首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 109 毫秒
1.
E-commerce is a very active field of Internet research. A very important aspect of e-commerce is its security. Because of the variety of e-commerce applications, many security policies, protocols and techniques are involved in the deployment of the security. The related standards and protocols of e-commerce are studied in this paper. The general model of e-commerce security is set forth. In this model, two most important e-commerce protocols including secure sockets layer (SSL) and secure electronic transaction (SET) are analyzed. The open problems and new trends of e-commerce security are presented.  相似文献   

2.
Universality is an important property in software and hardware design. This paper concentrates on the universality of quantum secure multi-party computation (SMC) protocol. First of all, an in-depth study of universality has been onducted, and then a nearly universal protocol is proposed by using the Greenberger-Horne-Zeilinger (GHZ)-like state and stabilizer formalism. The protocol can resolve the quantum SMC problem which can be deduced as modulo subtraction, and the steps are simple and effective. Secondly, three quantum SMC protocols based on the proposed universal protocol: Quantum private comparison (QPC) protocol, quantum millionaire (QM) protocol, and quantum multi-party summation (QMS) protocol are presented. These protocols are given as examples to explain universality. Thirdly, analyses of the example protocols are shown. Concretely, the correctness, fairness, and efficiency are confirmed. And the proposed universal protocol meets security from the perspective of preventing inside attacks and outside attacks. Finally, the experimental results of the example protocols on the International Business Machines (IBM) quantum platform are consistent with the theoretical results. Our research indicates that our protocol is universal to a certain degree and easy to perform.  相似文献   

3.
A kind of attack strategy based on a probabilistic cloning machine is proposed in this letter. The security of BB84 and the six-state quantum key distribution protocols under this attack is studied by theoretic analyses and corroborated by simulations. It is concluded that the quantum key distribution protocols still have an asymptotic perfect security even if the eavesdropper adopts the proposed attack strategy.  相似文献   

4.
The minimum energy per bit(EPB) as the energy efficiency(EE) metric in an automatic retransmission request(ARQ) based multi-hop system is analyzed under power and throughput constraints. Two ARQ protocols including type-I(ARQ-I) and repetition redundancy(ARQ-RR) are considered and expressions for the optimal power allocation(PA) are obtained. Using the obtained optimal powers, the EE-throughput tradeoff(EETT) is analyzed and the EETT closed-form expressions for both ARQ protocols and in arbitrar...  相似文献   

5.
A mobile satellite indoor signal is proposed to model perfor mance of cooperative communication protocols and maximal ra tio combining.Cooperative diversity can improve the reliability of satellite system and increase data speed or expand cell radi us by lessening the effects of fading.Performance is determined by measured bit error rates(BERs)in different types of coopera tive protocols and indoor systems(e.g.GSM and WCDMA net works).The effect of performance on cooperative terminals lo cated at different distances from an indoor cellular system is al so discussed.The proposed schemes provide higher signal-tonoise ratio(SNR)-around 1.6 dB and 2.6 dB gap at BER 10-2for amplify-and-forward(AF)and decode-and-forward(DF)cooperative protocols,respectively,when the cooperative termi nal is located 10 m from the WCDMA indoor system.Coopera tive protocols improve effective power utilization and,hence,improve performance and cell coverage of the mobile satellite network.  相似文献   

6.
How to correctly acquire the appropriate features is a primary problem in network protocol recognition field.Aiming to avoid the trouble of artificially extracting features in traditional methods and improve recognition accuracy,a network protocol recognition method based on Convolutional Neural Network(CNN)is proposed.The method utilizes deep learning technique,and it processes network flows automatically.Firstly,normalization is performed on the intercepted network flows and they are mapped into two-dimensional matrix which will be used as the input of CNN.Then,an improved classification model named Ptr CNN is built,which can automatically extract the appropriate features of network protocols.Finally,the classification model is trained to recognize the network protocols.The proposed approach is compared with several machine learning methods.Experimental results show that the tailored CNN can not only improve protocol recognition accuracy but also ensure the fast convergence of classification model and reduce the classification time.  相似文献   

7.
As an important component of internet of things, electronic product code (EPC) system is widely used in many areas. However, the mass deployment of EPC system is frequently degraded by security and privacy problems. Therefore, the major researches focus on the design of a secure EPC system with high efficiency. This paper discusses the security requirements of EPC system and presents a universal composable (UC) model for EPC system, the ideal functionality of EPC system is also formally defined with the UC framework. Then a secure protocol for EPC system under UC framework is proposed and the analysis of security and performance of the proposed protocol is given, in comparison with other protocols, the results show that the proposed protocol is UC secure and can provide privacy protection, untraceability, authorized access, anonymity and concurrent security for EPC system. Furthermore, less computation and storage resource are required by the proposed protocol.  相似文献   

8.
In consideration of the present conditions of telecom serviceproviders in China,the objectives and possible processes of con-structing telecom resource management systems(RMS)in Chinaare analyzed.The system boundary with other network manage-ment systems and the interface protocols are discussed.It is sug-gested that the telecom resource management system should beconstructed in a proper sequence and developed in differentstages.  相似文献   

