witness hiding, which is a more rigid security condition than Schnorr proved for his scheme, if factoring a large integer with some side information is computationally infeasible. In addition, even if the large integer can be factored, then our scheme is still as secure as Schnorr's scheme. For this enhanced security we require only slightly more communication and about a factor of a 3.6 increase in computational power, but the requirements remain quite modest, so that the scheme is well suited for use in smart cards.A preliminary version of this paper was presented at Eurocrypt '90, May 21–24, Århus, Denmark, and has appeared in the proceedings, pp. 63–71. This work was performed under U.S. Department of Energy contract number DE-AC04-76DP00789.  相似文献   

7.
Prony's method of spectrum analysis models a time series as a linear combination of complex exponentials plus a white noise. The performance of the method is very dependent on the peculiarity of the signal to be analyzed. Four algorithms for autoregressive estimation are experimentally compared to provide valid indications for the choice of the most suitable one for estimating the Prony's parameters. L. Marple's algorithm (1980) seems to be the best, while well-known facts about bias in frequency estimation produced by Burg's algorithm are confirmed; nevertheless, it performs better than the covariance and the singular-value-decomposition-based algorithms  相似文献   

8.
无线射频识别安全初探   总被引:5,自引:1,他引:5  
引言随着大规模集成电路技术的进步以及生产规模的不断扩大,无线射频识别(简称RFID)产品的成本将不断降低,RFID应用也将越来越广泛。由于在最初的RFID应用设计和开发过程中,没有考虑安全问题,导致安全问题日益凸显,已经成为制约RFID应用的重要因素。本文在讨论RFID安全问题和介绍RFID安全技术的基础上,提出我国RFID安全技术的发展建议。安全制约RFID的应用RFID技术在国外发展非常迅速,RFID产品种类繁多。RFID技术以其独特的优势,被广泛应用于工业自动化、商业自动化、交通运输控制管理等众多领域;汽车、火车等交通监控;高…  相似文献   

9.
In their paper L. Gómez et al. (1981) presented some statistical properties of randomly generated boolean functions. One of their formulae is not correct, hence the published numerical results are not valid. In this paper the correct formula is derived.  相似文献   

10.
公路工程施工是一项比较复杂的建筑工程,其建设周期长,施工环境也复杂,在施工的过程中还存在很大的安全隐患。为了避免安全事故的发生,积极采取科学有效的管理措施就显得尤为重要。想要在有限的人力资源中实现对安全事故的有效管理就必须积极的采用物联网技术,在公路工程的施工过程中积极采用物联网技术,可以在很大程度上克服传统的安全管理模式所存在的缺陷,能够对安全问题进行及时的预警,并且在此基础上进行有效的消除。进而有效保障公路工程的施工安全。  相似文献   

11.
We consider the signal detection problem in amplified optical transmission systems as a statistical hypothesis testing procedure, and we show that the detected signal has a well-known chi-squared distribution. In particular, this approach considerably simplifies the derivation of bit-error rate (BER). Finally, we discuss the accuracy of the Gaussian approximations to the exact distributions of the signal  相似文献   

12.
This article aims at designing a new Multivariate Quadratic (MQ) public-key scheme to avoid the linearization attack and differential attack against the Matsumoto-Imai (MI) scheme. Based on the original scheme, our new scheme, named the Multi-layer MI (MMI) scheme, has a structure of multi-layer central map. Firstly, this article introduces the MI scheme and describes linearization attack and differential attack; then prescribes the designation of MMI in detail, and proves that MMI can resist both linearization attack and differential attack. Besides, this article also proves that MMI can resist recent eXtended Linearization (XL)-like methods. In the end, this article concludes that MMI also maintains the efficiency of MI.  相似文献   

13.
The stability constraints of the noise shaper are examined for the purpose of coder design. The author shows that the presence of a limiter in the noise shaper strongly influences the stability criteria on the loop filter of a third- or higher-order coder. A third-order coder was designed according to these results for high-fidelity audio. It performs with a dynamic range of over 100 dB, and the measured in-band noise agrees fairly well with the calculated value. The proposed design procedure also applies to the (sigma-) delta modulator, which is in essence the same device  相似文献   

14.
杜伟章  王新梅 《通信学报》2002,23(12):30-35
基于GF(q)上纠错码的生成矩阵提出了一身份验证方案,证明了在随机预言模型中给出的协议是一零知识交互证明,并显示出通过参数的适当选取,此方案是安全的。  相似文献   

15.
全电子计算机联锁系统在实际应用过程中,需要全电子执行单元与联锁主机结合,但两者在结合中存在通信协议选择及通信协议安全性等问题,某种程度上阻碍了全电子计算机联锁系统的推广。文章通过分析全电子计算机连锁系统结构及工作原理、联锁主机与控制模块间的信息传输,重点设计了全电子计算机联锁系统中通信协议,实现了通信协议的安全性分析与计算,为全电子计算机联锁系统的广泛应用提供参考。  相似文献   

16.
基于物联网技术的校园综治安全系统研究   总被引:2,自引:2,他引:2  
在高校规模不断扩大和校园不断开放的今天,校园综治安全形势面临新的问题和挑战。系统在校园网络建设和应用的基础上,引入物联网技术与应用,实现校园行车管理、电子巡更、门禁管理、热区监控、资产管理等安防技术系统.并在此基础上整合视频监控和广播系统,以综治综合管理平台实现各个安全子系统的统一管理,促进校园综治安全技术水平的提高。  相似文献   

17.
随着我国计算机网络技术不断发展,计算机网络安全问题也得到了社会各个阶层的关注.基于此,本文重点探究影响计算机网络安全的主要因素,进而提出计算机网络安全技术的应用.  相似文献   

18.
为构建未来智慧型城区形态,提出一种新理念的社区管理——智慧社区,拟设计一种基于物联网技术的区域性智能安全管理系统,以RFID技术为核心支撑技术,主要是针对人员、车辆、物资的综合管控系统(RFID管控系统),该RFID管控系统是面向封闭式或社区式的特定管控区域,对所有进出区域的人员、车辆和物资的身份信息和状态信息实现全面感知,并在统一的监控平台上实现对上述人员、车辆及物资的综合管控。同时,系统具备可扩展性,为未来的扩充应用预留接口。  相似文献   

19.
基于整个网络的3G安全体制的设计与分析   总被引:6,自引:1,他引:6  
朱红儒  肖国镇 《通信学报》2002,23(4):117-122
首先提出了一个3G网络域内的安全体制,实现了网络域内实体之间的安全信息交互以及认证;在此基础上,进一步提出了一个在整个3GPP范围内的全网络范围内的安全结构,从而实现了UE之间的任意安全通信,并且对此结构的协议、算法和密钥进行了安全性分析,证明其是安全的。  相似文献   

20.
高安全性混沌同步保密通信方案设计   总被引:7,自引:0,他引:7  
翁贻方  鞠磊 《通信学报》2003,24(2):44-50
设计了一种以主动-被动同步机制为基础的混沌同步保密通信方案,方案提出了获取混沌变量中对参数敏感的信息和改善相关特性的方法,得到满足安全性要求的新变量,并用于对被加密信号进行调制。用Lorenz系统进行计算机仿真通信实验和特性分析的结果表明,本方案同步特性优良,信号恢复精度高,安全性比原方案有明显提高。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号