共查询到19条相似文献,搜索用时 78 毫秒
1.
DSm信任模型下的信任传递 总被引:3,自引:2,他引:1
将DSm(Dezert—Smarandache)任模型用于开放社区的信任管理。文章介绍了在该模型下信任传递中的有关概念,提出了信任的传递方法,设计仿真实验分析了一些参数对信任传递的影响。 相似文献
2.
3.
栅格化网络对信息安全的要求愈加迫切,有必要对其信任传递技术进行研究和验证。构建面向服务的端到端业务访问的安全体系结构,提出栅格环境下跨域业务访问的安全防护等关键技术,形成基于业务属性为驱动的动态安全策略防护机制,实现不同类型业务的安全服务能力,有效地保证系统的可靠运转,为栅格化网络的建设保障提供有力支撑,并对后期的研究工作进行了展望。 相似文献
4.
一种可信计算平台及信任链传递验证方法 总被引:1,自引:0,他引:1
信任链是可信计算机系统的重要部分,它保证计算机系统从可信源头至系统各组件的可信,但存在信任链建立过程的信任度逐层衰减问题。文中通过可信平台控制模块授权CPU进行链式度量,同时TPCM尾随CPU对信任链进行实时的、随机的和分块的度量,然后在平台信任链中嵌入检查点,统计并检查各块运行时间,从而判断各信任节点是否被篡改。该方法提高了信任链建立和验证的实时性,尤其可以防御针对信任链的时间差攻击。 相似文献
5.
边信道攻击利用边信道来危害传统密码学方案的安全性,抗泄漏密码学的研究则可以抵抗这种攻击.安全的抗泄漏密码学方案的设计必须在一个合适的泄漏模型中.文中介绍了目前存在的几种主要的泄漏模型,包括计算泄漏、相对泄漏模型、有界恢复模型、持续泄漏模型、事后泄漏模型等,并论述了各个模型下的一些主要的研究成果和研究进展. 相似文献
6.
7.
密码学已经出现多年,早在古代人们就开始利用一些特殊的符合和特殊的方式,来隐藏表达意思的原文.而伴随着信息技术的出现,密码学得到了更加广泛的应用,在电子商务中、网络安全保障中,密码学的思想通过数学的方法,进行加密设计,通过网络编程实现,在数字签名、密码保障、MD5等多技术中得到体现.本文就密码学中常用思想、加密方法与技术、网络加密技术应用进行了阐述. 相似文献
8.
March算法作为一类高效的存储器测试算法,已在学术界得到广泛、深入的研究,并取得了卓越成果。然而,当前以故障原语为核心的故障建模方法无法直接应用于March算法的分析。提出了一种新的测试原语,将其作为故障原语与March算法之间的桥梁,以期简化测试算法的分析、生成过程。该测试原语描述了March算法检测对应故障所必须具备的共性特征,形成了高度灵活且可拓展的March算法分析单元。根据故障原语生成了对应的测试原语,通过理论分析证明了该测试原语具有完备性、唯一性和简洁性的特点。 相似文献
9.
10.
11.
Hardware security primitives, also known as physical unclonable functions (PUFs), perform innovative roles to extract the randomness unique to specific hardware. This paper proposes a novel hardware security primitive using a commercial off-the-shelf flash memory chip that is an intrinsic part of most commercial Internet of Things (IoT) devices. First, we define a hardware security source model to describe a hardware-based fixed random bit generator for use in security applications, such as cryptographic key generation. Then, we propose a hardware security primitive with flash memory by exploiting the variability of tunneling electrons in the floating gate. In accordance with the requirements for robustness against the environment, timing variations, and random errors, we developed an adaptive extraction algorithm for the flash PUF. Experimental results show that the proposed flash PUF successfully generates a fixed random response, where the uniqueness is 49.1%, steadiness is 3.8%, uniformity is 50.2%, and min-entropy per bit is 0.87. Thus, our approach can be applied to security applications with reliability and satisfy high-entropy requirements, such as cryptographic key generation for IoT devices. 相似文献
12.
The trustee and the trustor may have no previous interaction experiences before. So, intermediate nodes which are trusted by both the trustor and the trustee are selected to transit trust between them. But only a few intermediate nodes are key nodes which can significantly affect the transitivity of trust. To the best of our knowledge, there are no algorithms for finding key nodes of the trust transitivity. To solve this problem, the concept of trust is presented, and a comprehensive model of the transitivity of trust is provided. Then, the key nodes search (KNS) algorithm is proposed to find out the key nodes of the trust transitivity. The KNS algorithm is verified with three real social network datasets and the results show that the algorithm can find out all the key nodes for each node in directed,
weighted, and non-fully connected social Internet of things (SIoT) networks. 相似文献
13.
线性结构是度量密码函数安全性的一个重要指标。本文基于线性分组码理论,分析了文献[1~4]所构造的密码函数的线性结构,并指出这些函数均具有线性结构,且其线性结构集和构造这些函数所运用的线性分组码的对偶码有关。这就说明了文献[1~4]的密码函数本质上是密码学意义下的弱函数。 相似文献
14.
15.
A new S-box based on cellular automata was found by experiments.The permutation properties of the S-box were analyzed,which proved that the S-box was a permutation only when the size of lattice was 5.Then the relation between the nontrivial difference transition probability of the S-box and the rank of the difference matrix was proved by constructing the difference matrix.And it was proved that the cyclic shift of input differential would not change the corresponding nontrivial differential transition probability,and obtained the sufficient and necessary conditions about the maximum and minimum nontrivial differential transition probabilities when the size of lattice was 5.Then the problem of the difference distribution of the S-box in this situation is completely solved. 相似文献
16.
17.
Shu Zhang Minqun Liang John A. Robinson Glenn L. Greig 《Signal Processing: Image Communication》1995,7(4-6):457-469
We introduce an algorithm for matching stationary or moving image primitive lines between adjacent frames of a video sequence. Starting from local measures of proximity and similarity of shape, the algorithm computes the distance between pairs of primitives. It has strategies for dealing with broken lines and various kinds of connections between lines. The output of the algorithm is used to control a motion coding system, where only unmatched threads need be transmitted. The system can function in a simple conditional replenishment mode, or with motion compensation. Experimental results are reported showing an improvement of compression rate of 2:1 between intraframe primitivebased coding and motion-compensated primitive-based coding. 相似文献
18.
19.
密码设备是否安全并不能单纯依赖于密码算法数学上的计算不可行性,其在实际运行过程中泄漏的物理信号更值得关注.文章针对目前国内常用密码算法SM4进行分析,评估其运行过程中的侧信道泄漏信号是否存在攻击的可能,设计了相关检测实验验证了文章提出的SM4算法泄漏评估方法的有效性. 相似文献