共查询到20条相似文献,搜索用时 922 毫秒
1.
对两种无证书签密方案进行了安全性分析,发现两种方案均是不安全的。第一种无证书签密方案不满足不可伪造性,第二种无证书签密方案不能完全满足公开验证性。针对这种情况,提出了一种新的无证书签密方案,同时对新方案进行了正确性分析和安全分析,结果表明新方案是安全的,真正做到了信息方面的保密性和认证性。 相似文献
2.
3.
4.
JIANG Jun-feng 《数字社区&智能家居》2008,(35)
介绍了数字签名背景、签名体制的形式化描述以及两个特殊的数字签名方案。对如何用RSA实现盲签名和多重数字签名方案进行了研究,分析了两种具体方案实现的安全性。最后总结了这两种特殊数字签名实现过程中算法设计的优劣。 相似文献
5.
该文在RSA数字签名的基础上,设计了两种改进方案,有效的解决了隐藏消息的问题,防止了不经意的信息泄露。这两种数字签名方案都是概率数字签名方案,因而安全性提高,具有多项式安全性。 相似文献
6.
文章总结了消息鉴别码和数字签名方案之间的关联,比较了两者之间在方案定义、安全定义,通用构造方法的相似之处和区别。这些对比有利于学习者对这两种密码学方案的学习和领会,也有利于教学者讲授这两种方案。 相似文献
7.
对两种基于Lucas序列的盲签名方案,指出了可能存在的共同缺陷,对其中一种方案给出了攻击办法,并提出了一种基于Lucas序列的有抵抗被动和主动攻击的优点和高效率的盲签名方案,解决了前面两种基于Lucas序列的盲签名方案中存在的问题. 相似文献
8.
多泵变频恒压供水常用的两种方案,比较了两种方案的优劣。重点介绍多泵变频恒压供水循环投切的控制过程,以实例说明循环投切方案的可行性。 相似文献
9.
LonWorks现场总线与以太网的互联研究 总被引:7,自引:0,他引:7
本介绍了LonWorks现场总线与以太网的两种互联方案,一种是半导体制造商使用大规模集成电路技术实现的片内集成方案,另一种是应用开发使用嵌入式设计技术实现的片外集成方案。本对两种方案作了说明和比较,并指出了其应用前景。 相似文献
10.
11.
关于Vague值转化为Fuzzy值的方法的分析 总被引:6,自引:5,他引:1
提出了Vague值转化Fuzzy值的方法的不可分辩的定义,用此定义证明了四种转化方法的不可分辩性。证明了五种方法(其中有该文提出的三种方法)是较好的转化方法。 相似文献
12.
do Val J.B.R. Geromel J.C. Costa O.L.V. 《Automatic Control, IEEE Transactions on》1998,43(12):1727-1733
This paper deals with recursive methods for solving coupled Riccati equations arising in the linear quadratic control for Markovian jump linear systems. Two algorithms, based on solving uncoupled Riccati equations at each iteration, are presented. The standard method for this problem relies on finite stage approximations with receding horizon, whereas the methods presented here are based on sequences of stopping times to define the terminal time of the approximating control problems. The methods can be ordered in terms of rate of convergence. Comparisons with other methods in the current literature are also presented 相似文献
13.
14.
The paper presents a survey of methods for constructing covering arrays used in generation of tests for interfaces with a
great number of parameters. The application domain of these methods and algorithms used in them are analyzed. Specific characteristics
of the methods, including time complexity and estimates of the required memory, are presented. Various—direct, recursive,
optimization, genetic, and backtracking—algorithms used for constructing covering arrays are presented. Heuristics are presented
that allow one to reduce arrays without loss of completeness, and application domains of these heuristics are outlined. 相似文献
15.
16.
Robust measures are introduced for methods to determine statistically uncorrelated or also statistically independent components spanning data measured in a way that does not permit direct separation of these underlying components. Because of the nonlinear nature of the proposed methods, iterative methods are presented for the optimization of merit functions, and local convergence of these methods is proved. Illustrative examples are presented to demonstrate the benefits of the robust approaches, including an application to the processing of dynamic medical imaging. 相似文献
17.
M. Z. Zgurovskii 《Cybernetics and Systems Analysis》2000,36(1):75-82
The paper deals with the role and place of systems analysis methods in the solution of complex problems in various spheres
of human activity in Ukraine. The social and socio-economic prerequisites for development of theory and applied methods are
being considered. The main characteristics of the problems to which these methods are applied are formulated. The hierarchy
of problems and methods used for solution of complex problems based on systems analysis methods is presented, and the main
spheres of their application in Ukraine are presented.
Translated from Kibernetika i Sistemnyi Analiz, No. 1, pp. 101–109, January–February, 2000. 相似文献
18.
In this paper generalizations of the well known Numerov's method are obtained. The local truncation errors of the new methods are presented and the result of the application of the new methods to a two-dimensional Schrodinger equation in an equal space discretization is presented. Numerical illustrations show the efficiency of the new methods compared with the known five-point formula in two coulombic potentials. 相似文献
19.
中文文本的关键词自动抽取和模糊分类 总被引:41,自引:3,他引:38
本文提出了中文文本分类的两种模糊方法,一种基于模糊集间的语义距离,一种基于本文中提出的‘模糊分类网络’。两者都必须首先从文本中抽取关键词集合,本文给出了一种主要采用统计方法结合受限自然语言理解技术的模糊关键词集合提取方法,它与模糊分类方法结合,可望达到文本信息的自动分类。所提出的方法同样适合于模式识别之类问题的解决。 相似文献
20.
抄纸过程定量水分控制仿真研究 总被引:1,自引:0,他引:1
抄纸过程定量水分系统既存在强耦合,又具有很大纯延迟;应用Bristol方法了对定量水分系统进行了解耦,对传统Smith预估控制进行了改进并对其鲁棒性进行了分析;提出一种基于Bristol解耦控制和改进Smith预估控制的定量水分优化控制方法,该方法同时解决了耦合和纯延迟两个问题;对直接反馈控制、Bristol解耦控制、改进Smith预估控制、解耦预估优化控制方法的控制效果进行了仿真和比较,结果表明该方法具有良好的控制效果;对解耦预估控制进行了鲁棒性仿真,证明该方法具有很强的鲁棒性,具有一定的工程应用价值. 相似文献