9.
Code dissemination is an important building block of wireless reprogramming. We notice that current code dissemination protocols fails to consider page selection and energy balancing. In this paper, we present an integrated mutual selection based code dissemination protocol (MSD). The key idea of MSD is mutual selection comprising sender selection and page selection. By exploiting link quality information in mutual selection, MSD enhances the propagation. Further, MSD takes energy level information in the sender selection, thus avoiding low power nodes’ over-consumption. We simulate MSD by settings of Mica-Z motes. Simulation results show that MSD can reduce the completion time and average transmission, and help low power nodes avoid unnecessary transmission and energy consumption.  相似文献   

10.
Due to the use of the cloud computing technology, the ownership is separated from the adminis-tration of the data in cloud and the shared data might be migrated between different clouds, which would bring new challenges to data secure creation, especially for the data privacy protection. We propose a User-centric data secure creation scheme (UCDSC) for the security requirements of resource owners in cloud. In this scheme, a data owner first divides the users into different domains. The data owner encrypts data and defines different secure managing poli-cies for the data according to domains. To encrypt the data in UCDSC, we present an algorithm based on Access con-trol conditions proxy re-encryption (ACC-PRE), which is proved to be master secret secure and Chosen-ciphertext attack (CCA) secure in random oracle model. We give the application protocols and make the comparisons between some existing approaches and UCDSC.  相似文献   

11.
Borella  M.S. 《IEEE network》2000,14(4):18-29
The IETF has advanced the IPsec protocols to draft standard status. These protocols include mechanisms for the establishment of a secure channel, via cryptographic key exchange, over an insecure medium. Such a channel can then be used for ensuring the confidentiality, authentication, and/or integrity of the communications between two parties. We explain the algorithms and protocols of IPsec's Internet Key Exchange (IKE) and discuss the types of security that the various IKE modes provide  相似文献   

12.
IKE协议是IPsec协议簇的重要组成部分,用来动态地建立和维护安全关联SA,是IPsec VPN安全传输的先决条件和保证.文章在研究现有IKE协议的基础上,将公钥基础设施PKI体系引入其中,提出将ECC技术、X 509数字证书、访问控制技术同IKE协议相结合,设计了一个基于PKI身份认证和访问控制的增强型IKE协议,从而提高了IPsec VPN网关的安全性和可扩展性,有效保护了VPN网络资源的安全.最后给出了基于最新Linux2.6内核的实现方案,并对由此构建的IPsec VPN安全网关原型系统的工作过程作了说明.  相似文献   

13.
IPSec中基于IKE的安全防范机制   总被引:5,自引:1,他引:4  
文章从IPSec中密钥管理协议(Internet Key Exchange,IKE)的安全机制入手,针对IKE可能遭受到的攻击和协商模式讨论其安全性能,指出了存在的安全缺陷,并给出了修改建议。  相似文献   

14.
组播Internet密钥协商的研究与实现   总被引:2,自引:1,他引:1  
IKE(Internet密钥变换)协议是IPSec协议族的重要组成之一,用于主机之间建立密钥和相关的安全参数,保护数据的传输安全。由于IKE设计之初致力于点对点之间的安全参数协商,应用于IP组播情况有许多局限之处。为了满足安全组播通信,提出了多点Internet密钥交换协议(MIKE)。MIKE基于IKE,用于多点间协商密钥和相关的安全参数。文章主要讨论了MIKE的功能和结构,根据实际的要求设计了一个MIKE的实现模型。  相似文献   

15.
IKE协议是IPSec协议族中的自动密钥交换协议,用于动态的建立安全关联(SA)。文章对IKE协议主模式下预共享密钥认证方式中存在的身份保护缺陷进行了分析,提出了新的修改意见,使得协议更加完整并提高了效率。  相似文献   

16.
文章分析了IETF的因特网密钥交换(IKE)标准,指出对于IKE阶段1的野蛮模式存在一个容易导致拒绝服务(DoS)攻击的安全漏洞.文章认为这是由于响应方的安全联盟载荷没有加入到认证数据的计算中,使安全联盟载荷容易被篡改,从而导致双方可能协商出一个参数不相同的阶段1安全联盟载荷.  相似文献   

17.
IKE是 IETF制定的 Internet环境下的密钥交换协议。从 IKE的安全机制入手,针对IKE可能遭到的攻击和协商模式两方面讨论其安全性能。对IKE安全性能进行改进的最新进展。  相似文献   

18.
为了解决在主机IP地址不固定的情况下如何保证网络的安全性问题,介绍了IKE利用经典认证机制来支持外部接入的各种方法,详细阐述了各种方法的工作原理和优缺点,并对它们的适用环境做了分析,说明在IP地址不固定的网络中,IKE也可以提供良好的安全服务。  相似文献   

19.
介绍了IKE协议和安全联盟SA,讨论了IKE协议中几种重要的认证机制,特别是基于证书的认证方式,最后分析了认证机制实现的一些关键技术。  相似文献   

20.
文中通过分析IKE协议的安全性,说明IKE是如何保证协商的安全,其中重点分析了密钥产生,身份验证,hash认证等过程的安全性问题,以及影响安全性的其他几个因素,并提出了提高IKE的安全性方法,针对身份验证提出了一点改进.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号